A key management scheme for managing encryption keys in a cryptographic co-processor
includes the first step of selecting a key from one of a symmetrical key type and
an asymmetrical key type. Then, the key bit length is selected. The key is then
generated and, lastly, the key is represented in either an external form or an
internal form.