WPA

Stands for "Wi-Fi Protected Access."

WPA is a security protocol for creating secure Wi-Fi networks. It was introduced in 2004 to replace the previous security protocol, WEP, due to vulnerabilities in WEP's encryption method. WPA uses 256-bit encryption and is considered the minimum standard for wireless network security, supported by all Wi-Fi-certified devices since 2006. Later generations (WPA2 and WPA3) are even more secure.

WPA uses encryption to protect traffic over wireless networks from eavesdropping. Both sides of a wireless connection need to use the same encryption/decryption key. WEP was vulnerable to eavesdropping because it used the same encryption key for each data packet that traveled over a network. WPA uses a technique called Temporal Key Integrity Protocol (TKIP) to generate a new encryption key for each data packet, making it more secure than WEP.

The WPA specification supports two operation modes: WPA-Personal and WPA-Enterprise. WPA-Personal uses a pre-shared key for encryption; this key also functions as the Wi-Fi network's passphrase. Every device that connects to a WPA-Personal network uses the same passphrase, and changing that passphrase requires every client to update their settings. WPA-Enterprise instead uses an authentication server to validate each user's unique login credentials. A WPA-Enterprise access point generates a new encryption key each time a user connects to the network.

WPA and WPA2 are the most common Wi-Fi security protocols, available in Personal and Enterprise implementations
WPA and WPA2 are the most common Wi-Fi security protocols, available in Personal and Enterprise implementations

The developers of WPA, the Wi-Fi Alliance industry group, intended for devices designed for WEP to receive firmware updates to add support for WPA. Running on the same hardware as WEP limited the computational resources available to WPA encryption. While WPA is more secure than WEP, it is still vulnerable to attacks that can decrypt data packets encrypted using TKIP. Access points designed for WPA2 have more powerful hardware, allowing them to use the more secure Advanced Encryption Standard (AES) encryption method.

Updated June 23, 2023 by Brian P.

quizTest Your Knowledge

The Document Object Model (DOM) creates a logical structure for which type of document?

A
HTML
0%
B
RTF
0%
C
PDF
0%
D
TXT
0%
Correct! Incorrect!     View the DOM definition.
More Quizzes →

The Tech Terms Computer Dictionary

The definition of WPA on this page is an original definition written by the TechTerms.com team. If you would like to reference this page or cite this definition, please use the green citation links above.

The goal of TechTerms.com is to explain computer terminology in a way that is easy to understand. We strive for simplicity and accuracy with every definition we publish. If you have feedback about this definition or would like to suggest a new technical term, please contact us.

Sign up for the free TechTerms Newsletter

How often would you like to receive an email?

You can unsubscribe or change your frequency setting at any time using the links available in each email.

Questions? Please contact us.