A replay attack prevention technique uses a secret algorithm exchanged
between client and servers computers. The algorithm is used to
periodically alter a special replay key. The replay key may then be used
to alter the message sent or alter the digest appended to the message such
that the message and or its digest varies as time progresses. An
unscrupulous third party who replays a stolen operation message would be
unaware of the replay key and its variation. Any stolen message that is
replayed by the third party would not include the time varying aspect as
expected by the server computer. The server computer would thus be able to
detect the attempted fraud. The secret replay key may be exchanged during
the communication session in an encrypted form, or may be exchanged
earlier.