This Recommendation is intended to identify a set of requirements for secure password-based
authentication protocols with key exchange (SPAK) and define the guidelines for selecting a most
suitable SPAK among various secure password authentication protocols by presenting the criteria
for choosing an optimum SPAK protocol for applications. SPAK can also be used in a wide variety
of applications wherein pre-shared secrets based on the weak password exist.