UK National Cyber Security Centre Recommends Passkeys as Replacement for Passwords
Introduction
The UK's National Cyber Security Centre (NCSC) has issued a revised recommendation advising users to adopt passkeys as the primary method of authentication for digital services, effectively deprecating the use of traditional passwords where passkeys are available. This change reflects an assessment that passwords are insufficiently resilient against contemporary cyber threats.
Main Body
The NCSC's announcement, made on Thursday, marks a deliberate departure from decades of reliance on password-based security. The agency stated that passkeys—a form of passwordless authentication—should be the first choice for consumers across all digital platforms. Passkeys function as a digital credential stored on a user's device, generated through public key cryptography. Unlike passwords, they cannot be stolen via phishing attacks because no secret information is transmitted during login. Instead, authentication is performed at the device level using biometric methods (e.g., facial recognition or fingerprint scanning) or a device PIN. Each passkey is unique to the specific website or application, and even if a service's database is breached, the private key held on the device remains inaccessible to attackers. Adoption of passkeys has been growing across major platforms. Apple, Google, and X already support the technology, and Google reported that just over 50% of its UK users have registered a passkey. The Fido Alliance, an industry association promoting passwordless authentication, stated that passkeys are now supported across all major operating systems, browsers, and by third-party providers. The UK Government also integrated passkeys into its digital services last year. The NCSC acknowledged that it had previously refrained from endorsing passkeys due to implementation challenges and uneven support, but now considers those obstacles largely resolved. Expert commentary on the shift has been measured. Dave Chismon, a senior technical expert at the NCSC, noted that passwords have never been a perfect solution because additional security measures—such as two-factor authentication—increase user burden while remaining vulnerable to phishing. He described passkeys as quicker and simpler for users. Jonathan Ellison, the NCSC's director for national resilience, characterized passkeys as a user-friendly alternative that provides stronger overall resilience and alleviates the cognitive load of remembering passwords. However, some cybersecurity professionals have cautioned that passkeys are not a panacea. Daniel Card of the BCS, the Chartered Institute for IT, observed that losing a device or losing access to it can complicate passkey configuration. Alan Woodward, a professor of cybersecurity at the University of Surrey, noted that while facial recognition has improved with liveness detection, risks remain—for example, a family member or partner knowing a device's PIN. He emphasized that keeping the PIN private is an obvious defense. The NCSC also reiterated broader cybersecurity hygiene recommendations. Where passkeys are not supported, users should employ a password manager to generate and store strong, unique passwords, and enable multi-factor authentication. Other advice includes regularly updating apps and operating systems, avoiding suspicious emails and links, and never reusing passwords across sites. The persistence of weak passwords—such as "123456" and "password"—was highlighted as a continuing vulnerability, underscoring the rationale for transitioning to passkeys.
Conclusion
The NCSC's recommendation represents a significant evolution in authentication strategy, prioritizing passkeys as a more secure and user-friendly alternative to passwords. While not without limitations—such as dependency on device access and the need for broad platform support—the growing adoption by major technology firms and government services suggests a trajectory toward widespread implementation. Users are advised to adopt passkeys where available and to maintain robust cyber hygiene practices in all other contexts.