A walk through wireless authentication using both WPA/WPA2 PSK and , and a look at where our encryption keys come from.