Cryptographic key management involves the handling of cryptographic keys and other related security parameters during the entire lifecycle of the keys, including their generation, storage, distribution/establishment, use, and destruction. CKM also includes the policies for selecting appropriate cryptographic algorithms and key sizes, the key-establishment schemes and protocols to utilize and support the generation or distribution of keys, the protection and maintenance of keys and related data, and the integration of key management with cryptographic technology to provide the required type and level of protection required by an organization.