WPA3

WPA3 is the third installment of the Wi-Fi Protected Access (WPA) standard, offered by the Wi-Fi Alliance to secure Wi-Fi connections and devices that use them. Introduced in 2018, WPA3 heavily increased the use of encryption to protect users’ connections to public Wi-Fi networks.

WPA2 (WPA3’s precursor) was susceptible to attacks wherein a hacker repeatedly guessed a password during the four-way handshake authentication process. WPA3 aimed to address WPA2 flaws by encrypting device connections to public Wi-Fi networks.

One primary feature of WPA3 was Wi-Fi Easy Connect, which offers asymmetric cryptography and simpler configuration. Users scan a QR code to connect to Wi-Fi rather than inputting a password. One main device per network becomes the configuration point and must be able to scan the QR code. Although it wasn’t technically part of WPA3, Wi-Fi Enhanced Open was introduced around the same time, offering encryption for public Wi-Fi networks. Opportunistic Wireless Encryption (OWE) encrypts an open network rather than using a pre-shared key (PSK), which are typically symmetric.

Weaknesses of WPA3

WPA2’s main weaknesses included allowing hackers to guess users’ passwords through brute force attacks on accounts that tried to connect to public Wi-Fi networks. WPA3 addresses these flaws by making it more difficult for hackers to attack and guess users’ passwords or freely observe their internet usage. It also implemented a program called Dragonfly, used to avoid the password-guessing problem, but in 2019 Dragonfly was revealed to be susceptible to similar attacks.

Devices can also create fake wireless networks by copying a legitimate Wi-Fi network name and pasting it into their phone’s name, tricking users into selecting that as their network. WPA3 cannot stop these “evil twin” attacks, either.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...