The paper reviews the use of keystroke biometrics for user authentication, detailing three main methods: clustering digraphs (CDG), Hamming distance-like filtering (HDF), and free text with Euclidean distance (FTED). These techniques aim to enhance security by analyzing typing patterns to distinguish legitimate users from imposters while addressing issues of false acceptance and rejection rates. The study emphasizes the importance of improved authentication systems in the face of rising cybersecurity threats associated with password-based methods.