The ability to replace cryptographic algorithms, keys, and protocols quickly as threats, standards, and requirements evolve.