Chris Kerr answers Designing user authentication protocols