Opportunistic Wireless Encryption

Opportunistic wireless encryption uses a secret key to encrypt Internet sessions hosted on open Wi-Fi networks. Public Wi-Fi networks with no required password or authentication process are convenient, especially for users who are on the go or need to quickly access their bank account or work email. But they’re also extremely susceptible to hacking, particularly man-in-the-middle attacks, where a third-party attacker intercepts the four-way handshake process and pretends to be the main parties. Opportunistic wireless encryption (OWE) removes much of attackers’ opportunity to intercept the handshake process and gain access to a user’s Internet activity.

Instead of using a public pre-shared key (PSK), in which the handshake process can easily be hacked, OWE uses a Diffie-Hellman encryption key exchange, creating a unique key for the two parties. After the key exchange is successful, the networks perform a four-way handshake before finalizing and enabling an encrypted connection.

OWE weaknesses

Unfortunately, although OWE makes it more difficult for malicious parties to perform man-in-the-middle attacks, it’s still susceptible to compromise. OWE doesn’t authenticate either user or network, unlike many encryption protocols. This means that an attacker can masquerade as a network by falsifying the wireless access point (WAP) and renaming it with the name of a nearby Wi-Fi network. Users believe they are using a legitimate network and log into that network, potentially using passwords or other sensitive information. Their online actions can then be intercepted by the attacker. This kind of hack is known as an evil twin attack.

Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

Text Abbreviations reviewed by Web Webster   From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

How to run chkdsk

Chkdsk, short for check disk, is a system tool and command...

Monday.com

Monday.com is a cloud-based work operating system that can be used for a...

Secure Socket Tunneling Protocol...

The secure socket tunneling protocol (SSTP) is a VPN protocol where...