The generation, recording, transcription, distribution, installation, storage, change, disposition, and control of cryptographic keys
Key generation
The selection of the number that is going to be used to tailor
an encryption mechanism to a particular use
Key be randomly chosen and not be disclosed at the time of selection, including information that is used in the key generation processes
-
-
-
-
-
-