A specific encryption transform can be applied to an IKE policy. The supported encryption algorithms are: