A data security device for providing a network transport connection via a
transparent network proxy that employs different encryption security
mediums along a communications session between two endpoints by emulating
one of the endpoints at an intermediate node such that the communication
session appears as an atomic, secure connection to the endpoints yet
provides appropriate security over the end-to-end connection. A sender
node sends a connection request to establish a secure communication
session with an intended receiver node. A transparent proxy on an
intermediate node receives the request and establishes the link employing
an encryption mechanism. The transparent proxy establishes a second link
with the intended receiver, and applies a second, less expensive
encryption mechanism. The transparent proxy combines the two links to
form the trusted, secure connection but incurring only the mitigated
expense over the second link.