11 Sep 2025

Shayype White Paper

Shayype Stand: DSIT Pavilion - Q60/7
Jonathan Craymer
Shayype White Paper
Shayype
h0u5ton123 we have a problem

 



Towards faster, simpler and more secure authentication

 

 

Executive summary

 

If we’re unable to prove who we are (or that we’re authorised to perform an action) then in a world where much of the time we can’t see or hear those we’re dealing with, we’re always going to have major problems and the world – whether we’re dealing with people online, over the phone or face-to-face - will always be fraught with danger.

 

Did we make a serious mistake in trying to phase out the concept of the mentally held secret, at least as far as passwords are concerned, simply because such fixed strings of characters are no longer secure enough and the bad guys can too easily capture and re-use them?

 

This paper is designed to show how re-inventing the mentally held secret might allow us, at long last, to address all the problems which now stem from our inability to securely prove who we are remotely.

 

Cyber criminals are winning

 

We are losing the war against cyber criminals. Glance at any business magazine, website or blog and you will find a string of headlines illustrating the rampant destructiveness of cybercrime, and how it difficult it seems to be to prevent breaches, ransom attacks and others.

 

In 2022 the UK was dubbed The Fraud Capital of the World with national losses exceeding £3bn (https://www.dailymail.co.uk/news/article-10955193/Britain-3bn-fraud-capital-world-Probe-reveals-40m-targeted-scammers-2022.html. Factors like the faster payments system take much of the blame, along with an apparent unwillingness by police to tackle this type of crime.

 

According to McAfee, data breaches, online fraud and other kinds of cyber-crime are costing the world upwards of $1 trillion a year, and CyberCrime News predicts this this will reach $10tn in just four years’ time.

 

Allied to crimes such as ransomware (now becoming “industrialised” and available via the Dark Web as a service on demand) cybercrime continues to be the number one existential threat to businesses and organisations across the world.

 

 

 

 

 

Where did it start to go wrong?

 

Many centuries ago, when most of us lived in small rural communities, everyone knew who everyone else was, and vice versa.

 

The need for more sophisticated authentication only occurred when traders, soldiers and others were required to travel to parts where they were not known personally. Merchants or officials would carry letters of introduction, and Roman soldiers apparently pioneered the use of passwords to prove they were friends, not foes.

 

Technicians developing main-frame computing revived the use of passwords (an idea credited to Fernando Corbato – a computer scientist at the Massachusetts Institute of Technology, in 1960). However, it wasn’t long before experts began to realise that computers were inherently insecure and that because they had not been built with security in mind, the world could have a major problem on its hands with increasing use of computers by the military, government and security critical users.

 

In 1972 a team working for the US Air Force (working alongside the National Security Agency) became extremely concerned. They compiled the 142-page Anderson Report which they published in October that year. It contained an appendix detailing most of the penetration techniques still used today by hackers – written just 51 years ago!

 

Then the Internet arrived, bringing with it the need for mass authentication on a huge scale. Computer experts already using passwords thought the same idea might continue to work for Joe Public, so passwords were adopted as the authentication method of choice for most websites and online applications.

 

The trouble with the huge change in most people’s needs for remote authentication, and the spread of electronic communications across the world, was that it exposed the weaknesses of passwords themselves - the main one being that they could so easily be captured and then reused. Furthermore, they do not offer any degree of confidence that the correct user is involved in the transaction. Hackers were quick to realise that if they could get hold of stolen passwords, they could come and go at will, all the while appearing to be the authorised users. It was like having a copy of a door-key, without the owner’s knowledge.

 

To make matters worse, no doubt with the best of intentions, we made it easy to re-set our passwords if we had forgotten them, usually armed with nothing more secure than our email address. This process has in many cases allowed hackers to lock out genuine users. (Who signed off on that idea?)

How we tried to solve authentication problems

 

To get round the weaknesses of passwords, two factor authentication (or 2FA) was invented in 1977. The term derives from the requirement that the user employ two of three “factors”, namely something you know – e.g. a password; something you have – e.g. a key fob or RFID key; or something you are – e.g. a fingerprint, face recognition etc.

 

This idea worked well for a while. The “key fob” devices (often referred to as  “tokens”) were created by the million. They gave users (usually via little electronic displays) one-time passcodes (OTPs) which typically changed every 60 seconds.

 

The idea of giving users OTPs was initially thought to be good (it’s suggested in the USAF’s Anderson Report – see above) as it did away with the vulnerability of fixed passwords. But it soon became obvious that there were huge down-sides.

 

A something-you-have system (in other words a key-fob or other hardware device) gave rise to the idea that “possession based“ authentication could answer all authentication problems – ignoring the fact that anything a user has, a hacker can get hold of too!

 

Also, two-factor solutions tended to be expensive, meaning that often only a small percentage of an organisation’s employees might have received them – while the bulk of the workforce continued to make do with passwords.

 

Meanwhile for those “lucky” enough to have been issued with a fob, having to ensure it was at hand whenever it was necessary to log in, must have increased the complexity of daily life, and created a huge administration task when batteries failed or units had been lost or damaged, costing even more when new units had to be couriered (often to far flung places) before an employee could resume working.

