You are on page 1of 18

WPA-3

(Wi-Fi Protected Access - 3)

“Future of wireless security”

Present By :-
Digvijay Maurya
Content
 Introduction .
 List of Wireless Security Protocols.
 WEP(Wired Equivalent Privacy).
 WPA(Wi-Fi Protected Access).
 WPA Vulneribilities.
 WPA2 and its limitation.
 What is Man in the middle attack ?
 What is KRACK ?
 Tools.
 Advantages of WPA3.
 Summary.
Introduction

 “WPA” stands for Wi-Fi Protected


Access.
 WPA 3 is the next generation of wi-fi
security.
 It is standard version of WPA2.
 WPA3 will add new features to simplify
Wi-Fi security.
List of Wireless Security
Protocols

 WEP(Wired Equivalent Privacy)

 WPA(Wi-Fi Protected Access).

 WPA2(Wi-Fi Protected Access I


WEP(Wired Equivalent
Privacy
 It was developed in 1997.
 part of the IEEE 802.11
 It use 64bit encryption.
 It uses the RC4 encryption protocol to secure
the data.
 specification ƒgoal :
make the WiFi network at least as secure as a
wired LAN (that has no particular protection
mechanisms)
WPA(Wi-Fi Protected Access

Developed by the Wi-Fi Alliance to secure


wireless computer networks
• It was adopted in 2003 to solve weakness in
WEP
• Standardized in IEEE 802.11i
• Increased in safety: encryption 128 bits
• Known as TKIP(Temporal key Integrity)
• It uses RC4 encryption to secure the data
• It uses the MIC and frame counter to verify
the integrity of the data.
MIC(Massage integrity
code)
WPA Vulnerabilities
 Weakness in the key
combination algorithm
 PSK is vulnerable to
eavesdropping and
dictionary attack.
 TKIP vulnerability allows
attacker to guess IP
address of the subnet.
WPA2

 WPA2 is the security method


added for wireless networks that
provides stronger data protection and
network access control.
 Has replaced WPA.
 Was adopted in 2004.
 WPA2 has two types : WPA2-
Personnal,WPA-Enterprise.
WPA 2 Encryption
 WPA2 uses AES with a key length of
128 bit to encrypt data.
Limitation of WPA2

 The Password can be cracked online.


 Anyone can disconnect you.
 Once anyone know the password he
can spoof or sniff the wifi users by
“Man in the middle attack”.
 A hacker can hack the whole wifi
network and its user by using
“KRACK”.
What is Man in the middle attack
?

Man in the middle attack is a attack where


attacker secretly steal the data and
information of victim which is sending to
the web servers.
KRACK (Key Reinstallation
Attack)

•KRACK ("Key Reinstallation Attack") is a severe replay


attack (a type of exploitable flaw) on the Wi-Fi Protected
Access protocol that secures Wi-Fi connections

•It was discovered in 2016


•It was discovered by Belgian researchers Mathy Vanhoef and
Frank Piessens.
Tools
 Here are the some tools that bypass
wireless securities :
Advantages of WPA3

 Password protection.
 Protection against KRACK and Man in
the middle attack.
 It will simplify to connect with wifi.
 Stronger encryption.
 Protect public Wi-Fi.
Summary

 1.WPA2 is the improved version of


WPA.
 2.WPA only supports TKIP encryption
while WPA2 supports AES.
 3.WPA2 requires more processing
power than WPA
Thank you

You might also like