elect and respond to one of the following. If you use additional resources, remember to list them at the end of the posting.
Draw a diagram that depicts the key management life cycle. For each phase, include what actions are taken, and what would cause a key to move to another phase. Include how long keys should be valid and what happens when a key is about to expire.
Provide a brief explanation of Elliptic Curve Cryptography, including advantages and disadvantages to its implementation.