Generation of the request may utilize any well known algorithm for generating authentication requests, including Secure Hash Algorithm (SHA), or commercially available hashing algorithms such as MD2, MD4 or MD5 available from RSA Data Securities, Inc.