The vulnerability of the authentication method against transmission errors is comparatively low. Only transmission errors beside the transmission of the actual secret are considered here. Although today's communications infrastructure may be widely distributed due to mobile communications networks, there is not necessarily a reliable link, which is why communication between the user and the verifier should be kept to a minimum.