On request of the main IT management board an audit was performed on the main cryptographic key management infrastructure, including key management procedures, as well as usage and storage of the cryptographic keys. As a result of the recommendations this lead to main improvements of the processĀ and storage of the keys. These crypto techniques are used for pin verification and storage.