A Secure Key Management Protocol protects the confidentiality of cryptographic keys throughout their lifecycle. This protocol utilizes a set of strategies to create new keys, archive them securely, and distribute them effectively among authorized parties. The protocol in addition tackles key rotation to reduce the risk of violation. Encrypted Comm