A Secure Key Management Protocol protects the integrity of cryptographic keys throughout their lifecycle. This protocol implements a set of mechanisms to generate here new keys, store them securely, and distribute them efficiently among authorized parties. The protocol in addition handles key rotation to mitigate the threat of breach. Encrypted Co