. One time password system is based on the tollowing challenge-response protocol. System stores maximum number of authentications n, number of next authentication i, last correctly supplied password p;-1 Username System User U ser System Pi System U ser The passwords pi, p2, . . . , Pn are computed using a a public cryptographic hash function H (e.g., it can be SHA-3) where k is a shared secret between the User and System, and i times (a) If
OR
OR