International Journal of Computer Applications
Authentication is a one of the main goal of cryptography. There are many techniques used for authentication but password-based authentication is one of the most convenient technique to verify the legitimacy of a user. Classification of password based authentication can be done into two categories such as hash-based authentication and public-key based authentication. The first well-known hash-based password authentication scheme was proposed by Lamport. Later, overcome the weakness of and proposed a modified scheme. Thereafter, many schemes and improvements on hash-based remote user authentication, have been proposed.