Story Details

  • The Cryptography Behind Passkeys

    Posted: 2025-05-14 11:22:39

    Passkeys leverage public-key cryptography to enhance login security. Instead of passwords, they utilize a private key stored on the user's device and a corresponding public key registered with the online service. During login, the device uses its private key to sign a challenge issued by the service, proving possession of the correct key without ever transmitting it. This process, based on established cryptographic principles and protocols like WebAuthn, eliminates the vulnerability of transmitting passwords and mitigates phishing attacks, as the private key never leaves the user's device and is tied to a specific website. This model ensures only the legitimate device can authenticate with the service.

    Summary of Comments ( 78 )
    https://news.ycombinator.com/item?id=43983159

    Hacker News users discussed the practicality and security implications of passkeys. Some expressed concern about vendor lock-in and the reliance on single providers like Apple, Google, and Microsoft. Others questioned the robustness of the recovery mechanisms and the potential for abuse or vulnerabilities in the biometric authentication process. The convenience and improved security compared to passwords were generally acknowledged, but skepticism remained about the long-term viability and potential for unforeseen issues with widespread adoption. A few commenters delved into the technical details, discussing the cryptographic primitives used and the specific aspects of the FIDO2 standard, while others focused on the user experience and potential challenges for less tech-savvy users.