Research Article

Password Authentication Based on Fractal Coding Scheme

Table 2

Security comparison of the proposed scheme against some password authentication scheme.

Our proposed methodLamport [2]Hwang and Li’s [4]Lee et al.’s [8]

Guessing attackYesNoNoYes
Replay attackYesNoNoYes
Stolen-verifier attackYesNoYesYes
Denial of service attackYesNoYesYes
Man in the Middle attackYesNoNoNo