Lisa, a cryptography expert, deployed a method to bolster the security of keys utilized for encryption and authentication. Employing this approach, Lisa fed an initial key into an algorithm that produced a fortified key, resilient against brute-force attacks. What is the technique implemented by Lisa to enhance the security of encryption keys?