passkey
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
passkey [2024.03.04 13:15] – Steve Isenberg | passkey [2024.03.13 05:47] (current) – Steve Isenberg | ||
---|---|---|---|
Line 1: | Line 1: | ||
~~NOCACHE~~ <fc # | ~~NOCACHE~~ <fc # | ||
visits {{counter|today| time| times}} today, {{counter|yesterday| time| times}} yesterday, and {{counter|total| time total| total times}}]</ | visits {{counter|today| time| times}} today, {{counter|yesterday| time| times}} yesterday, and {{counter|total| time total| total times}}]</ | ||
- | |||
- | <fs xx-large> | ||
- | |||
- | Presentation can be just [[https:// | ||
====Passkey vs Password. What's the difference? | ====Passkey vs Password. What's the difference? | ||
- | Password: alpha-numberic-special character sequence, a shared secret. | + | Password: alpha-numberic-special character sequence, a shared secret. |
Passkey: Uses Public Key Cryptology. | Passkey: Uses Public Key Cryptology. | ||
- | [[https:// | + | [[https:// |
+ | |||
+ | The following digested from [[https:// | ||
+ | |||
+ | ===Passwords - shared secret=== | ||
+ | - When you create an account, you choose a password, a '' | ||
+ | - The website uses a math algorithm to encrypt/ | ||
+ | - When you login, you send the password to the website | ||
+ | - The website uses the same math to encrypt/ | ||
+ | - If the two hashes match then you're in | ||
+ | |||
+ | ===Passwords: | ||
+ | * Passwords can be guessed | ||
+ | * Passwords can be seen in transit | ||
+ | * Passwords need to be complex (u/l case, #, special chars) and long so hard to guess | ||
+ | * Some websites may save the password and not the hash (and passwords are compromised in a breech) | ||
+ | * Best to use a password manager to create and store complex passwords different for each website (e.g., BitWarden, 1Password, Dashland, KeePass) | ||
+ | |||
+ | ===Passcodes - use public key cryptology=== | ||
+ | * Each passkey is a pair of keys: a public key and a private key | ||
+ | * These are mathematically linked together | ||
+ | * Public key is given to and stored by the website when you sign up with the website(and it's ok if attacker sees this) | ||
+ | * Private key is never shared | ||
+ | |||
+ | Public info: your public key and the algorithm used (e.g., 3DES, AES, RSA)\\ | ||
+ | f( f(number, public key) , private key) = number\\ | ||
+ | [[https:// | ||
- | ====Using passwords==== | + | ===Signing in using Passcodes=== |
- | - Sign up with a website, eg, buystuff.com | + | - Your device asks website |
- | - Buystuff accepts | + | - Website encrypts some arbitrary number (a '' |
- | - You need to remember | + | - Your device uses your private key to decrypt |
- | - When you log in, you need to send the password to buystuff.com | + | - The website verifies that what you sent in #3 matches |
- | - Buystuff makes sure you entered the correct password and if so lets you in | + | - If there' |
- | ====Using passkeys==== | + | ===Passcodes: What does this mean=== |
- | | + | |
- | | + | |
- | - Your password manager creates a public | + | |
- | | + | * You can have many public-private key pairs (I haven' |
- | | + | |
- | | + | (Argument: passkeys can be guessed. Yes, you can guess a 1024-bit or ~300 digit number given enough time and computing resources. |
- | - Only you can decrypt the message as only you have the private key | + | |
- | | + | |
- | - The website goodstuff.com receives | + | |
===1. Passkey Example=== | ===1. Passkey Example=== | ||
- | Let's try a simple public/ | + | Let's try a simple public/ |
- | * Pick a public | + | * Pick a Public |
- | * Remember, everyone can know the public | + | * Remember, everyone can know the Public |
* Suppose message is 246 | * Suppose message is 246 | ||
- | * Add public | + | * Add Public |
