WEP vs WPA vs WPA2: Wireless Security Protocol Comparison

wireless security
wep
wpa
wpa2
encryption

This article compares WEP, WPA, and WPA2, outlining the key differences between these wireless security protocols. It covers WEP encryption/decryption, its drawbacks, and the 802.1x authentication used in WPA. We’ll also touch upon AES encryption used in the WPA2 algorithm.

Wireless security has always been a concern due to the open-air transmission medium used. Despite various security mechanisms, achieving 100% security in wireless data transmission remains challenging. WEP, WPA, and WPA2 are encryption algorithms employed in WLAN (Wireless Local Area Network) or Wi-Fi networks.

WEP Encryption and Decryption

WEP (Wired Equivalent Privacy) features include:

  • Symmetric encryption: The same keys are used for both encryption and decryption.
  • Key size: Uses a 40-bit key for encryption (non-standard versions may use 128-bit or 256-bit) and a 24-bit Initialization Vector (IV).
  • Cipher and integrity: Employs the RC4 stream cipher for confidentiality and a 32-bit CRC polynomial for data integrity.
  • XOR operation: WEP encryption and decryption use simple XOR operations.

WEP Encryption

Figure 1: WEP Encryption Process Block Diagram

The WEP encryption process involves encrypting the plaintext and protecting the data from modification. The steps are:

  1. Encrypt the plaintext using a 64-bit key (40-bit secret key + 24-bit IV).
  2. RC4 uses the key as an initial seed to generate a Pseudo-Random (PN) key sequence.
  3. The PN key sequence is XORed with the data.
  4. The 4-byte IV value is added to the ciphertext before transmission.
  5. RC4 is applied on plain text, Integrity Check Value (ICV), and the key sequence to generate cipher text.

WEP Decryption

Figure 2: WEP Decryption Process Block Diagram

The WEP decryption process involves:

  1. Using the IV from the incoming message to generate the key sequence.
  2. Applying the RC4 algorithm to the ciphertext with the key sequence to produce the original plaintext and ICV.
  3. Determining a new ICV based on the received plaintext.
  4. Verifying correctness by comparing the new ICV with the decoded ICV.
  5. If both ICVs match, the received message is considered correct; otherwise, it’s discarded.

Drawbacks of WEP Encryption

  • Shared key vulnerability: Analysis of captured traffic can reveal the shared key.
  • Small key size: The 40-bit key and 24-bit IV are prone to attacks.
  • One-way authentication: WEP only allows Network Interface Cards (NICs) to authenticate Access Points (APs), not vice versa.

WPA Encryption Algorithm

WPA (Wi-Fi Protected Access) addresses the drawbacks of WEP.

The main issue with WEP was that users often failed to activate it or change the default password. WPA resolves this by automatically setting keys derived from a master key and changing them regularly. Developed by the Wi-Fi Alliance, WPA comes in two types:

  • WPA Enterprise: Uses a RADIUS server for user authentication.
  • WPA Personal: Relies on a pre-shared key (PSK) or password entered by users, with the TKIP (Temporal Key Integrity Protocol) periodically changing the keys.

WPA features include:

  • Data protection: Ensures data protection and restricts network access to authorized users.
  • Interoperability: Secures and enables interoperability for all 802.11 versions (e.g., 11a/11b/11g).
  • Dynamic session keys: Uses dynamic session keys via TKIP.
  • Larger key sizes: TKIP uses key sizes ranging from 40 to 128 bits.
  • Authentication server: Checks user credentials and grants access to authorized users only, generating and distributing keys to the client (STATION) and AP.
  • 802.1x authentication: Utilizes 802.1x authentication with EAP (Extensible Authentication Protocol), which handles credential presentation in digital certificate forms.

WPA2 Encryption Algorithm

WPA2 features:

  • AES encryption: Based on the AES (Advanced Encryption Standard) as defined in IEEE 802.11i.
  • Developed by the Wi-Fi Alliance in association with the IEEE.

Refer to AES vs DES and AES MATLAB code for more information.

802.11x authentication

Figure 3: 802.1x authentication message flow between Station, AP, and Authentication server

IEEE 802.11i defines the Robust Secure Network (RSN) mechanism, which uses 802.1x authentication and key management protocols. The RSN authentication involves three systems:

  1. Wi-Fi STATION
  2. Wi-Fi Access Point
  3. Authentication Server

There are three steps involved in RSN connection establishment using WPA2:

  • Request, Authentication, and Association
  • 802.1x authentication
  • 4-way handshake

The message exchange is shown in Figure 3.

AES Basics and MATLAB Implementation

Explore the fundamentals of AES encryption and decryption, including CTR and OFB modes. Includes MATLAB code examples for AES implementation.

aes
encryption
matlab
Z-Wave Security Fundamentals

Z-Wave Security Fundamentals

Explore the basics of Z-Wave security, including message freshness, encryption, data authentication, and the key exchange protocol used in Z-Wave networks.

zwave
security
network