That's the way S/KEY works. Each password is a product of successive hashes of the last ones, and you start at the end of the list. That way, an attacker can't derive the next password to be used...