Reinventing Passwordless Authentication Through Cryptography, Biometrics, and Hidden Data

A new approach to authentication combines RSA, AES, typing biometrics, and steganography — all within your smartphone — to eliminate passwords without sacrificing security or usability.

Who This Is For

  • AppSec engineers designing secure login flows
  • Mobile developers exploring passwordless systems
  • Security architects evaluating FIDO2 alternatives
  • Privacy researchers and cybersecurity enthusiasts

Why It Matters (2025+)

Passwords are dying — and that’s a good thing. But while passwordless sounds futuristic, real-world implementations often trade usability for security. Hardware tokens break, SMS codes get intercepted, and biometrics alone can’t recover lost accounts.
Sesame Auth, a research-backed prototype, shows it’s possible to combine cryptography, biometrics, and steganography into a single scalable passwordless system — without new hardware or shared secrets.

What You’ll Learn

  • How hybrid cryptography and steganography can enable secure passwordless login
  • How typing biometrics replace security questions for account recovery
  • How Sesame Auth achieves sub-2-second authentication — rivaling passwords

What Is Project Sesame?

Project Sesame is a passwordless authentication framework built using RSA (asymmetric) and AES (symmetric) cryptography, fingerprint/face biometrics, and keystroke dynamics (behavioral biometrics).

It also uses LSB steganography to embed encrypted credentials inside images — a creative twist that eliminates the need for storing secrets or hashes.

Imagine logging into your e-commerce account by:

  1. Confirming a push prompt with your fingerprint, and
  2. Uploading an image that secretly contains your authentication data — all processed in under two seconds.

Architecture Overview

[User Device]
   ├── Front-End (React Native)
   │   ├─ Biometric check (fingerprint/face)
   │   ├─ Keystroke pattern capture
   │   ├─ Account import / recovery
   ├── Secure Local Storage (RSA & AES keys)
   └── HTTPS Communication with Backend

[Backend]
   ├── Node.js Server (API)
   ├── Firebase Database (public keys only)
   ├── TypingDNA API for behavioral verification
   └── Steganography engine for image embedding

Each account gets a unique key pair, and public keys are stored server-side — not passwords, not hashes. Even if the database is breached, attackers gain nothing useful.

Step-by-Step: How It Works

Device Setup

  • On first launch, the app generates:
    • A 2048-bit RSA key pair
    • A 256-bit AES key
    • A Device Notification ID (DN-ID) for push-based authentication
  • The app’s public key and DN-ID are registered with the backend; the private key stays securely inside Android Keystore or iOS Keychain.

User Registration

  • The user provides an email address and types it three times — this trains the keystroke dynamics model using TypingDNA.
  • Fingerprint or Face ID verifies the user locally.
  • The app links the typing profile (Typing ID) with the app’s public key.

Account Creation

  • When adding a new service (like “Ecom”), the app generates a separate RSA key pair for that account.
  • The app embeds the account public key and encrypted Typing ID inside an image using LSB steganography — the user keeps this image for recovery.
  • The server only stores the account public key and username — no password, no secret.

Authentication

  1. The user visits the service and enters their username.
  2. The service fetches the corresponding public key from the server.
  3. The server sends a challenge string, displayed to the user.
  4. The user enters that string on the app → biometric verification occurs.
  5. If valid, the server authorizes login.

Average time: 825 ms — faster than typing a password.
Success rate: 100% during prototype testing.

Account Recovery

Lost your phone? Just reinstall the app and:

  1. Upload your stego image,
  2. Type your email (your typing pattern is verified), and
  3. Authenticate via fingerprint or Face ID.

If everything matches, your account is restored — no password reset links, no security questions.

Performance Snapshot

OperationAvg. DurationDescription
Account Creation3.6 sIncludes key gen + stego embed
Authentication0.8 sChallenge/response cycle
Account Recovery1.6 sTypingDNA + image validation
Registration1.6 sTyping pattern capture

These results show that passwordless doesn’t have to mean slow or complex.

Security Highlights

Attack VectorMitigation
PhishingNo shared secrets or reusable tokens
Malware on DeviceKeys stored in hardware-backed keystores
MITM (Man-in-the-Middle)End-to-end TLS + hardcoded cert pinning
Device TheftRequires biometric confirmation
Server BreachOnly public keys stored, no passwords
Replay/InjectionRandom challenge codes with 1-in-a-million probability

Technical Foundations

  • Cryptography: RSA (2048/4096-bit), AES-256, HTTPS (TLS from Let’s Encrypt)
  • Steganography: LSB (Least Significant Bit) embedding via Jimp library
  • Biometrics: Fingerprint / Face ID (Android/iOS)
  • Behavioral biometrics: TypingDNA keystroke profiles
  • Storage: Firebase + Secure Enclave / Keystore

Limitations & Future Work

  • LSB steganography is detectable by advanced steganalysis — future versions will adopt adaptive or transform-domain hiding.
  • Trusted backend dependency — compromising the Sesame server could disrupt authentication. Future iterations could decentralize validation using blockchain or distributed ledgers.
  • Mobile crypto constraints — native encryption libraries and certificate signing modules will improve robustness.

Why It’s Different

While FIDO2, SIM-based, and iris-scan systems all tried to replace passwords, they usually require specialized hardware or multiple backup tokens.
Sesame Auth proves you can:

  • Go passwordless without new devices
  • Recover accounts without helpdesk tickets
  • Avoid shared secrets entirely

It’s not just a theoretical framework — it’s an operational proof of concept tested on Android and iOS.

Final Thoughts

Project Sesame hints at a near future where authentication is both invisible and secure by design.
By merging cryptography, biometrics, and digital hiding, it builds trust without friction — a rare balance in cybersecurity.

Passwords may have survived 60 years, but their replacement just found its magic words: “Open, Sesame.”

Stay ahead of the curve — subscribe to SecureBytesBlog.com for more deep dives into emerging authentication frameworks, security innovations, and AI-driven defenses.
You’ll get research-backed insights, practical guides, and early access to our next analysis before anyone else.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top