WPA3

WPA3 is the third installment of the Wi-Fi Protected Access (WPA) standard, offered by the Wi-Fi Alliance to secure Wi-Fi connections and devices that use them. Introduced in 2018, WPA3 heavily increased the use of encryption to protect users’ connections to public Wi-Fi networks.

WPA2 (WPA3’s precursor) was susceptible to attacks wherein a hacker repeatedly guessed a password during the four-way handshake authentication process. WPA3 aimed to address WPA2 flaws by encrypting device connections to public Wi-Fi networks.

One primary feature of WPA3 was Wi-Fi Easy Connect, which offers asymmetric cryptography and simpler configuration. Users scan a QR code to connect to Wi-Fi rather than inputting a password. One main device per network becomes the configuration point and must be able to scan the QR code. Although it wasn’t technically part of WPA3, Wi-Fi Enhanced Open was introduced around the same time, offering encryption for public Wi-Fi networks. Opportunistic Wireless Encryption (OWE) encrypts an open network rather than using a pre-shared key (PSK), which are typically symmetric.

Weaknesses of WPA3

WPA2’s main weaknesses included allowing hackers to guess users’ passwords through brute force attacks on accounts that tried to connect to public Wi-Fi networks. WPA3 addresses these flaws by making it more difficult for hackers to attack and guess users’ passwords or freely observe their internet usage. It also implemented a program called Dragonfly, used to avoid the password-guessing problem, but in 2019 Dragonfly was revealed to be susceptible to similar attacks.

Devices can also create fake wireless networks by copying a legitimate Wi-Fi network name and pasting it into their phone’s name, tricking users into selecting that as their network. WPA3 cannot stop these “evil twin” attacks, either.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...