Skip to main content

What is WPA3?

WPA3 has finally arrived -- and Wi-Fi security is about to get a lot safer

coffee shop wifi
Monkey Business Images/Shutterstock

For years now, the best personal Wi-Fi protection you could enable was known as WPA2 — or the second generation of Wi-Fi Protected Access. It’s a standard network security feature that enables AES encryption through a password.

Now the Wi-Fi Alliance has announced a new security protocol called WPA3, an updated standard that provides more security — and a very timely upgrade in a world that’s increasingly threatened by data hacks and wireless data theft.

Recommended Videos

How WPA works

WPA uses what’s usually called a “handshake” security check system. This handshake is designed to make sure that all the devices involved in the wireless connection are on the same page and working correctly.

In WPA2, that means a four-way handshake between the two client devices connected and the two wireless access points those devices are using to. The WPA2 system takes a look at all these devices and asks, “All right, does everyone have the same password? Good. Now I’m going to encrypt this data as it’s transferred through, and help you decrypt it at the other end when the transfer is complete. Let’s get started.”

The big advantage to this system is that it prevents many casual types of data theft that could otherwise occur—or at least makes them too difficult to be worth the effort. You see, many Wi-Fi hacking attempts use man-in-the-middle hacks or similar approaches that attempt to intercept wireless data as it is being transferred. WPA2 technology encrypts that data during that stage, making it essentially useless to hackers even if they manage to obtain it.

How WPA3 differs from WPA2

ASRock X10 IoT Router
ASRock

WPA2 worked very well for a long time, but it is starting to get a little outdated by the progress of technology, and the latest efforts of determined hackers trying steal your sweet data. WPA3 adds four new features to the encryption process to keep it current.

Better guest access encryption: You know those guest Wi-Fi networks where you sign in and use the internet at a coffee shop or library? They are really unsafe. WPA3 adds what it calls individualized data encryption, which means that your individual connection to an open wireless network will be encrypted, even if that network is not protected by an overarching password. This is a very big and absolutely necessary change.

Updated handshake: The old WPA2 security has been proven vulnerable to hardware-level attacks and password vulnerabilities (using an easy password is still a dumb move). To help prevent new vulnerabilities from affecting WPA, the updated standard uses a new type of handshake that adds extra protection against password-crackers and similar brute force types of hacking.

Better relations with the Internet of Things: WPA2 was primarily designed to work with traditional mobile devices like phones and laptops-devices with screens you could use to input passwords and control wireless settings. But now we have a vast crop of smart devices that don’t have their own screens for inputs, with apps that aren’t really made to manage wireless connections in detail. To make everything much simpler, WPA3 includes new measures to configure security for devices without screens. We don’t know exactly how this is going to work yet, but it probably involves some sort of pairing the way you pair Bluetooth devices or game controllers.

192-bit security suite: What does this mean? Basically, it’s extra-advanced security that uses CNSA (Commercial National Security Algorithm). That means it meets requirements for high-level government work, defense agencies, and super secret industrial projects. Basically, those organizations will be more free to use Wi-Fi networks with the new standard.

How manufacturers get WPA3

Wi-Fi Calling
Simon Hill/Digital Trends

Okay, the real question here is, “When can I, the consumer, have access to this new standard?” The answer depends. WPA3 is a very big upgrade for wireless devices, so it’s not like a simple patch can upgrade all your current devices. Manufacturers will need to build devices from the ground up to comply with WPA3, and they have to include all four major changes to qualify for full WPA certification.

Additionally, a single WPA3 device isn’t going to do you much good. You need end user devices (laptops, phones, etc.) and all access points to also use WPA3 to get useful protection. That’s probably not going to happen for at least several years.

However, the first WPA3 devices, like routers, should be making an appearance in 2018, allowing the conversion process to begin. In the beginning, such routers will no doubt support by WPA3 and WPA2 so devices that use either can connect.

Topics
Tyler Lacoma
Former Digital Trends Contributor
If it can be streamed, voice-activated, made better with an app, or beaten by mashing buttons, Tyler's into it. When he's not…
What is USB 3.1?
Razer Blade Pro 17 review ports 2

Chances are that you’ve already used USB 3.1 in your daily life. USBs (which stands for “Universal Serial Bus”) are a commonly used type of cord to connect two devices, like a PC with a gaming device or camera. So, what sets USB 3.1 apart from other options, like USB 3.2 or USB-C?

Read on to find out the strengths and weaknesses of USB 3.1 and to learn more about technological advancements in current USB innovation.
By the numbers

Read more
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more