Part 1:At first glance, the key wrapping approach to encrypting symmetric keys for key management applications seems unnecessarily elaborate. The alternative would be simple encryption using AES or an authenticated encryption using one of the block cipher modes of operation that provides authenticated encryption.
Discuss the relative merits of using one of these approaches compared to key wrapping.