Title: Introducing a New Cryptographic Solution for Bitcoin Recovery Seed Security Post by: encrypt-seed on February 07, 2024, 12:37:46 AM Dear Bitcointalk Community,
We are excited to introduce a new cryptographic solution aimed at enhancing the security of Bitcoin recovery seed. Our platform, available at encrypt-seed.netlify.app (http://encrypt-seed.netlify.app), utilizes the CryptoJS.AES library to encrypt recovery seed securely. Key Features: Cryptographic Security: Our platform ensures that recovery seed are encrypted using robust cryptographic techniques, providing users with a secure method for storing their valuable information. Open Source: The platform is open source, with the source code available on GitHub for review and contribution from the community. User-Friendly Interface: We offer a user-friendly interface, making it easy for users to encrypt and securely store their recovery seed. Privacy: We prioritize user privacy and do not store any user data, ensuring that recovery seed remain confidential and accessible only to the user. We believe that the security of recovery seed is paramount in safeguarding Bitcoin assets, and our platform aims to provide users with a reliable solution for this purpose. For more information and to try out our platform, please visit encrypt-seed.netlify.app (http://encrypt-seed.netlify.app). We welcome your feedback and contributions as we continue to improve and enhance the security of Bitcoin recovery seed. Thank you for your attention and support. Best regards, Title: Re: Introducing a New Cryptographic Solution for Bitcoin Recovery Seed Security Post by: Hatchy on February 07, 2024, 01:03:07 AM And why do you think anyone would want a third party to help encrypt their seed phrase ??? What happened to keeping your seed phrase offline.
Title: Re: Introducing a New Cryptographic Solution for Bitcoin Recovery Seed Security Post by: apogio on February 07, 2024, 07:46:58 AM It is using javascript, which is not very common for security related purposes, but I have some questions:
Use case I entered the phrase '12345' and it produced a cipher. I decrypted it fine. Then I took the encrypted key and put it in another browser on another computer and it still worked. Questions 1. How many iterations do you use for the key? 2. Is it normal that the same phrase always produces different cipher? I am not familiar with AES. 3. How do you plan to store the cipher? It must be stored offline, since if it is stored online, anyone can grab it and perform the same decryption algorithm to get the initial phrase. I used it in a different computer, so I have tested it. So, if it must be stored offline, and if someone grabs it, your funds can be compromised, why should anyone store the cipher instead of the original seed phrase, since the security level is equal, as the "thief" will need to do the exact same thing to compromise the wallet? Not to mention that storing the cipher offline is dangerous for obvious reasons. I mean a seed phrase consists of english words which are easily understood but the cipher is an unpredictable sequence of characters. Title: Re: Introducing a New Cryptographic Solution for Bitcoin Recovery Seed Security Post by: ABCbits on February 07, 2024, 09:07:51 AM I can enter any text and there's no warning the text isn't part of BIP 32, BIP 39 or Electrum's seed. So at this point, IMO it's not really different to other website or app which offer feature to encrypt arbitrary text or file.
Title: Re: Introducing a New Cryptographic Solution for Bitcoin Recovery Seed Security Post by: BlackHatCoiner on February 07, 2024, 10:26:10 AM So, let me get this straight.
What problem does this solve, again? 1. How many iterations do you use for the key? According to their github repo (https://github.com/zackha/encrypt-seed/blob/fad8133676834794854bf07691e1ccaf26c3b03e/app.vue#L76), it uses 1000 iterations of a 256-bit key. 2. Is it normal that the same phrase always produces different cipher? I am not familiar with AES. It is normal. That's the use of the initialization vector (https://github.com/zackha/encrypt-seed/blob/fad8133676834794854bf07691e1ccaf26c3b03e/app.vue#L79), which is a random value that is used along with the key. Every time you perform encryption, there is a new IV value, so it results in an entirely different ciphertext. Title: Re: Introducing a New Cryptographic Solution for Bitcoin Recovery Seed Security Post by: ymgve2 on February 07, 2024, 04:03:27 PM Your encryption greatly increases the complexity of the seed at basically no benefit. There is already a feature to have an extra password alongside your seed built into BIP39.
Note that BIP39 words are picked to be relatively distinguishable from each another so even a misspelling or vague letter is recoverable. In contrast, your encrypted seed phrase is a mess of upper case, lower case, letters and symbols. I changed a single letter in the encrypted seed phrase from lower case to upper case (something that is very likely to happen if someone writes it down), and when decrypted it completely broke without any warning that there was an error in the phrase. This is less than useless, this is a dangerous piece of software that WILL make people lose their seed phrase. |