Key Points
- Wi-Fi encryption has evolved from WEP to WPA3, with WPA3 offering stronger protections like individualized encryption, resistance to offline attacks, and support for modern security standards
- EAP-TLS with certificates provides superior authentication compared to passwords by ensuring mutual verification, dynamic encryption, and eliminating credential theft risks.
- SecureW2’s Managed PKI and Cloud RADIUS simplify certificate deployment and enable passwordless, policy-driven authentication across enterprise networks.
Every wireless network relies on a security protocol to encrypt traffic and authenticate devices. The four standards you’ll encounter are WEP, WPA, WPA2, and WPA3, and the differences between them affect everything from encryption strength to how users and devices prove their identity.
If you’re still running WEP or WPA, your network is exposed to attacks that take minutes to execute. If you’re running WPA2-Personal with a shared password, you’re better off, but still leaving gaps that credential-based attacks can exploit.
This guide breaks down WEP vs. WPA vs. WPA2 vs. WPA3 side by side: how each protocol works, where it falls short, and what standard enterprise IT teams should deploy today for 802.1X certificate-based Wi-Fi security.
What Are Wi-Fi Security Protocols?
Wi-Fi security protocols are standards that govern how wireless networks encrypt data and authenticate connecting devices. They operate at the link layer, protecting traffic between a client device and the access point before it reaches the broader network.
Every Wi-Fi security protocol has two jobs:
- Encryption: scrambling data in transit so eavesdroppers can’t read it
- Authentication: verifying that a device or user is authorized to connect
The protocol your network uses determines the encryption algorithm (RC4, TKIP, AES), the key exchange method (static keys, PSK, SAE, EAP), and the vulnerability surface attackers can target.
What Is WEP?
Wired Equivalent Privacy (WEP) was introduced in 1997 as the original Wi-Fi security standard under IEEE 802.11. Its goal was to give wireless networks the same confidentiality as a wired Ethernet connection.
How Does WEP Work?
WEP uses the RC4 stream cipher with either a 64-bit or 128-bit static encryption key. Every device on the network shares the same key, and that key does not change unless an administrator manually rotates it.
WEP’s fundamental flaw lies in its use of a static encryption key. Because the same key encrypts every packet, an attacker only needs to capture enough traffic to derive the key, and this often takes just a few minutes. In fact, tools like Aircrack-ng can crack a WEP key in under five minutes on a modern laptop. The Wi-Fi Alliance officially retired WEP in 2004, and no modern deployment should use it.
WEP at a Glance
- Encryption: RC4 (64-bit or 128-bit)
- Key management: Static, shared across all devices
- Authentication: Open System or Shared Key
- Status: Deprecated since 2004
What Is WPA?
Wi-Fi Protected Access (WPA) arrived in 2003 as an emergency fix for WEP. The Wi-Fi Alliance released it as an interim standard while the full IEEE 802.11i specification (WPA2) was still in development.
How Does WPA Work?
WPA replaced WEP’s static keys with the Temporal Key Integrity Protocol (TKIP). TKIP generates a new 128-bit encryption key for every data packet, which prevents the key-reuse attacks that made WEP trivial to crack. WPA also added a Message Integrity Check (MIC) to detect packet tampering.
Although WPA improved on WEP, it introduced its own set of weaknesses. Specifically, TKIP still relies on the RC4 cipher underneath. Over time, researchers found vulnerabilities in TKIP itself, notably the Beck-Tews and Ohigashi-Morii attacks, that allow limited packet injection and decryption. WPA-Personal (PSK) mode is also vulnerable to offline dictionary attacks if the pre-shared key is weak.
WPA at a Glance
- Encryption: TKIP (RC4-based, per-packet keys)
- Key management: Dynamic via TKIP; PSK or 802.1X/EAP
- Authentication: WPA-Personal (PSK) or WPA-Enterprise (EAP)
- Status: Deprecated; do not use for new deployments
What Is WPA2?
WPA2 became mandatory for all Wi-Fi certified devices in 2006 and remains the most widely deployed wireless security protocol today. It implements the full IEEE 802.11i specification.
How Does WPA2 Work?
WPA2 replaced TKIP with two stronger components:
- AES (Advanced Encryption Standard): a block cipher used by the U.S. government for classified data. AES operates on 128-bit blocks and supports 128-, 192-, or 256-bit keys.
- CCMP (Counter Mode CBC-MAC Protocol): handles both encryption and data integrity in a single pass, replacing the weaker MIC used by WPA.
WPA2 operates in two modes:
- WPA2-Personal (PSK): All devices share a single pre-shared key. This mode is simple to set up for home networks, but the shared password is a liability in any environment with more than a handful of users.
- WPA2-Enterprise (802.1X): Each user or device authenticates individually through a RADIUS server using the Extensible Authentication Protocol (EAP). There are no shared passwords. This is the standard for business, education, healthcare, and government Wi-Fi networks.
