Identify the document that defines:
i. Key cryptoperiod(s)
ii. The procedures for periodic key changes at the end of the defined cryptoperiod(s)
Describe how the procedures for periodic key changes at the end of the defined cryptoperiod(s) were observed to be implemented.