To increase the difficulty of cryptographic analysis, which an attack may perform to crack the symmetric cryptographic algorithms, the algorithms and the key are chosen by the slave node, rather than the master node. In this case, each connection between the master node and a slave node can be encrypted in different ways, even for the connection to the same slave node with different user instances.