WPA2 has at least one known vulnerability. In 2017, the Key Reinstallation Attack (KRACK) demonstrated that an attacker in range could force a WPA2 client to reuse encryption keys during the four-way handshake. Most vendors patched this quickly, but it highlighted the importance of keeping firmware current.
WPA2 at a Glance
- Encryption: AES-CCMP (128-bit)
- Key management: PSK or 802.1X/EAP
- Authentication: WPA2-Personal or WPA2-Enterprise
- Status: Current standard; widely deployed
What Is WPA3?
WPA3 was announced by the Wi-Fi Alliance in 2018 and is required on all Wi-Fi 6E and Wi-Fi 7 certified devices. It addresses the remaining weaknesses in WPA2, particularly around the PSK handshake and public network encryption.
WPA3 introduced a number of improvements:
- SAE (Simultaneous Authentication of Equals): Replaces the PSK four-way handshake with a zero-knowledge proof protocol. Even if an attacker captures the handshake, they cannot perform an offline dictionary attack to guess the password.
- Forward secrecy: Each session uses a unique key. Compromising one session’s key does not expose past or future sessions.
- Individualized data encryption: On open (public) networks, WPA3 encrypts traffic between each device and the access point individually—something WPA2 open networks cannot do.
- 192-bit security suite: WPA3-Enterprise offers an optional 192-bit mode aligned with the Commercial National Security Algorithm (CNSA) suite for government and high-security environments.
- Easy Connect: A QR-code-based provisioning method for IoT devices and headless hardware that lack a display.
WPA3 at a Glance
- Encryption: AES-CCMP (128-bit) or AES-GCMP (192-bit in Enterprise mode)
- Key management: SAE (Personal) or 802.1X/EAP (Enterprise)
- Authentication: WPA3-Personal or WPA3-Enterprise
- Status: Current; mandatory on Wi-Fi 6E/7 devices
WEP vs. WPA vs. WPA2 vs. WPA3: Comparison Table
|
Year introduced |
1997 |
2003 |
2004 |
2018 |
|
Encryption cipher |
RC4 |
RC4 (via TKIP) |
AES |
AES |
|
Key size |
64 or 128 bit |
128 bit (TKIP) |
128 bit (AES) |
128 or 192 bit |
|
Key management |
Static, manual |
Dynamic (TKIP) |
PSK or 802.1X |
SAE or 802.1X |
|
Data integrity |
CRC-32 |
MIC (Michael) |
CCMP |
CCMP / GCMP |
|
Authentication modes |
Open / Shared Key |
Personal (PSK) / Enterprise (EAP) |
Personal (PSK) / Enterprise (EAP) |
Personal (SAE) / Enterprise (EAP) |
|
Known exploits |
Crackable in minutes |
TKIP attacks (Beck-Tews) |
KRACK (patched) |
Dragonblood (patched) |
|
Forward secrecy |
No |
No |
No |
Yes |
|
Current status |
Deprecated |
Deprecated |
Widely deployed |
Recommended standard |
WEP vs. WPA: Key Differences
The jump from WEP to WPA was the most dramatic improvement in Wi-Fi security history.
WEP uses a static shared key and relies on the flawed RC4 implementation that attackers can crack in minutes. WPA introduced per-packet key rotation through TKIP and added message integrity checks to detect tampering. WPA also introduced the Enterprise mode with 802.1X/EAP authentication, giving organizations the option to authenticate each user individually through a RADIUS server rather than sharing a single password.
The bottom line: WEP provides no meaningful security. WPA was a needed improvement, but TKIP has its own known weaknesses. Neither protocol should appear on any production network today.
WPA vs. WPA2: Key Differences
WPA2 replaced the RC4-based TKIP cipher with AES-CCMP, a fundamentally stronger encryption algorithm. While WPA and WPA2 both offer Personal and Enterprise modes, WPA2-Enterprise with EAP-TLS (certificate-based authentication) became the standard for organizations that need to verify both device identity and user identity at the point of connection.
WPA2 also handles data integrity more robustly than WPA because it uses CCMP, which authenticates and encrypts in a single operation rather than using the separate MIC calculation that TKIP requires.
WPA2 vs. WPA3: Key Differences
The biggest change from WPA2 to WPA3 is how the initial handshake works. WPA3-Personal replaces PSK with SAE, which eliminates offline dictionary attacks entirely. WPA3-Enterprise adds an optional 192-bit security mode for environments that need CNSA-grade encryption. Forward secrecy, which is absent in WPA2, is built into WPA3, meaning a compromised session key cannot be used to decrypt other sessions.
For enterprise deployments already running WPA2-Enterprise with EAP-TLS, the migration to WPA3-Enterprise is straightforward because the underlying 802.1X and RADIUS infrastructure carries over.
