Establish cryptographic keys when cryptography is employed within the system in accordance with organization-defined requirements for key generation.