Which phase of the IKE process uses a previously negotiated security association (SA) to encrypt and authenticate?