


Especially, individuals or home Wi-Fi networks often use a simple key. Offline dictionary or brute force cracking attack: The key complexity of WPA2 is positively correlated with the cracking difficulty. Consequently, victims may reinstall used keys so that attackers crack the user keys to achieve complete access to the user network. An attacker within range of a victim can exploit these weaknesses to using KRACKs. Key Reinstallation Attack (KRACK): Security weaknesses were discovered in 2017, which work against all WPA2-encrypted Wi-Fi networks. WPA2 ensures the security of Wi-Fi networks to some extent, but it also exposes many security risks: To meet application scenarios and security requirements of Wi-Fi networks, WPA2 is classified into WPA2-Personal and WPA2-Enterprise, which use pre-shared key (PSK) and advanced encryption standard (AES), respectively, to encrypt Wi-Fi networks. Before WPA3, WPA2 has been widely used for 14 years. WPA2 is the second-generation Wi-Fi encryption protocol released by the Wi-Fi Alliance in 2004. Based on application scenarios and security requirements of Wi-Fi networks, the following WPA3 modes are available: WPA3-Personal, WPA3-Enterprise, and Opportunistic Wireless Encryption ( OWE ). It introduces a variety of new functions based on WPA2, providing more powerful encryption protection for data transmitted between users and Wi-Fi networks. Wi-Fi Protected Access 3 (WPA3) is a next-generation Wi-Fi ( WiFi ) encryption protocol released by the Wi-Fi Alliance in 2018.
