Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations. The following are the deliverables for this project: Deliverables Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Enterprise Key Management Policy: A two- to three-page double-spaced Word document. Lab Report: A Word document sharing your lab experience along with screenshots. There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.” When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. Step 1: Identify Components of Key Management Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem. Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care. Review these authentication resources to learn about authentication and the characteristics of key management. Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram. Read these resources on data at rest , data in use, and data in motion . Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed. Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization. Incorporate this information in your key management plan. In the next step, you will consider key management capabilities. Step 3: Identify Key Management Gaps, Risks, Solution s, and Challenges In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care. Conduct independent research to identify typical gaps in key manage.