 

It wasn’t long before key-fobs began to give way to cheaper mobile phone-based 2FA. But these new “soft token” solutions brought their own problems. Some employees objected to using their own phones for work-related tasks, and mobiles were not allowed in certain environments (e.g. medical, scientific, defence, “clean” labs), and if a phone’s battery was down, or there was some other reason a phone could not be used, the employee could not access what he/she needed to.

 

Alongside all this, the idea of “two step” authentication sprang up, where the user would be sent a one-time passcode (OTP) either by text (SMS) or email. This ignores the fact that hackers have become adept at taking over victims’ phones using “SIM swapping” and are equally clever at diverting emails to themselves. Yet despite this, many companies like Microsoft continue to use this method as an alternative to true two-factor (see SIM swap scam - Wikipedia and Ten hackers arrested for string of SIM-swapping attacks against celebrities | Europol (europa.eu)).

 

Biometric solutions (something you are) began to emerge, hailed by many as the long-awaited panacea to all authentication problems. After all, those spending billions of dollars on biometric solutions argued, if it’s your fingerprint/face/voice, it must be you!

 

Despite never being 100% certain it’s you (biometrics are always only a “percentage” match) are such solutions the answer to all authentication problems? Clearly not in many cases. Biometric data can be “spoofed” or stolen.

 

In 2019 the X-Lab group of Chinese “white hat” researchers took fingerprints from drinking glasses and used them to overcome security on users’ smart phones (Hackers Claim ‘Any’ Smartphone Fingerprint Lock Can Be Broken In 20 Minutes (forbes.com.)

 

Admittedly biometric technology is improving all the time, but so are the hackers’ abilities – which means this technology will forever be embroiled in an increasingly high-stakes arms race. And underpinning all this is the dread knowledge that once an individual’s biometric information has been captured, it can never be changed.

 

In 2015 there was a massive data breach involving over 22 million US federal employee records – including the fingerprints of five million (Office of Personnel Management data breach - Wikipedia); and in May 2023 there was a further breach involving 237,000 records at the US Dept of Transportation (Data of 237,000 US government employees breached | Reuters).

 

There are also fears that biometric information is so “personal“ that its recording and use will increasingly infringe civil liberties and data protection regulations. The State of Illinois passed its Biometric Information Privacy Act (BIPA) in 2008, and this has recently (May 2022) been used to prevent New York startup Clearview AI (Chicago Inno - Illinois privacy law thwarts Clearview AI's controversial facial recognition tool (bizjournals.com)) gathering images from Facebook and other sources, without gaining the permission of the individuals concerned.

 

A further piece of US draft legislation (the National Biometric Information Privacy bill) was introduced to the Senate in 2020 and one may only presume it could surface in the future to further challenge the harvesting of biometric data.

 

 

 

Towards a faster, simpler and more secure authentication process

 

Another problem with today’s authentication technology is that it’s only designed to help individuals log into things like websites. It is unable to help someone prove who they are anywhere, any time.  

 

Consider the following scenario. You’re travelling and everything you had on you has been stolen, meaning you have no driver’s licence, passport, phone, computer, money, cards etc. You need to phone a call centre at your bank or travel company to get assistance. How do you prove who you are, without resorting to clunky and often impossible-to-answer questions about last transactions (not a good idea with direct debits), pre-set questions and big data (e.g. which refrigerator you bought ten years ago).

 

It may soon occur to the unfortunate victim that all the methods he/she had previously used to prove identity or authenticate, are now of little use.

 

We propose that we go back to the beginning and perform something of a re-set, using a new “core” technology we have been developing for several years (ShayypeTM) designed to come into play whenever and wherever a strong “who is” element is required.

Shayype is a revolutionary new ingredient technology designed to enable users to confirm their identities in any scenario, often without any extra hardware being required.

In essence it does what many systems have tried to do in the past, namely presenting users with OTPs, but in a neater and more secure way, and without the need for anything to be transmitted.

Codes are “sent” to users concealed in numbered grids surrounded by what appear to be random digits. However authorised users can read the “correct” code by using a mentally held pattern (or more accurately a pre-set Shayype) as a guide.


The Shayype authentication engine

Our aim at this point is to create a cloud-based (or similar) Shayype authentication engine (SAE) which will enable this revolutionary new core technology to be applied to a raft of existing products and services, such as door locks, perimeter security and banking/fintech (think debit/credit cards with OTPs to back up transactions, or even “chip ‘n’ PIN online”).

We believe Shayype has the potential to become the equivalent of “Stripe” (a popular and easily installed global payments solution) for the authentication world. It will be applicable to any system where a grid or matrix display can be shown to the user, and will work via standard browsers (i.e. the Shayype display will appear on the screen of any connected device).

The security of any Shayype-enhanced system will remain high because the secret (unlike passwords or personal information) will never be exposed. Anything that is ever transmitted - for instance an OTP when logging in to something like a website (in place of a fixed password) - will simply be a one-time representation of the user’s secret.

