WiFi Alliance announced a new wireless protocol WiFi Protected Access (WPA3). WPA2 is going to be replaced after almost 14 years. WPA2 has long been considered to be insecure due to its common security issue, that is unencrypted open Wi-Fi networks, which allows anyone on the same WiFi network to intercept connections on other devices and see each others stuff.
Keeping in view WiFi Alliance has launched wireless protocol with more security related to encryptions and common easy attacks on previous protocol (WPA2). Individual data encryption is used that encrypts data for each user on the same network, it will reduce the leak of data and informations.
Two flavors were launched this Monday named
WPA3 provides enhanced protection against offline brute-force dictionary attacks, making it harder for hackers to crack your WiFi password even if you choose less complex passwords by using commonly used passwords over and over again.
A new feature named as “Forward Secrecy” is added. WPA3 leverages SAE (Simultaneous Authentication of Equals) handshake to offer forward secrecy, a security feature that prevents attackers from decrypting old captured traffic even if they ever learn the password of a network.
For personal Wi-Fi users, the new security protections will work even if user passwords aren’t highly complex and hard to guess, said Kevin Robinson, the Wi-Fi Alliance’s marketing VP.
WPA3 will also prevent offline attacks against offline, password-guessing attacks. This can happen when an attacker captures data from your Wi-Fi stream, brings it back home and starts cracking it.
With WPA3, attackers can only make a single guess against that offline data before it becomes useless, and for that they’ll have to be in that Wi-Fi range physically to crack it, making it more difficult to crack the password. Because of the limitation of being seen and other hardware limitations make it harder.
This security measure can be implemented at homes and for an enterprise setup as well, because every user will be provided a different password, and would get frequent updates too with a different set of protections.
Connection to this protocol have been made easy but hard for hackers. Well who knows this protocol is still new and its vulnerabilities are still to be found by the hackers out there. Its development will be slow it may take one or two whole years to become common.