The-different-methods-of-key-duplication