There are already very good solutions for ensuring that key leakages are very difficult to do and limited in effect.