The Authentication Hierarchy: Engineering the Transition from Shared Secrets to Cryptographic Attestation | Bottorring