"These authentication responses are calculated using the secret keys and other information, such as the time of day or random numbers broadcast to all subscribers." . . . . .