encryption
the scrambling of data into a cipher text using a “master key” created from the SSID (service set identifier) of the network and the password
how data is decrypted
data is decrypted by the receiver using the same master key used to encrypt the data so this key is not transmitted
protocols used for encryption
WEP-wired equivalent privacy
WPA-wifi protected access
WPA2-wifi protected access 2