Home/ IT/ Passkeys and FIDO2 Passwordless Authentication
IT · Seminar 06 · Logging in without passwords

Passkeys and FIDO2 Passwordless Authentication

Passkeys replace passwords with public-key cryptography bound to your device, defeating phishing and credential theft while making sign-in faster with biometrics.

passkeysFIDO2WebAuthnpasswordlessphishing-resistant

Passwords are the weakest link in security: reused, phished, and stolen in breaches. Passkeys, built on the FIDO2 / WebAuthn standards, replace them with public-key cryptography. There is no shared secret to steal, and authentication is intrinsically phishing-resistant.

Working principle

When you register, your device generates a key pair: the private key never leaves the device (often protected by a secure enclave), and the public key is sent to the service. To sign in, the service issues a random challenge; the device signs it with the private key — unlocked by your fingerprint, face or PIN — and returns the signature, which the service verifies with the stored public key. Because the credential is bound to the site's origin, a fake phishing site cannot trigger it.

Service sends challenge1Device unlocks key (biometric)2Sign challenge w/ private key3Send signature4Server verifies w/ public key5WebAuthn authentication ceremony
Figure 1. Only a signature crosses the network — never a secret. The private key stays on the device and the credential is locked to the legitimate origin.
Table 1. Passwords vs. passkeys
PropertyPasswordPasskey
Shared secretYes (stored on server)No — only public key
PhishingVulnerableResistant (origin-bound)
Breach impactCredentials leakedPublic keys useless alone
UXType / rememberBiometric tap
Why nowSynced passkeys (via platform keychains) solve the old hardware-token problem of device loss, making passwordless practical for consumers — the reason passkeys went mainstream in 2024–2026.

Applications

  • Consumer account sign-in across major platforms
  • Enterprise SSO and phishing-resistant MFA
  • High-assurance access for finance and government

References & further reading

  1. W3C, “Web Authentication (WebAuthn) Level 2,” Recommendation, 2021.
  2. FIDO Alliance, “FIDO2: WebAuthn & CTAP” specifications.
  3. Lyastani et al., “Is FIDO2 the Kingslayer of User Authentication?,” IEEE S&P, 2020.