Skip to main content

Difference Between Static (WEP) and Dynamic (WPA) Wireless Encryption

Wireless LAN reduces the physical work needed to connect each devices in an office using Ethernet cables. All devices with WiFi feature can directly connect to the Wireless router or Access Point. WLAN is easy to setup and maintain compared to traditional LAN. However, with the introduction of WLAN, need of higher security arise. This article explains two important type of Wireless encryption; static and dynamic. WiFi works on the second layer of OSI reference model. So wireless encryption is also done at data link layer. Wireless data transfer is in the form of frames and bothy static and dynamic WiFi security works data link layer. Here we are not going in the details of data frames but we discuss the differences between both static and dynamic technologies by comparing WEP and WAP. WEP is an example of static encryption but WPA uses dynamic encryption.

Static WiFi Encryption


WEP (Wired Equivalent Privacy ) is a static Wireless Encryption to protect WiFi from intruders. Here we set encryption key on Access Point and share the network with computers who know the same key. The key remains constant and that is why this kind of wireless encryption is known as Static Wireless Encryption. Right now WEP is not secure because many weakness make it vulnerable.

Dynamic WiFi Encryption

Dynamic Wireless encryption works in a different concept where the master key is changed during time. Master key the key which is needed to communicate between Access Point and the clients. Even if a hacker captures the key, he will not be able to receive signal contentiously from Access Point since the master key will change with time. WPA (Wi-Fi Protected Access) and WPA2 are examples of this technology.

Differences

Now let us check the differences between these two technologies. Static technology uses the same wireless key to connect and communicate where Dynamic technologies use different set of keys. Now let us compare the working of Wi-Fi Protected Access and Wired Equivalent Privacy. WPA uses preshared key to establish a connection between Access Point and client. After establishing connection, WPA uses a master key generated by TKIP(Temporal Key Integrity Protocol) to communicate further and the key is constantly changed. WEP uses same key all the time. So Dynamic Wireless Encryption is more secure than Static Wireless Encryption.

Different Types of WEP Standards and Risks

WEP protocol uses different standards. WEP 128 and WEP 64 were very popular once. WEP 64 bit standard uses 10 digit hexadecimal key (0 to 9 and A to F) and WEP128 bit encryption uses stronger key. Right now these two protocols are obsolete and most of the users opt for dynamic security standards. There are so many hacking software products claim, they breached WEP protection within minutes. Right now using WEP encryption to protect a WiFi connection is not secure at all.

WPA Standards

WPA and WPA2 are two important dynamic security protocols. WPA (Wi-Fi Protected Access ) is better than Wired Equivalent Privacy. Tow different modes of WPA protocol are WPA-Personal (WPA-PSK ), WPA-Enterprise. Both standards of WPA protocol support these two modes. WPA is strong enough to protect a WiFi network from intruders unless you use Wi-Fi Protected Setup.

Popular Tutorials

  1. No Signals Found in Range

  2. Importance of WDS in Interconnecting two IEEE802.11 Networks

No: Recent Posts
Wireless Network Getting Disconnected
Restart WLAN AutoConfig (WLANSVC Service) On Windows 10
restart WZC on Windows
How to Setup MTNL Broadband ADSL Modem
Setup Idea 4G on Android Phone
Delete Beneficiary Fund Transfer in HDFC Netbanking
Setup Asianet WiFi Router
Manage and Delete Wireless Filters On Windows
Wireless Router Shows Wireless Packet Drops
Setup Log Files for IP Messenger
Wireless N is backward compatible with wireless G
Remote Procedure Call (RPC)
Error 797: A Connection to the Remote Access Server was not Made
How to Reset BSNL WiFi Modem
How to Check Your Tata Photon Plus Internet Usage
Destination Net Unreachable

Comments

Recent Posts

How to Configure Idea 4G & 3G on Android Phone -APN Settings

When you activate Idea GPRS, 4G or 3G Internet on your Android phone, your phone will receive the automatic settings. However, sometimes you may need to configure the Access Point and GPRS settings for Idea (both GSM second and third generation) connection manually on your Android phone. In case if you delete the previous configuration, it is better know how to setup the same settings again by yourself. A wrong Access Point Name can stop you from accessing their mobile broadband service. Otherwise after deleting the existing APN for Idea 3G or GPRS you may need to re-insert the SIM again to get automatic settings from them. If you know the manual configuration steps, you can avoid that hardware procedure. If you are looking for the steps to get maximum speed from Idea 4G, you may click the link below and follow the instructions. The below hack will increase the Idea 4G data transfer speed.


