title,doi,url,abstract,journal,publication_year,pmid,arxiv Cyber Encryption , https://doi.org/10.32628/IJSRCSEIT, https://ijsrcseit.com/CSEIT194714, The paper talks about the introduction of wireless security modes of unauthorized access and security measures. I intend to explain the generation of protocols used and their pros and cons. I also define the encryption keys that were used in each generation to manipulate security. Finally I conclude with certain protocols and their combinations that are more secured in this generation., International Journal of Scientific Research in Computer Science Engineering and Information Technology, 2019, CSEIT194714