Which of the following encryption methods does PKI typically use to securely protect keys?