11 Sept 2025

Shayype White Paper

Shayype Stand: DSIT Pavilion - Q60/7
Jonathan Craymer
Shayype White Paper
Shayype
h0u5ton123 we have a problem

 



Towards faster, simpler and more secure authentication

 

 

Executive summary

 

If we’re unable to prove who we are (or that we’re authorised to perform an action) then in a world where much of the time we cannot see or hear those we’re dealing with, we’re always going to have major problems.

 

Whether we’re dealing with people online, over the phone or face-to-face, both the  digital and the real worlds will always be fraught with danger. We as individuals will always be “one down” with the playing field sloping the wrong way! With the bad guys getting it all their own way.

 

Did we make a serious mistake in trying to phase out the concept of the mentally held secret (at least as far as passwords are concerned) simply because such fixed strings of characters were no longer considered secure enough, as they could be too easily captured and re-used?

 

This paper is designed to show how re-inventing the mentally held secret will allow us (at long last?) to address all the problems which now stem from our inability to securely prove who we are remotely- using a new-style mentally-held secret.

 

Cyber criminals are winning

 

We are losing the war against cyber criminals. Glance at any business magazine, website or blog and you will find a string of headlines illustrating the rampant destructiveness of cybercrime, and how it difficult it seems to be to prevent breaches, ransom attacks and others. Large car makers and retailers who must have all the security resources they could possibly need at their disposal, are suffering crippling disruption

 

In 2022 the UK was dubbed The Fraud Capital of the World with national losses exceeding £3bn (https://www.dailymail.co.uk/news/article-10955193/Britain-3bn-fraud-capital-world-Probe-reveals-40m-targeted-scammers-2022.html. Factors like the faster payments system take much of the blame, along with an apparent unwillingness by police to tackle this type of crime.

 

According to McAfee, data breaches, online fraud and other kinds of cyber-crime are costing the world upwards of $1 trillion a year, and CyberCrime News predicts this this will reach $10tn this year (2025).

 

Allied to crimes such as ransomware (now becoming “industrialised” and available via the Dark Web as a service on demand) as well as “business email compromise” (or BEC) cybercrime continues to be the number one existential threat to businesses and organisations across the world.

 

Where did it start to go so wrong?

 

Many centuries ago, when most of us lived in small rural communities, everyone knew who everyone else was, and vice versa.

 

The need for more sophisticated authentication only occurred when traders, soldiers and others were required to travel to parts where they were not known personally. Merchants or officials would carry letters of introduction, and Roman soldiers apparently pioneered the use of passwords to prove they were friends, not foes.

 

Technicians developing main-frame computing revived the use of passwords (an idea credited to Fernando Corbato – a computer scientist at the Massachusetts Institute of Technology, in 1960). However, it wasn’t long before experts began to realise that computers were inherently insecure and that because they had not been built with security in mind, the world could have a major problem on its hands with increasing use of computers by the military, government and security critical users.

 

In 1972 a team working for the US Air Force (working alongside the National Security Agency) became extremely concerned. They compiled the 142-page Anderson Report which they published in October that year. It contained an appendix detailing most of the penetration techniques still used today by hackers – written a mere 53 years ago!

 

Then the Internet arrived, bringing with it the need for mass authentication on a massive scale. Computer experts already using passwords thought the same idea might continue to work for Joe Public, so passwords were perhaps unwisely adopted as the authentication method of choice for most websites and online applications.

 

The trouble with the huge change in most people’s needs for remote authentication, and the spread of electronic communications across the world, was that it exposed the weaknesses of passwords themselves - the main one being that they could so easily be recorded and reused. Furthermore, they do not offer any degree of confidence that the correct user is involved in the transaction. Hackers were quick to realise that if they could get hold of stolen passwords, they could pretend to be the ”real” user, and worse they come and go at will. It was like having a copy of a door-key, without the owner’s knowledge.

 

To make matters worse, no doubt with the best of intentions, we made it easy to re-set our passwords if we had forgotten them, usually armed with nothing more than our email addresses. This process has in many cases become a favourite hackers’ tool, allowing them to lock out genuine users. (Who signed off on that idea?)

 

How we tried to solve authentication problems

 

To get round the weaknesses of passwords, so-called two factor authentication (2FA) was invented in 1977. The term derives from the requirement that the user employ two of three “factors”, namely something you know – e.g. a password; something you have – e.g. a key fob, RFID key or physical device with a passkey; or something you are – e.g. a fingerprint, face recognition etc.