In other words, it will be of no use to a hacker as it will not allow the attacker to reverse-engineer the original pattern secret, which resides only in the user’s head (and nowhere else).

Best of all the Shayype authentication engine unlike previous systems, holds no personal data and there is no file of encrypted passwords for a hacker to steal and re-use or sell on.

The (patent protected) Shayype secret sharing back end retains only part of the information required to “know” the user’s Shayype secret, so it can confirm the user has entered the correct numbers, but never puts the secrecy of the user’s Shayype at risk.

Conclusion

As discussed above, the authentication sector is in disarray. The tech world has so far failed to produce a single solution able to securely prove a user’s identity (or authorisation) in all scenarios.

Passwords as a security measure are well and truly broken, and so-called two factor/two-step authentication as well as biometrics, all suffer from major flaws and additionally clearly are not suitable for authentication of users at scale as they all depend on stealable items.

Shayype has been designed as a new ingredient, able to function as a standalone technology, or to add an invaluable second factor to say biometric solutions.

Better still it may also empower individuals in a way that was simply not possible before, for everything from single sign-on (SSO) to digital signatures.

In addition, it will facilitate a user authenticating him/herself either remotely or face-to face, without giving away any personal details whatsoever (apart from the username - although even this could be a pseudonym etc., bearing no actual relation to the user). Such a discreet use could make it ideal for combatting online harms etc.

Ultimately, we have a vision of Shayype technology being offered by the world’s large public facing websites (Facebook, Twitter, Google etc) helping to free the world from the burden of having to use, store and recall passwords (while avoiding the consequences of fixed passwords falling into the wrong hands!).

We also hope to see Shayype fronting a raft of new “know your customer” (KYC) systems offered (free or at very low cost) to end-users by credit rating agencies and other “identity partners” (IdPs) – like those (such as The Post Office and Digidentity) which used to provide this kind of service alongside the UK Government’s GOV.UK Verify system.

 

 

APPENDICES

 

Appendix 1. Definition of terms

 

This is a (non-exhaustive) list of the main terms used in cyber and identity protection.

 

Password - usually a fixed “string“ of characters assumed to be known only to the authorised user. Unfortunately, as has already been stated above, such character strings can easily be captured and re-used by hackers: figures show that between 80%-90% of online break-ins are related to passwords falling into the wrong hands.

 

Password-less (passwordless) – is a blanket term which has been widely adopted by several companies whose avowed aim is to replace the password with something better. However, many such solutions (e.g. Beyond Identity) are based on the user being in possession of a mobile, and do not answer the question of what happens if the mobile is lost or even falls into the wrong hands. Several (including BI) use “private keys” securely stored within the phone. Microsoft offers a range of “passwordless” options

 

Pass-keys – pretty much the same as passwordless – your mobile or computer confirms it’s you via biometric authentication or an entry PIN. But if you lose your device, you’re stumped.

 

Two-factor – designed to solve the vulnerability issue with fixed passwords by instead giving users a different code every time they need to perform an action. A two-factor set up generally involves a user choosing two out of three “factors” – something you know, something you have or something you are (in other words biometrics such as fingerprints or facial recognition).

 

Two-step (or SMS) verification - a close relative of two-factor, where the second “factor” is typically a mobile assumed to be in the possession of the authorised user, to which a one-time code is sent by text/SMS. This is widely used and is often confused with Two-factor; however, it offers far less protection due to the ease with which hackers can perform “SIM-swap” – whereby they get hold of replacement SIM cards for a user’s phone numbers, meaning they can re-direct security codes to themselves. Security experts acknowledge it is far too easy to walk into a phone shop and claim someone else’s number and create the impression that that phone has been broken/lost.

 

Identity and Access Management (IAM) – systems offered by companies such as ForgeRock, OKTA etc offering authentication as a service (AaaS) based on “knowledge” of the authorised user via several credentials held in a database. One useful feature is Single sign-on (SSO) – see below. Such systems are really intended for the workplace or remote working; they were never designed to replace all passwords en masse.

 

Single sign-on (SSO) – is a feature of secure IAM systems, such that once a user has successfully logged in, he/she can then seamlessly access other (approved) applications (and then log out at the end of the day, removing the risk of applications being accidentally left open).

 

WebAuthn – is a recently introduced API (application protocol interface) designed to allow hardware-based “trusted devices” (such as Yubikey hardware or FIDO2 enabled phones) to be used for logging into websites etc.

 

 

 

Appendix 2. Useful password history references.

 

Password - Wikipedia (Password - Wikipedia)

The Forgotten Origin of Passwords by Yuji Develle (The Forgotten Origin of Passwords | by Yuji Develle | Wonk Bridge | Medium)

A short history of the computer password (A short history of the computer password | WeLiveSecurity)

 

Author: Jonathan Craymer © Shayype Solutions Ltd 2025.

Shayype Solutions Ltd. E info@shayype.com W www.shayype.com. Registered Office Allia Future Business Centre, London Road, Peterborough PE2 8AN. Company Registration Number 15025170. Registered in England and Wales.

Loading