To embark on this update journey, we must first know our starting point. Identifying our current encryption algorithms is crucial because it sets the foundation for all subsequent steps. What algorithms are we using right now, and do they meet today's security expectations? This task is all about introspection and setting the stage for innovation. Potential challenges might include incomplete documentation or outdated versions, but gathering detailed logs and configuration files can remedy these issues. Tools like encryption scanners might be needed here.