 

This idea worked well for a while. The “key fob” devices (often referred to as “tokens”) were created by the million. They gave users (usually via little electronic displays) OTPs which typically changed every 60 seconds.

 

The idea of giving users OTPs was initially thought to be good (it’s suggested in the USAF’s Anderson Report – see above) as it did away with the vulnerability of fixed passwords. But it soon became obvious that there were huge down-sides.

 

A something-you-have system (in other words a key-fob or other hardware device) gave rise to the idea that “possession-based“ authentication could answer all the problems outlined above – ignoring the fact that anything a user has, a hacker can steal!

 

Also, two-factor solutions tended to be expensive, meaning that often only a small percentage of an organisation’s employees might have received them, while the bulk of the workforce typically made do with passwords.

 

Meanwhile for those “lucky” enough to have been issued with a fob, having to ensure it was at hand whenever it was necessary to log in, must have increased the complexity of daily life, and created a huge administration task when batteries failed or units had been lost or damaged, costing even more when new units had to be couriered (often to far flung places) before an employee could resume working.

 

It wasn’t long before key-fobs began to give way to cheaper mobile phone-based 2FA. But these new “soft token” solutions brought their own problems. Some employees objected to using their own phones for work-related tasks, and mobiles were not allowed in certain environments (e.g. medical, scientific, defence, “clean” labs), and if a phone’s battery was flat, or there was some other reason a phone could not be used, the employee could not access what he/she needed to.

 

Alongside all this, the idea of “two step verification” became popular, where the user is sent an OTP by text/SMS or email. This ignored the fact that hackers had become adept at taking over victims’ phones using “SIM swapping” and are equally clever at diverting emails to themselves. Yet despite this, many companies like Microsoft continued to use this method as an alternative to true two-factor (see SIM swap scam - Wikipedia and Ten hackers arrested for string of SIM-swapping attacks against celebrities | Europol (europa.eu)). It remains, bafflingly, something of an industry standard.

 

Biometric solutions (something you are) began to gain popularity, hailed by many as the long-awaited panacea to all authentication problems. After all, those spending billions of dollars on biometric solutions argued, if it’s your fingerprint/face/voice, it must be you!

 

But despite never being 100% certain it’s you (biometrics only offer a “percentage” match) are such solutions the answer to all authentication problems? Clearly not in many cases, as biometric data can so easily be “spoofed” or stolen.

 

In 2019 the X-Lab group of Chinese “white hat” researchers took fingerprints from drinking glasses and used them to overcome security on users’ smart phones (Hackers Claim ‘Any’ Smartphone Fingerprint Lock Can Be Broken In 20 Minutes (forbes.com.)

 

Admittedly biometric technology is improving all the time, but so are the hackers’ abilities – which means this technology will forever be embroiled in an increasingly high-stakes arms race. And underpinning all this is the dread knowledge that once an individual’s biometric information has been captured, it can never be changed. (Begging the question: how will such individuals cope thereafter?)

 

In 2015 there was a massive data breach involving over 22 million US federal employee records – including the fingerprints of five million (Office of Personnel Management data breach - Wikipedia); and in May 2023 there was a further breach involving 237,000 records at the US Dept of Transportation (Data of 237,000 US government employees breached | Reuters).

 

There are also fears that biometric information is so “personal“ that its recording and use will increasingly infringe civil liberties and data protection regulations. The State of Illinois passed its Biometric Information Privacy Act (BIPA) in 2008, and this has more recently (May 2022) been used to prevent New York startup Clearview AI (Chicago Inno - Illinois privacy law thwarts Clearview AI's controversial facial recognition tool (bizjournals.com)) gathering images from Facebook and other sources, without gaining the permission of the individuals concerned.

 

A further piece of US draft legislation (the National Biometric Information Privacy bill) was introduced to the Senate in 2020 and one may only presume it could surface in the future to further challenge the harvesting of biometric data.

 

Towards a faster, simpler and more secure authentication process

 

Another problem with today’s authentication technology is that it’s only designed to help individuals log into things like websites or networks, and is often mainly “work” related. It is unable to help someone prove who they are anywhere, any time - and that’s the problem we’re trying to solve. XXXX  

 

Consider the following scenario. You’re travelling and everything you had on you has been stolen, meaning you have no driver’s licence, passport, phone, computer/tablet, money, cards etc. You need to phone a call centre at your bank or travel company to get assistance. How do you prove who you are, without resorting to clunky and often impossible-to-answer questions about last transactions (not a great idea with direct debits), pre-set questions and big data (e.g. which refrigerator you bought ten years ago).

