After creating a security key, you should validate the key file to make sure it is not corrupt.

If the validation fails, do the following: