{"id":10570,"date":"2011-05-05T00:00:00","date_gmt":"2011-05-05T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/wi-fi-protected-access-ii\/"},"modified":"2011-08-18T17:21:32","modified_gmt":"2011-08-18T17:21:32","slug":"wi-fi-protected-access-ii","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2","title":{"rendered":"Wi-Fi Protected Access II"},"content":{"rendered":"

What Does Wi-Fi Protected Access II Mean?<\/span><\/h2>\n

Wi-Fi Protected Access II (WPA2) is a security standard to secure computers connected to a Wi-Fi network. Its purpose is to achieve complete compliance with the IEEE802.11i standard, only partially achieved with WPA, and to address the security flaw in the 128-bit \u201ctemporary key integrity protocol\u201d (TKIP) in WPA by replacing it with CCMP.<\/p>\n

The term is also referenced as Wi-Fi Protected Access 2.<\/p>\n

Techopedia Explains Wi-Fi Protected Access II<\/span><\/h2>\n

Wi-Fi Protected Access (WPA) and WPA2 are concurrent security standards. WPA addressed the majority of the IEEE 802.11i standard; and the WPA2 certification achieved full compliance. However, WPA2 will not work with some older network cards, thus the need for concurrent security standards.<\/p>\n

Applicable to both WPA and WPA2, there are two versions targeting different users:<\/p>\n

    \n
  • WPA-Personal was developed for home and small office use and requires no authentication server; and each wireless device uses the same 256-bit authentication key.<\/li>\n
  • WPA-Enterprise was developed for large businesses and requires a RADIUS authentication server that provides automatic key generation and authentication throughout the entire enterprise.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"

    What Does Wi-Fi Protected Access II Mean? Wi-Fi Protected Access II (WPA2) is a security standard to secure computers connected to a Wi-Fi network. Its purpose is to achieve complete compliance with the IEEE802.11i standard, only partially achieved with WPA, and to address the security flaw in the 128-bit \u201ctemporary key integrity protocol\u201d (TKIP) in […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,220],"class_list":["post-10570","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-wireless-and-mobile"],"acf":[],"yoast_head":"\nWhat is Wi-Fi Protected Access II (WPA2)? - Definition from Techopedia<\/title>\n<meta name=\"description\" content=\"This definition explains the meaning of Wi-Fi Protected Access II and why it matters.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wi-Fi Protected Access II\" \/>\n<meta property=\"og:description\" content=\"This definition explains the meaning of Wi-Fi Protected Access II and why it matters.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:modified_time\" content=\"2011-08-18T17:21:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\"},\"author\":{\"name\":\"Margaret Rouse\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5\"},\"headline\":\"Wi-Fi Protected Access II\",\"datePublished\":\"2011-05-05T00:00:00+00:00\",\"dateModified\":\"2011-08-18T17:21:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\"},\"wordCount\":184,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#respond\"]}],\"articleSection\":\"\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\",\"url\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\",\"name\":\"What is Wi-Fi Protected Access II (WPA2)? - Definition from Techopedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"datePublished\":\"2011-05-05T00:00:00+00:00\",\"dateModified\":\"2011-08-18T17:21:32+00:00\",\"description\":\"This definition explains the meaning of Wi-Fi Protected Access II and why it matters.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wireless and Mobile\",\"item\":\"https:\/\/www.techopedia.com\/topic\/6\/wireless-and-mobile\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Term\",\"item\":\"https:\/\/www.techopedia.com\/definition\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Wi-Fi Protected Access II\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"width\":209,\"height\":37,\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5\",\"name\":\"Margaret Rouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg\",\"caption\":\"Margaret Rouse\"},\"description\":\"Margaret is an award-winning writer and educator known for her ability to explain complex technical topics to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles in the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret\u2019s idea of \u200b\u200ba fun day is to help IT and business professionals to learn to speak each other\u2019s highly specialized languages.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/margaretrouse\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/@techdefinitions\"],\"knowsAbout\":[\"Technology expert\"],\"url\":\"https:\/\/www.techopedia.com\/contributors\/margaret-rouse\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Wi-Fi Protected Access II (WPA2)? - Definition from Techopedia","description":"This definition explains the meaning of Wi-Fi Protected Access II and why it matters.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2","og_locale":"en_US","og_type":"article","og_title":"Wi-Fi Protected Access II","og_description":"This definition explains the meaning of Wi-Fi Protected Access II and why it matters.","og_url":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_modified_time":"2011-08-18T17:21:32+00:00","twitter_card":"summary_large_image","twitter_site":"@techopedia","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2"},"author":{"name":"Margaret Rouse","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5"},"headline":"Wi-Fi Protected Access II","datePublished":"2011-05-05T00:00:00+00:00","dateModified":"2011-08-18T17:21:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2"},"wordCount":184,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#respond"]}],"articleSection":""},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2","url":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2","name":"What is Wi-Fi Protected Access II (WPA2)? - Definition from Techopedia","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"datePublished":"2011-05-05T00:00:00+00:00","dateModified":"2011-08-18T17:21:32+00:00","description":"This definition explains the meaning of Wi-Fi Protected Access II and why it matters.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/definition\/24488\/wi-fi-protected-access-ii-wpa2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Wireless and Mobile","item":"https:\/\/www.techopedia.com\/topic\/6\/wireless-and-mobile"},{"@type":"ListItem","position":3,"name":"Term","item":"https:\/\/www.techopedia.com\/definition"},{"@type":"ListItem","position":4,"name":"Wi-Fi Protected Access II"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","width":209,"height":37,"caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5","name":"Margaret Rouse","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg","caption":"Margaret Rouse"},"description":"Margaret is an award-winning writer and educator known for her ability to explain complex technical topics to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles in the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret\u2019s idea of \u200b\u200ba fun day is to help IT and business professionals to learn to speak each other\u2019s highly specialized languages.","sameAs":["https:\/\/www.linkedin.com\/in\/margaretrouse\/","https:\/\/x.com\/https:\/\/twitter.com\/@techdefinitions"],"knowsAbout":["Technology expert"],"url":"https:\/\/www.techopedia.com\/contributors\/margaret-rouse"}]}},"_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition\/10570"}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/definition"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7813"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=10570"}],"version-history":[{"count":1,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition\/10570\/revisions"}],"predecessor-version":[{"id":313158,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition\/10570\/revisions\/313158"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=10570"}],"wp:term":[{"taxonomy":"definitioncat","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definitioncat?post=10570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}