 

It may soon occur to the unfortunate victim that all the methods he/she had previously used to prove identity or authenticate, are now of little use.

 

We propose that we go back to the beginning and perform something of a re-set, using a new “core” technology we have been developing for several years (ShayypeTM) designed to come into play whenever and wherever a strong “who is” element is required, which at the same time is far more difficult to steal, as it is never exposed in use, and the secret itself resides in the user’s head.Shayype is a revolutionary new ingredient technology designed to enable users to confirm their identities in any scenario, often without any extra hardware being required (but able where required to work with devices like phones).

In essence it does what many systems have tried to do in the past, namely presenting users with OTPs, but in a neater and more secure way, and without the need for anything to be transmitted. Codes are “sent” to users concealed in numbered grids surrounded by what appear to be random digits. However authorised users can read the “correct” code by using a mentally held pattern (or more accurately a pre-set Shayype) as a guide.

The “Stripe” of authentication

Our aim at this point is to create a cloud-based (or similar) Shayype authentication engine (SAE) which will enable this revolutionary new core technology to be applied to a raft of existing products and services, such as door locks, perimeter security and banking/fintech (think debit/credit cards with OTPs to back up transactions, or even “chip ‘n’ PIN online”).

We believe Shayype has the potential to become the equivalent of “Stripe” (a popular and easily installed global payments solution) for the authentication world. It will be applicable to any system where a grid or matrix display can be shown to the user and will work via standard browsers (meaning the Shayype display will appear on the screen of any connected device).

The security of any Shayype-enhanced system will be higher than anything which went before, because the secret (unlike passwords or personal information) will never be exposed. Anything that is ever transmitted - for instance an OTP when logging in to something like a website (in place of a fixed password) - will simply be a one-time representation of the user’s secret.

In other words, it will be of no use to a hacker as it will not allow reverse-engineering of the original pattern secret, which resides only in the user’s head (and nowhere else).

Best of all the Shayype authentication engine unlike previous systems, holds no personal data and there is no file of encrypted passwords for a hacker to steal and re-use or sell on.

The (patent protected) Shayype secret sharing back end retains only part of the information required to “know” the user’s Shayype secret, so it can confirm the user has entered the correct numbers but never puts the secrecy of the user’s Shayype at risk.

Is it two-factor?

The answer to this question is “yes” – but in two ways.

On its own Shayype works without any devices, meaning it could get you out of trouble if you were miles from home and your phone was lost or broken, so you couldn’t use facial recognition to prove who you were.

However, many regulations (such as the European Banking Authority’s “Payment Services Directive 2” [“PSD2”]) require end-users to have in their possession a second device – satisfying any needs for what the regulations call two factor - and for this reason we will offer an app. This will appear on the user’s phone whenever they need to log in or make a purchase. All the user will need to do to complete a two-factor verification is to extract a one-time passcode (OTP) from the Shayype numbered grid on the phone, and then enter it into the main device.

This will however have the huge advantage over conventional codes-via-SMS in that at no time will the OTP be sent as plain text (as happens at the moment), and only the right user will be able to extract the correct digits. So even if a user’s phone account falls into the wrong hands (by “SIM-swapping” etc) all the attackers will receive is a meaningless numbered grid.

So yes, Shayype can be take the place of a second device or use a phone in the mix. Whichever is required. Either way security and convenience will be increased.

Conclusion

As discussed above, the authentication sector is in disarray. The tech world has so far failed to produce a single solution able to securely prove a user’s identity (or authorisation) in all scenarios.

Passwords as a security measure are well and truly broken, and so-called two factor/two-step authentication as well as biometrics, all suffer from major flaws and additionally clearly are not suitable for authentication of users at scale as they all depend on stealable items.

Shayype has been designed as a new ingredient, able to function as a standalone technology, or using a separate phone app, or to add an invaluable second factor to existing technologies like biometrics.

Better still Shayype may also empower individuals in a way that was simply not possible before, for everything from single sign-on (SSO) to digital signatures.

Shayype the future

The online world has often been referred to as a “Wild West” as anyone can lie about their true identity, as well as their age and other attributes.

Our aim is to see Shayype allowing users to authenticate themselves either remotely or face-to face, without (crucially) having to give away any personal details whatsoever (apart from a username - although even this could be a pseudonym etc., bearing no actual relation to the user).

