The four-way handshake creates a new encryption key that will be used to encrypt all subsequent traffic. After the third message in this handshake, the encryption key is installed, but as Wi-Fi ...