In this guide, we will see what are the differences between the security protocols in the passwords of WIFI networks WEP, WPA, WPA2, and WPA3.

WiFi is currently an essential element in the world of communications. The Internet had a huge impact and, as different communication devices were being manufactured, the need arose to provide a way for these devices to connect to a shared and secure network.

WIFI security is extremely important. It is a common thing to connect a mobile device to a router at any time of the day, be it a smartphone, a tablet, a laptop, or other and there is always a need for more security, that’s where WiFi encryption comes in.

The security settings established in the router define not only how other devices can connect to the network, but also the level of protection which can be established in the Internet connection.

When connected to a network, there is an exchange of information between the device and the server. Security settings will help encrypt this type of information so that your device (tablet, mobile phone, computer) is safe from any attack.

In this order of ideas, there are several types of security available for your wireless or WiFi network: WEP, WPA, WPA2, and WPA3.

Differences between the types of security WEP, WPA, WPA2 and WPA3

Difference between WiFi security password WEP WPA WPA2 and WPA3


These are the wireless network security protocols currently existing: WEP, WPA, WPA2, and WPA3, in which each performs a similar function, but with some differences between them. All were created mainly because of the WiFi networks they don’t have the same wired network security.

In general, wireless networks transmit data within their range of action to each of the addresses linked to it, which makes them very much more exposed than a wired network where they only transmit data from point A to point B.

What is WEP?

This is one of the first security standards for network connections. It is also known as Wired Equivalent Privacy. This type of security has been established mainly for connections via a cable.

The moment the equipment Wifi has started making a presence on the market, this security and privacy configuration started to be developed for wireless networks.

Did he do it? Not at all, the wireless connections who have adopted this configuration have proved highly vulnerable. So it’s not a recommended setting.

Evolution to WPA

It was used as a temporary improvement for what it was the WEP protocol, taking into account the fact that it presented a great deal number failures and problems. That was how the day before that WEP was officially abandoned by the WiFi Alliance, WPA was adopted to start to protect this type of network.

That’s how, thanks to WPA, an improvement in the protection of the system where most of the modern applications WPA used a pre-shared key (PSK), also known as Personal WPA, as well as the time key integrity protocol. or TKIP for data encryption.

Thanks to all this, WPA brought a big improvement over what it was WEP. However, over time and when it has been put to the test and in public demonstrations, even WPA has started to look rather vulnerable to intrusions.

In this way, it was possible to detect that the attacks that most affected the protocol were not those that directly affected it, but those that were carried out in the secure WiFi configuration (WPS), which is a system developed to simplify the connection of equipment to modern access points.

From WPA to WPA2

Secure WiFi access (WPA) is the evolution of the insecure WEP standard. WPA was just a launchpad for WPA2.

This new protocol had a very significant functionality and became the most important improvement. Includes an encryption algorithm “Advanced Encryption Standard”, also known as “AES”, which provides networks with a much higher security index than the previous ones.

In the case of vulnerabilities presented by WPA2, mainly concern the level networks corporate and not directly the network household smaller. Despite everything, attacks through configuration today Secure WiFi WPS continue to have a very high average on WPA and WPA2 protocols.

What is WEP3?

Given the constant improvement of these security protocols, in 2018 WiFi Alliance announces the launch of this protocol which, in its opinion, will improve password security levels and will provide a simpler interface for its configuration.

However, most wireless connections and routers still use WPA2 today and, despite having some vulnerabilities, are still secure.

The latter version released on the market, also known as WiFi Protected Acess (WPA3), appears to have all the tools necessary to provide modern security for wireless networks.

Among the main tools it has included in its system we find brute force protection, in which WPA3 will have the task of protecting each of its users’ passwords, regardless of how weak they are, offering privacy from the public network, It has improved the Internet of Things and offers much more powerful 192-bit encryption.

So far, WPA3 has not reached the entire router market, but it is expected that by the end of 2019 and the beginning of 2020 this protocol will begin to spread across the entire WiFi network market.

Which one to choose?

After the above, we can guarantee that the configuration WPA2 is one of the best you can use if it is a wireless connection in the house, due to the small number of people who can connect to the network, which reduces the risk of attacks.

Therefore, the most recommended is to use WPA2 and don’t use WEP or WPA, since both have one increased vulnerability and you will be more subject to damage or inconvenience.

WPA3 will undoubtedly be one of the best, but it can be said that it is a protocol still under development. This protocol will require that all connections make use of PMF or Protected Managemebeing this an increasing factor privacy protections with additional protection mechanisms, ideal for protecting any type of information or data.

WEP is very easy to stop. You don’t have to use it for any purpose. Also, if you have devices that can only use WEP security, we recommend that you replace them to increase the security of your network.