Select and respond to one of
the following. If you use additional resources, remember to list them at the end
of the posting.

  1. Draw a diagram that depicts the key management life cycle. For each phase,
    include what actions are taken, and what would cause a key to move to another
    phase. Include how long keys should be valid and what happens when a key is
    about to expire.
  2. Provide a brief explanation of Elliptic Curve Cryptography, including
    advantages and disadvantages to its implementation.