Negotiating the encryption scheme