A communication network encrypts a first portion of a transaction
associated with point-to-point communications using a point-to-point
encryption key. A second portion of the transaction associated with
end-to-end communications is encrypted using an end-to-end encryption
key.