Your data. Your choice.

If you select «Essential cookies only», we’ll use cookies and similar technologies to collect information about your device and how you use our website. We need this information to allow you to log in securely and use basic functions such as the shopping cart.

By accepting all cookies, you’re allowing us to use this data to show you personalised offers, improve our website, and display targeted adverts on our website and on other websites or apps. Some data may also be shared with third parties and advertising partners as part of this process.

Background information

So long, passwords! What exactly are passkeys?

Florian Bodoky
20.10.2023
Translation: Megan Cornish

The FIDO Alliance has developed passkey technology with Google. The aim is to eliminate passwords and make logins more convenient but still more secure. But how exactly does it work?

Instead, you can authenticate yourself on your phone or laptop – including using facial or fingerprint recognition. You’ll then be logged in automatically. Theoretically, you no longer need passwords at all. It’s faster and more convenient than passwords and 2FA. Plus, it’s safer. But how?

## What are passkeys and how do they work?

Because, unlike the password query, it’s not you who sends your password to where you want to log in. It’s the exact opposite: it’s the online service – for example your Google account – that sends a request to the device where your private key is stored. The authenticator on your device has to solve this «challenge».

Once the authenticator has done this, it sends the solved challenge back to the online service. It now decides using the public key that: «The task was solved correctly, so the recipient had the correct key. Access granted.» In doing so, you have essentially proven that you are who you say you are and that you have the key, without revealing exactly what your private key is made up of.

You can determine exactly what the authenticator on your device is. It could be a master password, a PIN, a pattern on your smartphone’s touchpad, or simply your fingerprint or facial recognition. This depends on what’s supported by the device where the key is stored.

The basis for passkeys: FIDO2

Passkeys are an extension of FIDO2. Maybe you’ve already heard of it. FIDO2 was also developed by the FIDO Alliance and the World Wide Web Consortium (W3C). It consists of two «ingredients»:

  1. Client to Authenticator Protocol (CTAP2).
  2. WebAuthentication standard API (WebAuthn).

Put simply, CTAP2 ensures that the hardware authenticator – e.g. a security token such as Yubikey – and the browser can communicate securely with each other. CTAP2 supports USB, Bluetooth and NFC. This restricts the private key to one device. I’ll get to that in a moment.

WebAuthn, meanwhile, is an interface responsible for communication between an authenticator and the online service you want to log into. If an online service supports Webauthn, you can log in using the key principle explained above.

A practical example: Apple

Apple, for example, has implemented passkeys in its Keychain (since macOS Ventura and iOS/iPadOS 16). If you have activated login via passkey for a service, such as your Google account, logging in works on your Mac, your iPhone or your iPad – provided you use the same Apple ID for all Apple devices. So, as soon as you’ve started up your Mac with the password, the private key is active.

On iPhones, the authenticator can also be facial recognition. Once you’ve completed this when unlocking your iPhone, you can log in to Google in your smartphone’s browser without a password. Smartphones – regardless of whether they’re Android (from Android 9) or iOS – also offer an additional function.

You can use them as an authenticator device to log in to another device. For example, if you’re at a friend’s house and want to log in to your Google account on their PC, you can do this using the authenticator on your phone (because that’s where the private key is stored).

How do they differ from passwords?

Passkeys and passwords have a completely different approach. While passkeys work as described above, passwords are stored in the respective services’ databases, albeit encrypted. If you enter the password together with the username, the online service compares this information. If they’re identical, you’ll be granted access.

As your private key is never transmitted with passkeys, it can’t be intercepted or stolen from the online service.

Or you can activate the two-factor authentication process, where you confirm that you are really you using an authentication app or SMS code. This is quite complicated and sometimes error-prone. For example, if you enter the 2FA code incorrectly, you have to repeat the process. Passkeys don’t just solve the problem of a lack of security. They also simplify and speed up the registration process for online services.

Which services support passkeys?

Header image: Shutterstock

308 people like this article


User Avatar
User Avatar

I've been tinkering with digital networks ever since I found out how to activate both telephone channels on the ISDN card for greater bandwidth. As for the analogue variety, I've been doing that since I learned to talk. Though Winterthur is my adoptive home city, my heart still bleeds red and blue. 


Background information

Interesting facts about products, behind-the-scenes looks at manufacturers and deep-dives on interesting people.

Show all

These articles might also interest you

  • Guide

    Digital legacy – what happens to your online data after you die

    by Florian Bodoky

  • Background information

    NeuralHash: Apple responds to questions about privacy

    by Dominik Bärlocher

  • Background information

    Apple NeuralHash vs. privacy – Pandora’s box is opened

    by Dominik Bärlocher