Discussion Q10
Question # 00008768
Posted By:
Updated on: 02/20/2014 09:09 AM Due on: 02/23/2014
Select and respond to one of the following. If you use additional resources, remember to list them at the end of the posting.
- Draw a diagram that depicts the key management life cycle. For each phase, include what actions are taken, and what would cause a key to move to another phase. Include how long keys should be valid and what happens when a key is about to expire.
- Provide a brief explanation of Elliptic Curve Cryptography, including advantages and disadvantages to its implementation.
-
Rating:
/5
Solution: Elliptic Curve Cryptography