National Chung Hsing University
Password authentication scheme is one of the simplest and the most convenient authentication mechanisms over insecure networks. It is more frequently required in areas such as computer networks, wireless networks, remote login, operation systems and database management systems. In this paper, the authors survey all related password authentication schemes and classify them with different properties. Previous schemes were vulnerable to various attacks and did not achieve goals of password authentication schemes. In order to compare related password authentication schemes with different properties, they define all attacks and goals of password authentication schemes that an ideal password authentication scheme should withstand and achieve.