From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

The cryptographic lifecycle

The cryptographic lifecycle

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

The cryptographic lifecycle

- [Instructor] Cryptographic algorithms and the keys used to secure information protected by cryptographic algorithms are among the most important components of any security program. Cybersecurity professionals must have a strong understanding of the cryptographic lifecycle to better select, maintain, and decommission the use of algorithms as the security needs of the organization and the threat environment change. As cryptographic algorithms age, they often become insecure, either because researchers discover flaws in their implementation or because the key length they use becomes vulnerable to brute force attacks. Therefore, it's important to have a lifecycle approach to cryptography that phases algorithms out as they become insecure. The National Institute of Standards and Technology, NIST, offers a five-stage cryptographic lifecycle that organizations should apply to any use of cryptography and their enterprise.…

Contents