- | * 2+3 = 5 | + | * 2+'' |
- | * 4+5 = 9 | + | * 4+'' |
- | * 6+9 = 5 (drop the carry) | + | * 6+'' |
- | * Thus the encrypted message is 595 | + | * Thus the encrypted message is 595, they send this to you |
- | * You receive the message 595 and decrypt it using your private | + | * Anyone monitoring the communication only sees 595 and even though they know your Public key, they can't decrypt the 595 |
- | * 5+7 = 2 (drop the carry) | + | * You receive the message 595 and decrypt it using your Private |
- | * 9+5 = 4 | + | * 5+'' |
- | * 5+1 = 6 | + | * 9+'' |
- | * and you decrypt | + | * 5+'' |
+ | * and you have decrypted | ||
- | Note this is a simple example. In real life a much larger | + | Note this is a simple example. In real life a much larger |
===2. Live Demonstration=== | ===2. Live Demonstration=== | ||
- | ==2a. Using existing passkey== | + | ==2a. Setting up== |
- | On smi's Muscat, log into Shopify.com using BitWarden | + | We'll assume that you have set up your environment, |
+ | - install Bitwarden, | ||
+ | - create Bitwarden account, | ||
+ | - log into Bitwarden, | ||
+ | - install Bitwarden extension to Firefox. | ||
+ | //Note that Bitwarden has OS requirements and that we are using the free version// | ||
+ | |||
+ | ==2b. Login using an existing passkey== | ||
+ | On smi's Muscat | ||
+ | On smi's Muscat using Firefox, log into Nintendo.com using Bitwarden. | ||
+ | |||
+ | //note that I've only added the BitWarden extension to Firefox on Muscat.// | ||
==2b. Creating passkey== | ==2b. Creating passkey== | ||
- | This from video [[https:// | + | < |
- | - Set up environment once((install Bitwarden, create Bitwarden account, log into Bitwarden, install Bitwarden extension to Firefox. | + | This from video [[https:// |
- Go to Shopify.com | - Go to Shopify.com | ||
- Create account with password. Save to Bitwarden. | - Create account with password. Save to Bitwarden. | ||
Line 65: | Line 98: | ||
- Log out, log in. Select the icon where userID is entered, select Shopify. | - Log out, log in. Select the icon where userID is entered, select Shopify. | ||
- You're logged in. | - You're logged in. | ||
+ | </ | ||
+ | At Nintendo | ||
+ | - In BitWarden, create login for Nintendo(name, | ||
+ | - Go to nintendo.com (the website) | ||
+ | - Sign-up | ||
+ | - Select the login info f/BitWarden | ||
+ | - Get verification email w/code, enter 4-digit code on Nintendo | ||
+ | - Log out, log in using new acct | ||
+ | - Account settings > Sign-in and security settings | ||
+ | - Scroll to Passkey, Edit | ||
+ | - Register a New Passkey | ||
+ | - Follow verification process: Submit to start it | ||
+ | - Enter 6-digit code | ||
+ | - Register | ||
+ | - BitWarden: select the login you just created to save the passkey | ||
+ | Let's try it | ||
+ | - Sign out | ||
+ | - Sign in '' | ||
+ | - BitWarden: select the login you just created to use its saved passkey | ||
+ | You're in. | ||
- | ====Passkey internals -- example==== | ||
- | ===1. Key Generation=== | + | <hidden initialState=" |
+ | this should be hidden | ||
+ | <fs large> | ||
+ | |||
+ | <fs medium> | ||
This is done once, when we sign up with a website. | This is done once, when we sign up with a website. | ||
- Select two large prime numbers, p and q. For simplicity let's use p = 13 and q = 17. | - Select two large prime numbers, p and q. For simplicity let's use p = 13 and q = 17. | ||
Line 83: | Line 139: | ||
and her private key (d, n) which is (77, 221) | and her private key (d, n) which is (77, 221) | ||
- | ===Encryption=== | + | <fs medium> |
Here's how the website uses this passkey to authenticate us. | Here's how the website uses this passkey to authenticate us. | ||
