Abstract

Authentication is the process of verifying credentials provided by a user against stored ones to ensure that the claimer is who s/he says they are [1]. Securing user's input is vital to protect the privacy of a user's credentials and to deny any illegal use as result of theft or leakage. Password-based authentication is a commonly used form of authentication and it is the most susceptible type to different kind of attacks. Protecting password using software and hardware measures will enhance the security of authentication and mitigate attacks. Many researches have been conducted in this field and yet the number of successful attacks is in the rise. In this review paper, previous researches will be examined, various kinds of attacks will be analyzed, results will be compared and loopholes/ drawbacks will be discussed.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.