Phase: Architecture and Design
Best practices should be used to design cryptographic systems.
Phase: Implementation
Continuously ensuring that cryptographic inputs are supplying valid information is necessary to ensure that the encrypted output is secure.