Chapter 8- Hardware Key Protection