1. IEEE Std 802.11™-2020. IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Section 12.8.2.3, "The 4-way handshake," states: "Message 3... The Authenticator sends this message to the Supplicant. It includes the ANonce and the GTK... The Key Data field is encrypted using the KEK derived from the PTK."
2. Cisco. Understand the 4-Way Handshake in a WPA2-PSK network. (2023). This document details the handshake process, stating for Message 3: "In Message 3, the AP sends the GTK (Group Temporal Key) to the client. The GTK is encrypted by the use of the KEK."
3. Moore, A. W. (2017). Computer Networking, Lecture 16: Wireless Security. University of Cambridge, Department of Computer Science and Technology. Slide 29, "IEEE 802.11i: 4-way handshake," shows the content of Message 3 as "{GTK}KEK", indicating the GTK is encrypted with the KEK. Available at: https://www.cl.cam.ac.uk/teaching/1718/CompNet/slides/lec16.pdf