This is a dedicated watch page for a single video.
To enhance the security of keys used for encryption and authentication, you decide to use a technique that involves entering an initial key into an algorithm to generate an improved key that is resistant to brute-force attacks. Which technique will you use?