From the course: CompTIA Security+ (SY0-701) Cert Prep: 1 General Security Concepts

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

The cryptographic lifecycle

The cryptographic lifecycle

Cryptographic algorithms and the keys used to secure information protected by cryptographic algorithms are among the most important components of any security program. Cybersecurity professionals must have a strong understanding of the cryptographic lifecycle to better select, maintain, and decommission the use of algorithms as the security needs of the organization and the threat environment change. As cryptographic algorithms age, they often become insecure, either because researchers discover flaws in their implementation or because the key length they use becomes vulnerable to brute force attacks. Therefore, it's important to have a lifecycle approach to cryptography that phases algorithms out as they become insecure. The National Institute of Standards and Technology, NIST, offers a five-stage cryptographic lifecycle that organizations should apply to any use of cryptography in their enterprise. Phase 1 is initiation. During this phase, the organization realizes that it needs a…

Contents