Get the latest tech news

The cryptography behind passkeys


This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates.

When you visit a website, the server typically proves its identity through a Transport Layer Security (TLS) certificate authenticated by the Web Public Key Infrastructure (PKI). Examples: iCloud Keychain, Google Password Manager, Windows Hello, 1Password Pros: Convenient, often include cloud backup capabilities Cons: Vulnerable if the device itself is compromised Implementing subresource integrity for code on the web (e.g., storing the hash of all published versions with a trusted third party) and binary transparency techniques (e.g., a publicly verifiable, tamper-evident log) are two promising solutions to this kind of problem.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Passkeys

Passkeys

Photo of cryptography

cryptography

Related news:

News photo

UK rolls out passkeys across Gov.uk services

News photo

Decoding the 90s: Cryptography in Early Software Development (2023)

News photo

New Microsoft login screens emphasize passkeys and "passwordless" authentication