Citation Hunt

The Wikipedia snippet below is not backed by a reliable source. Can you find one?

Click I got this! to go to Wikipedia and fix the snippet, or Next! to see another one. Good luck!

In page Information security:

"

Cryptography can introduce security problems when it is not implemented correctly.[8] Cryptographic solutions need to be implemented using industry-accepted solutions that have undergone rigorous peer review by independent experts in cryptography.[9] The length and strength of the encryption key is also an important consideration.[10] A key that is weak or too short will produce weak encryption.[10] The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information.[11] They must be protected from unauthorized disclosure and destruction, and they must be available when needed.[citation needed] Public key infrastructure (PKI) solutions address many of the problems that surround key management.[3]