Opportunistic Wireless Encryption

Opportunistic wireless encryption uses a secret key to encrypt Internet sessions hosted on open Wi-Fi networks. Public Wi-Fi networks with no required password or authentication process are convenient, especially for users who are on the go or need to quickly access their bank account or work email. But they’re also extremely susceptible to hacking, particularly man-in-the-middle attacks, where a third-party attacker intercepts the four-way handshake process and pretends to be the main parties. Opportunistic wireless encryption (OWE) removes much of attackers’ opportunity to intercept the handshake process and gain access to a user’s Internet activity.

Instead of using a public pre-shared key (PSK), in which the handshake process can easily be hacked, OWE uses a Diffie-Hellman encryption key exchange, creating a unique key for the two parties. After the key exchange is successful, the networks perform a four-way handshake before finalizing and enabling an encrypted connection.

OWE weaknesses

Unfortunately, although OWE makes it more difficult for malicious parties to perform man-in-the-middle attacks, it’s still susceptible to compromise. OWE doesn’t authenticate either user or network, unlike many encryption protocols. This means that an attacker can masquerade as a network by falsifying the wireless access point (WAP) and renaming it with the name of a nearby Wi-Fi network. Users believe they are using a legitimate network and log into that network, potentially using passwords or other sensitive information. Their online actions can then be intercepted by the attacker. This kind of hack is known as an evil twin attack.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...