"The additional data can include an encryption or decryption key, and data to be encrypted or decrypted or other data required to complete the execution of the crypto packet." . . . . . .