Select and respond to one of
the following. If you use additional resources, remember to list them at the end
of the posting.
- Draw a diagram that depicts the key management life cycle. For each phase,
include what actions are taken, and what would cause a key to move to another
phase. Include how long keys should be valid and what happens when a key is
about to expire. - Provide a brief explanation of Elliptic Curve Cryptography, including
advantages and disadvantages to its implementation.