Ambimat GroupAmbimatAmbiSecureeSIM InitiativeEngineering BlogAhmedabad · India · Est. 1981
HISTORICAL ARCHIVE · Originally published June 1, 2021
Archive

Is Passwordless the future?

Examines whether passwordless authentication can scale beyond pilots — the standards, attack-surface trade-offs, and operational realities that decide its trajectory.

This is an earlier piece from the AmbiSecure engineering archive. Where the field has moved on, the link above points to current coverage of the same topic.

Passwordless authentication isn't a feature label — it's a different architecture. Instead of comparing user-supplied secrets to a stored hash, the system verifies a hardware-bound credential through public-key cryptography. The question is whether that architecture can scale beyond pilots, and how it sits alongside existing two-factor authentication deployments.

Is Passwordless the future?

Passwords have become an integral part of our lives. Anything and everything that holds our data requires the use of passwords. With growing technology, remote work culture, and the growing number of online accounts, it has become burdensome to remember every password. This forgetfulness has led many to use low-strength passwords that can be breached easily by hackers. Many organizations have begun to realize this and slowly the world is moving to a passwordless digital culture.

The use of passwords cannot be eliminated entirely because it brings a sense of security to the end-user. However, the approach to passwordless culture, although challenging, cannot be ignored. Many IT professionals believe that the future of their organization now relies upon going from password to passwordless for the end-user.

Passwordless Culture the FIDO Way

FIDO, the Fast Identity Online method, provides end-users with a much simpler and risk-free authentication process across many digital devices. FIDO provides strong authentication through cryptographic methods. These credentials are unique and never kept on any server.

Once a user initiates registration on a site, the device they are using creates both a private and public key. Only the public key is registered; authentication is proved with ownership of the private key. This is done by unlocking the device using fingerprint scanning, voice input, or any other multi-factor verification process. This removes phishing and the practice of storing weak data credentials.

Process of going from Password to Passwordless

  • Single-factor authentication based on pictures or patterns. Studies show many individuals can remember this form better than passwords.
  • Biometric authentication — fingerprints, facial recognition, voice input, retina identification.
  • MFA — password combined with another verification (PIN-protected, SMS-based, mobile push, etc.).

FIDO2 Multi-faction Authentication Process

FIDO2 simplifies and secures user authentication. It uses public-key cryptography to protect from phishing attacks and is the only phishing-proof factor available. AmbiSecure helps organizations accelerate to a password-less future by providing support for the FIDO2 protocol. Ambisecure key or card do not require a battery or network connectivity.

About Ambimat Electronics

Close to 4 decades of design experience. Ambimat Electronics is a single-stop solution enabler to leading PSUs, private sector companies, and start-ups. Solutions include AmbiPay, AmbiPower, AmbiCon, AmbiSecure, AmbiSense, AmbiAutomation.

References

  • https://uat.citi.com/commercialbank/insights/assets/docs/Creating_Strong_Passwords_final.pdf
  • https://www.cio.com/article/3598532/why-the-future-is-passwordless.html

Looking for the current take?

This archive piece reflects thinking from June 1, 2021. For a current-generation treatment of the same topic, see our modern coverage.

Read the current article

Browse more historical AmbiSecure writing.

The full archive lists everything we have published, with the modern-equivalent counterpart linked wherever one exists.

Open archive