The IT Law Wiki
Advertisement

A cryptographic key lifecycle includes all the phases associated with a cryptographic key between the time it is generated and it is destroyed. These include: key generation, key distribution, key storage, key usage, key replacement, key revocation, key deletion/key zero-ing, key expiry, key update, etc.

Advertisement