Website wants to send a message to us, with passkey our job is to decode this and return the decrypted message to the website so the website will know we are who we claim. | Website wants to send a message to us, with passkey our job is to decode this and return the decrypted message to the website so the website will know we are who we claim. | ||
Line 89: | Line 145: | ||
Let's say the website encrypts the string " | Let's say the website encrypts the string " | ||
- | | + | The website does: |
+ | | ||
- Using the public key (5, 221), the website computes | - Using the public key (5, 221), the website computes | ||
* H = 8^5 mod 221 = 32768 mod 221 = 119 | * H = 8^5 mod 221 = 32768 mod 221 = 119 | ||
* E = 5^5 mod 221 = 3125 mod 221 = 197 | * E = 5^5 mod 221 = 3125 mod 221 = 197 | ||
+ | * L = 12^5 mod 221 = 248831 mod 221 = 35 | ||
* L = 12^5 mod 221 = 248831 mod 221 = 35 | * L = 12^5 mod 221 = 248831 mod 221 = 35 | ||
* O = 15^5 mod 221 = 759375 mod 221 = 65 | * O = 15^5 mod 221 = 759375 mod 221 = 65 | ||
Line 98: | Line 156: | ||
- | ===Decryption=== | + | <fs medium> |
We receive the encrypted message (119, 197, 35, 35, 65) from the website.\\ | We receive the encrypted message (119, 197, 35, 35, 65) from the website.\\ | ||
we use our private key to decrypt the message using our private key (d, n) = (77, 221)\\ | we use our private key to decrypt the message using our private key (d, n) = (77, 221)\\ | ||
Line 104: | Line 162: | ||
* 119^77 mod 221 = 8 which is 8th letter or H | * 119^77 mod 221 = 8 which is 8th letter or H | ||
* 197^77 mod 221 = 5 which is 5th letter or E | * 197^77 mod 221 = 5 which is 5th letter or E | ||
+ | * 35^77 mod 221 = 12 which is 12th letter or L | ||
* 35^77 mod 221 = 12 which is 12th letter or L | * 35^77 mod 221 = 12 which is 12th letter or L | ||
* 65^77 mod 221 = 15 which is 15th letter or O | * 65^77 mod 221 = 15 which is 15th letter or O | ||
+ | We have decrypted the message to the string HELLO. | ||
We then send the plaintext HELLO back to the website. | We then send the plaintext HELLO back to the website. | ||
Line 111: | Line 171: | ||
In this example, we chose small prime numbers for simplicity, but in practice, much larger prime numbers are used to enhance security. The modulus (n) is derived from the product of these primes, and the public exponent (e) is chosen such that it is coprime to φ(n). The private exponent (d) is calculated using modular arithmetic. This ensures that only the possessor of the private key can decrypt messages encrypted with the corresponding public key. | In this example, we chose small prime numbers for simplicity, but in practice, much larger prime numbers are used to enhance security. The modulus (n) is derived from the product of these primes, and the public exponent (e) is chosen such that it is coprime to φ(n). The private exponent (d) is calculated using modular arithmetic. This ensures that only the possessor of the private key can decrypt messages encrypted with the corresponding public key. | ||
+ | |||
+ | </ | ||
+ | |||
+ | ====Password Managers Supporting Passkeys as of 04 March 2024==== | ||
+ | |||
+ | ^App ^Passkeys | ||
+ | |Bitwarden|Browser only|Free: 2 users, 2 collections, | ||
+ | |1Password|on Android | ||
+ | |Dashlane |yes, mobile only |Free: 1 device at a time, 25 passwords. Paid=" | ||
+ | |KeepassXC|using browser extension|Vault where you want it. 1 user, unlimited collections, | ||
+ | |Apple|requires iOS & iPadOS 16, MacOS 13 or later.|No charge. [[https:// | ||
+ | |Google|yes | ||
====References==== | ====References==== | ||
- | * https:// | + | * [[https:// |
- | * https:// | + | * [[https:// |
- | * https:// | + | * [[https:// |
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// |
passkey.1709586932.txt.gz · Last modified: 2024.03.04 13:15 by Steve Isenberg