Describes the process whereby cryptographic keys and initialisation vectors (keying material) are provided for use by two parties and continue to be subject to secure handling procedures until they have been destroyed. Has been divided into sections as follows: One: General, Two: Manual distributionof keying material, Three: Automatic distribution of keying material. Annex A gives an example of the implementation of the requirements for manual distribution of keying material.