The world would be far safer if everyone, including private individuals could know who they’re talking to online (or face-to-face) using IdP accounts. Take for instance serial online sex abuser and blackmailer Matthew Falder (Matthew Falder - Wikipedia). Falder lured teenage girls into sending compromising pictures, pretending to be a woman called Liz, claiming “she” needed pictures for her life-drawing hobby to aid her nerves. Had those who responded to “Liz” been able to ask for proof of identity (via an IdP) they would have saved themselves a lot of misery and terror.

We also believe that the issue of age verification will benefit from IdPs attesting to users’ real ages - with users being able to prove ownership of accounts with a Shayype OTP. We have offered Shayype’s help to the Australian Government trials, believing that IdP accounts “fronted” by Shayype OTPs could add hugely to the techniques already available.

At present a range of measures are being tried, ranging from parental approval, to government documents and credit card ownership, to biometric indicators such as appearance of faces, hands etc. (and even gestures) - but according to a report just out (Enforcing Australia's social media ban on kids is possible but contains risks, report says - BBC News) no single best or sufficiently accurate method has so far emerged. (How for instance does a photograph distinguish between a teenager who is 15 years and 364 days old, and one who a day later has reached his/her 16th birthday, and now wants to access social media?)

 

 

APPENDICES

 

Appendix 1. Definition of terms

 

This is a (non-exhaustive) list of the main terms used in cyber and identity protection.

 

Password - usually a fixed “string“ of characters assumed to be known only to the authorised user. Unfortunately, as has already been stated above, such character strings can easily be captured and re-used by hackers: figures show that between 80%-90% of online break-ins are related to passwords falling into the wrong hands.

 

Password-less (passwordless) – is a blanket term which has been widely adopted by several companies whose avowed aim is to replace the password with something better. However, many such solutions (e.g. Beyond Identity) are based on the user being in possession of a mobile, and do not answer the question of what happens if the mobile is lost or even falls into the wrong hands. Several (including BI) use “private keys” securely stored within the phone. Microsoft offers a range of “passwordless” options

 

Passkeys – pretty much the same as passwordless – your mobile or computer confirms it’s you via biometric authentication or an entry PIN. But if you lose your device, you’re stumped.

 

Two-factor – designed to solve the vulnerability issue with fixed passwords by instead giving users a different code every time they need to perform an action. A two-factor set up generally involves a user choosing two out of three “factors” – something you know, something you have or something you are (in other words biometrics such as fingerprints or facial recognition).

 

Two-step (or SMS) verification - a close relative of two-factor, where the second “factor” is typically a mobile assumed to be in the possession of the authorised user, to which a one-time code is sent by text/SMS. This is widely used and is often confused with two-factor; however, it offers far less protection due to the ease with which hackers can perform “SIM-swap” operations – whereby they get hold of a replacement SIM card for a user’s phone number, allowing a hacker to re-direct security codes to themself. Security experts acknowledge it is far too easy for anyone to walk into a phone shop and claim someone else’s number is theirs, at the same time creating the impression that that their phone has been broken/lost.

 

Identity and Access Management (IAM) – systems offered by companies such as ForgeRock, OKTA etc offering authentication as a service (AaaS) based on “knowledge” of the authorised user via several credentials held in a database. One useful feature is Single sign-on (SSO) – see below. Such systems are really intended for the workplace or remote working; they were never designed to replace all passwords en masse.

 

Single sign-on (SSO) – is a feature of secure IAM systems, such that once a user has successfully logged in, he/she can then seamlessly access other (approved) applications (and then log out at the end of the day, removing the risk of applications being accidentally left open).

 

WebAuthn – is a recently introduced API (application protocol interface) designed to allow hardware-based “trusted devices” (such as Yubikey hardware or FIDO2 enabled phones) to be used for logging into websites etc.

 

 

 

Appendix 2. Useful password history references.

 

Password - Wikipedia (Password - Wikipedia)

The Forgotten Origin of Passwords by Yuji Develle (The Forgotten Origin of Passwords | by Yuji Develle | Wonk Bridge | Medium)

A short history of the computer password (A short history of the computer password | WeLiveSecurity)

 

Author: Jonathan Craymer © Shayype Solutions Ltd 2025.

Shayype Solutions Ltd. E info@shayype.com W www.shayype.com. Registered Office Allia Future Business Centre, London Road, Peterborough PE2 8AN. Company Registration Number 15025170. Registered in England and Wales.

Loading