This section provides the steps for using an operational key, and also demonstrates key rolling effective countermeasures against differential power analysis (DPA).