How Key Manufacturers Thwart Illegal Copying: A Look at Modern Key Security