How to Check Your Wi-Fi Security Type
To verify which protocol your network is using, follow these steps:
- Windows 10/11: Open Settings > Network & Internet > Wi-Fi > select your network > Properties. The security type is listed under “Security type.”
- macOS: Hold Option and click the Wi-Fi icon in the menu bar. The Security field shows the protocol.
- iOS/Android: Open Wi-Fi settings, tap the connected network, and look for the security or encryption field.
If you see WEP or WPA (without “2” or “3”), your network is running a deprecated protocol and should be upgraded.
Enterprise Wi-Fi Security: Why WPA2/WPA3-Enterprise with EAP-TLS Wins
For organizations—whether enterprise, higher education, K-12, or healthcare—WPA2-Personal and WPA3-Personal are not sufficient. Both protocols rely on shared passwords, which means a single compromised credential can expose the entire network.
Shared passwords get written on whiteboards, texted to guests, and never rotated. The Enterprise modes solve this problem. Among the EAP methods available, EAP-TLS with certificate-based authentication is the strongest.
Here’s why EAP-TLS outperforms password-based EAP methods like PEAP-MSCHAPv2:
- No credentials to steal. Digital certificates replace passwords entirely. There is nothing for attackers to phish, brute-force, or harvest from a compromised endpoint.
- Mutual authentication. Both the client and the RADIUS server present certificates and verify each other’s identity before any data is exchanged.
- Per-session encryption keys. Each connection negotiates unique keys, limiting the blast radius if any single session is compromised.
- Identity tied to the device. Certificates can be bound to specific hardware, meaning a stolen password alone cannot grant network access.
The challenge with EAP-TLS has always been the overhead of deploying and managing a Public Key Infrastructure (PKI). That’s where a managed, cloud-native PKI eliminates the friction.
How SecureW2 Simplifies Certificate-Based Wi-Fi Authentication
SecureW2 provides the infrastructure to run WPA2/WPA3-Enterprise with EAP-TLS without standing up on-prem PKI or RADIUS servers.
JoinNow Dynamic PKI handles certificate issuance, renewal, and revocation as a fully managed cloud service. It supports modern issuance protocols (ACME Device Attestation and Dynamic SCEP) and integrates with identity providers like Entra ID, Okta, and Google Workspace to pull user and device attributes directly into each certificate.
JoinNow Cloud RADIUS authenticates every connection in real time, performing identity lookups against your IdP on each request. If a user is disabled or a device falls out of compliance, access is revoked immediately—not at the next password rotation.
JoinNow MultiOS gives BYOD users a self-service onboarding flow that configures their device for certificate-based Wi-Fi in a few clicks, with no IT tickets required. For managed devices, gateway APIs handle enrollment silently through Intune, Jamf, Google Workspace, or Kandji.
The entire platform is vendor-neutral. It works with any access point, firewall, MDM, or identity provider. There is no hardware lock-in, and no on-prem servers to maintain.
Schedule your free demo to learn how organizations replace shared Wi-Fi passwords with certificate-based authentication in days, not months.
Frequently Asked Questions
Is WPA better than WEP?
Yes. WPA replaced WEP's static encryption keys with per-packet key rotation (TKIP) and added message integrity checks. WEP can be cracked in minutes with freely available tools; WPA is significantly harder to attack, though it also has known vulnerabilities and should not be used on modern networks.
What is the difference between WPA2-Personal and WPA2-Enterprise?
WPA2-Personal uses a single pre-shared key (PSK) that every device shares. WPA2-Enterprise uses 802.1X authentication with a RADIUS server, allowing each user or device to present unique credentials -- typically a username/password (PEAP) or a digital certificate (EAP-TLS). Enterprise mode is the standard for organizations that need individual accountability and real-time access control.
Should I use WPA2 or WPA3?
Use WPA3 if all your access points and client devices support it. WPA3 adds forward secrecy, stronger handshake security (SAE), and individualized encryption on open networks. If you have older devices that only support WPA2, most access points offer a WPA2/WPA3 transitional mode. For enterprise deployments, WPA2-Enterprise with EAP-TLS already provides strong security and migrates cleanly to WPA3-Enterprise.
Can WPA2 be hacked?
WPA2's KRACK vulnerability (2017) showed that the four-way handshake could be exploited to reinstall encryption keys. Most vendors patched this promptly. WPA2-Enterprise with EAP-TLS is not vulnerable to password-based attacks because there are no passwords to steal. The remaining attack surface is significantly smaller than WPA2-Personal with a weak or reused PSK.
What does AES vs. TKIP mean for my network?
AES (Advanced Encryption Standard) is the block cipher used by WPA2 and WPA3. TKIP (Temporal Key Integrity Protocol) is the older cipher used by WPA, built on top of RC4. AES is faster, stronger, and has no known practical attacks. If your router offers a "TKIP/AES" mixed mode, select AES only, since mixed mode can force connections down to the weaker TKIP cipher.