What is generally required for encryption?
Deploying encryption generally requires encryption software to generate algorithms, powerful computing capability and expertise for configuring network components and managing keys. As mandatory encryption standards and other security measures become more complex, a central public key management system is typically needed. The volume of encrypted data stored and transported makes it time consuming for individual encryption keys to be used for all senders and receivers. To simplify the process, a public key infrastructure (PKI) system was developed, allowing authorized users to gain access to data and networks once they have received a digital ID and access approval. The Department of Defense has urged more PKI use and less network anonymity.