Authentication lies at the heart of an application's protection against unauthorized access. If an attacker is able to break an application's authentication function .