!!! Overview [{$pagename}] refers to the establishment of [Cryptographic Key] material for use with a [Cryptographic] [algorithm] to provide [protocol] security services, especially [integrity], [authentication], and [confidentiality]. [{$pagename}] is the management of [Cryptographic Keys] in a [cryptography]. [{$pagename}] includes dealing with the: * [Key Generation] * [Key-Exchange] * [Keystore] * [Key Usage|KeyUsage] * [Key Verification] * [Key Rotation] * [Key Revocation] * [Key Deletion] [{$pagename}] includes [Cryptography] [protocol] design. [{$pagename}] is the more challenging side of [cryptography] in a sense that it involves aspects of Social Engineering such as system [policy], user training, organizational and departmental interactions and coordination between all of these elements, in contrast to pure mathematical practices that can be automated. !! [Best Current Practice] [BCP 107] is the [Best Current Practice] [BCP 107] is Guidelines for Cryptographic Key Management !! [Key Management Service] Is a [{$pagename}] [Service] !! [{$pagename}] [Examples] * [Public Key Infrastructure] ([PKI]) * [Decentralized Public Key Infrastructure] ([DPKI]) (also called [Decentralized Key Management System] [DKMS]) !! [Key Life cycle] A key is used differently, depending upon its state in the key’s lifecycle. Key states are defined from a system point-of-view, as opposed to the point-of-view of a single cryptographic module. [Key Life cycle] is the [{$pagename}] of the [state] of a [Key] as it transitions through the various [states] of the [Life cycle]. !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Key_management|Wikipedia:Key_management|target='_blank'] - based on information obtained 2017-08-01-