Impact factors involved in cryptoperiod computation in key compromise impersonation scenario