Which of the following authentication methods is considered strong?