Watch this video on YouTube
Which of the following is NOT a common process for protecting cryptographic keys against brute force attacks?