Many of the key
distribution methods envisioned involve a high level of manual
intervention during the commissioning of the equipment and
fail to consider the lifetime of the keys. The length of the
key and the algorithm in use determine the length of time it
would require to decrypt sensitive information, and the two
are normally matched to the expected lifetime of the data to
be protected.