Boost Idea 4G Data Transfer Speed

Steps to Configure Idea 4G/ GPRS/ 3G on Android Click on Applic…

Eligibility and Exam Pattern CBI Officer Recruitment 2017 - Sub Inspector By SSC CGL

To become an officer in Central Bureau of Investigation ( CBI ) is a dream of many youth in India. Though this elite investigation agency is popular among public, many do not know the procedure to join CBI as an officer. This article explains the various criteria, eligibility, exam pattern and procedure to become a CBI officer. Two different agencies conduct examinations to fill vacancies in CBI. They are UPSC and SSC. To become a group A officer in CBI, you must choose Civil Service Examination conducted by UPSC and become an IPS officer. To join as Sub Inspector in CBI, you must go through SSC CGL examination.

Name Of the Post Recruitment Agency Group A OfficerUPSC (Civil Service Examination)Sub InspectorSSC CGL
Where to Apply
If you are dreaming to become an Officer in CBI, you must pass the Combined Graduate Level Examination (CGL ) conducted by Staff Selection Commission (SSC) in every year. You must wait for the next SSC CGL notification and prepare for the same. It is a 4 tier …

Kerala Civil Excise Officer Examination (Women & Men) Notification

Applications to the post Civil Excise Officer ( Trainee) in Kerala Excise Department are invited by Kerala Public Service Commission. It is a district level examination and those who have passed Plus Two or equivalent can apply to only one district. Kerala Excise Department collects Excise Revenue for the state and it is their duty to enforce various Excise Acts. Excise Department is a law enforcement agency and control the manufacturing and distribution of alcohol and other Intoxicating Drugs. Civil Excise Officer is the new name given to Excise Guard and they are the lowest ranking enforcement officers in the department. Excise Guards ( older name of Civil Excise Officer ) are empowered with the power to arrest anyone who committed offence in a public place against the Abkari Acts.
Notification Number Name of The PostLast Date to Apply501/2017 Women Civil Excise Officer 03-Jan-2018 340/2016 Civil Excise Officer 14-Dec-2016 341/2016 Civil Excise Officer (Transfer) 14-Dec-2016
How …

Kerala Government Higher Secondary School Teacher Recruitment

Kerala PSC has invited applications from eligible candidates to recruit Higher Secondary School Teacher for Kerala Higher Secondary Education Department. Vacancies are available for teachers in various subjects and the detailed information is provided in the chart below. Monthly starting salary of Government Higher Secondary School Teacher (Junior) in Kerala Higher Secondary Eduction is 32300-68700/-Indian Rupees. Age limit to apply for Higher Secondary School Teacher post in Kerala for general category is 20 -40 years. Usual upper age relaxation is allowed for candidates belongs to OBC and SC/ST category. Kerala Government Higher Secondary School Teacher Examination detailed syllabus and previous year question papers are updated in the charts below.
Notification NumberName of the Post Last Date to Apply 246/2017Higher Secondary School Teacher (Junior) English20-09-2017 247/2017Higher Secondary School Teacher (Junior) Political Science20-09-2017 248/2017Higher Secondary School Tea…

PING: Transmit failed. General Failure - Reasons and Solution

Yesterday while checking network connectivity, I received one error message while trying to ping loopback address from my Windows computer. The error message I received is "PING: Transmit failed. General Failure" and all the packets send from command prompt were lost. I tried to ping a different loopback address but the result was same. I fixed the issue by following a set of steps and sharing those troubleshooting steps in this tutorial hoping it may help in case if you experience the same error message PING: Transmit failed. General Failure.


Broadband Hack To Improve Speed

This is the output I received when I ping loopback address.

C:\Users\sijugk>ping 172.0.0.21 Pinging 172.0.0.21 with 32 bytes of data: PING: transmit failed. General failure. PING: transmit failed. General failure. PING: transmit failed. General failure. PING: transmit failed. General failure. Ping statistics for 172.0.0.21: Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)


Reasons an…

Modify SBI Inter-Bank Beneficiary For RTGS & NEFT

To complete online money transfer using either RTGS or NEFT in your State Bank of India net banking account, the first step is to add the account details of the person to whom you are sending money. Once the details are added under Inter-Bank Beneficiary list, you can start sending money to his/her account. However, it is possible that you might have entered wrong details while adding the beneficiary details. SBI allows users to either modify or delete a beneficiary if the user find the details incorrect. This article explains how to modify or delete beneficiary on SBI account within few minutes. The same procedure can be followed if you are seeing you have reached the maximum number of beneficiaries in your account while adding a new one.

Step By Step Instructions To Delete Beneficiary in HDFC Bank

Steps to Add a Beneficiary in State Bank Net-banking Account

Visit the SBI Netbanking login Link and enter netbank username and password.

https://retail.onlinesbi.com/retail/logi…