!!! Overview
[{$pagename}] refers to the establishment of [Cryptographic Key] material for use with a [Cryptographic] [algorithm] to provide [protocol] security services, especially [integrity], [authentication], and [confidentiality]. 

[{$pagename}] is the management of [Cryptographic Keys] in a [cryptography]. 

[{$pagename}] includes dealing with the:
* [Key Generation] 
* [Key-Exchange]
* [Keystore]
* [Key Usage|KeyUsage] 
* [Key Verification]
* [Key Rotation]
* [Key Revocation]
* [Key Deletion]

[{$pagename}]  includes [Cryptography] [protocol] design.

[{$pagename}] is the more challenging side of [cryptography] in a sense that it involves aspects of Social Engineering such as system [policy], user training, organizational and departmental interactions and coordination between all of these elements, in contrast to pure mathematical practices that can be automated.

!! [Best Current Practice] [BCP 107] is the 
[Best Current Practice] [BCP 107] is Guidelines for Cryptographic Key Management

!! [Key Management Service]
Is a [{$pagename}] [Service]

!! [{$pagename}] [Examples]
* [Public Key Infrastructure] ([PKI])
* [Decentralized Public Key Infrastructure] ([DPKI]) (also called [Decentralized Key Management System] [DKMS])

!! [Key Life cycle]
A key is used differently, depending upon its state in the key’s lifecycle. Key states are defined from a system point-of-view, as opposed to the point-of-view of a single cryptographic module.

[Key Life cycle] is the [{$pagename}] of the [state] of a [Key] as it transitions through the various [states] of the [Life cycle].



!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Key_management|Wikipedia:Key_management|target='_blank'] - based on information obtained 2017-08-01-