A key management module is utilized to improve efficiency in cryptographic systems.
The key management module may monitor file usage and recommend (and/or implement)
key pair changes. In particular, the key management module may be configured to
periodically examine (or analyze) performance parameters (e.g., number of times
written, number of times read, etc.) associated with a user's files. A network
monitor module may be configured to gather and maintain records of the associated
performance parameters. The key management module may be further configured to
compare the performance parameters of a given file with a table of key level ranges.
The table of key lengths may be configured to provide a listing of multiple key
lengths, each key length corresponding to an activity level of a performance parameter,
e.g., relative read/write access frequency. The key management module may recommend
changing the relative length of the read and write keys based on the comparison
of the performance parameters with the table of key level ranges.