Cryptographic key-verification techniques

The key-verification implementations described in this document employ several mechanisms for assuring the integrity and value of the key.