Bitcoin Forum
March 28, 2024, 08:21:54 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Brain wallets generated keys mis-match?  (Read 536 times)
pawel7777 (OP)
Legendary
*
Offline Offline

Activity: 2394
Merit: 1553



View Profile WWW
December 01, 2015, 12:23:03 PM
 #1


I was just playing around with creating brain wallets and noticed that there's mismatch between addresses/keys generated from the same passphrase on 2 different sites:

pass:
Code:
The following challenges are designed

Results from bitaddress.org:
Btc address: 1BvkjqV6XV3iYTcLcFGehF5nGdpc5bthXa
Private key: 5JNcmZ365RxqGdT1dD3ZvfEAsmcfchp53JbZpWaqjCxUKcmXk1S

Results from https://keybase.io/warp (got on thas site through google search):
Btc address: 1JHoH6oSfxxWtVjR7yCPqkDiDLixWP6uDJ
Private key: 5JPhzgxYpM9eP8Nw1SbopLeSeULwXXDk3xQVuKZYon8vW7EFbvK

Why are the results different? On the latter site I left the 'salt' field blank so I assume the result would be the same.
Does it mean one of those sites is generating faulty keys, or am I missing something?

Are there any trusted sites other than bitaddress where I can cross-check passphrase results? How to make 100% sure that address/key is generated correctly?


ps. I'm very aware of all the risks/flaws attached to brainwallets, no need to lecture me on that.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
1711614114
Hero Member
*
Offline Offline

Posts: 1711614114

View Profile Personal Message (Offline)

Ignore
1711614114
Reply with quote  #2

1711614114
Report to moderator
1711614114
Hero Member
*
Offline Offline

Posts: 1711614114

View Profile Personal Message (Offline)

Ignore
1711614114
Reply with quote  #2

1711614114
Report to moderator
1711614114
Hero Member
*
Offline Offline

Posts: 1711614114

View Profile Personal Message (Offline)

Ignore
1711614114
Reply with quote  #2

1711614114
Report to moderator
No Gods or Kings. Only Bitcoin
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1711614114
Hero Member
*
Offline Offline

Posts: 1711614114

View Profile Personal Message (Offline)

Ignore
1711614114
Reply with quote  #2

1711614114
Report to moderator
1711614114
Hero Member
*
Offline Offline

Posts: 1711614114

View Profile Personal Message (Offline)

Ignore
1711614114
Reply with quote  #2

1711614114
Report to moderator
1711614114
Hero Member
*
Offline Offline

Posts: 1711614114

View Profile Personal Message (Offline)

Ignore
1711614114
Reply with quote  #2

1711614114
Report to moderator
achow101
Moderator
Legendary
*
Offline Offline

Activity: 3346
Merit: 6473


Just writing some code


View Profile WWW
December 01, 2015, 12:35:04 PM
 #2

They use different algorithms to generate the address. I don't think there is any standard way to generate a brain wallet address.

pawel7777 (OP)
Legendary
*
Offline Offline

Activity: 2394
Merit: 1553



View Profile WWW
December 01, 2015, 12:55:09 PM
 #3


OK, did some research and apparently warpwallet uses key-stretching:

Quote
They can be made a heck-of-a-lot safer with simple key-stretching. The WarpWallet runs Scrypt on your passphrase, and outputs a string in the full 256-bit keyspace. It's at least 1000x more expensive to guess a WarpWallet address than a standard brainwallet address. And if you had access to high-end scrypt-computing hardware, you're probably better off using it to mine litecoins rather than go after WarpWallets. See https://keybase.io/warp. There's a 20BTC challenge to solve an 8-letter WarpWallet passphrase that's been open for almost a month

But that kind of sucks, as apparently you not only need to remember your passphrase, but also hope that the site (you created your wallet on) won't go down. Or at least, you'd need to know which specific algo has been used to create your key in order to recreate it from the passphrase.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
ranochigo
Legendary
*
Offline Offline

Activity: 2940
Merit: 4127



View Profile
December 01, 2015, 01:04:55 PM
 #4


OK, did some research and apparently warpwallet uses key-stretching:

Quote
They can be made a heck-of-a-lot safer with simple key-stretching. The WarpWallet runs Scrypt on your passphrase, and outputs a string in the full 256-bit keyspace. It's at least 1000x more expensive to guess a WarpWallet address than a standard brainwallet address. And if you had access to high-end scrypt-computing hardware, you're probably better off using it to mine litecoins rather than go after WarpWallets. See https://keybase.io/warp. There's a 20BTC challenge to solve an 8-letter WarpWallet passphrase that's been open for almost a month

But that kind of sucks, as apparently you not only need to remember your passphrase, but also hope that the site (you created your wallet on) won't go down. Or at least, you'd need to know which specific algo has been used to create your key in order to recreate it from the passphrase.
You can easily download the script from the site. Even brainwallet was opensourced and so people can still use them after they went down permanently.

..JAMBLER.io..Create Your Bitcoin Mixing
Business Now for   F R E E 
▄█████████████████████████████
█████████████████████████
████▀████████████████████
███▀█████▄█▀███▀▀▀██████
██▀█████▄█▄██████████████
██▄▄████▀▄▄▄▀▀▀▀▀▄▄██████
█████▄▄▄██████████▀▄████
█████▀▄█▄██████▀█▄█████
███████▀▄█▀█▄██▀█▄███████
█████████▄█▀▄█▀▄█████████
█████████████████████████
█████████████████████████
▀█████████████████████████████
█████████████████████████████████████████████████
.
      OUR      
PARTNERS

.
█████████████████████████████████████████████████
████▄
██
██
██
██
██
██
██
██
██
██
██
████▀
▄█████████████████████████████
████████▀▀█████▀▀████████
█████▀█████████████▀█████
████████████████████████
███████████████▄█████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████▀█████████
████████████████████████
█████▄█████████████▄█████
████████▄▄█████▄▄████████
▀█████████████████████████████
█████████████████████████████████████████████████
.
   INVEST   
BITCOIN

.
█████████████████████████████████████████████████
████▄
██
██
██
██
██
██
██
██
██
██
██
████▀
DannyHamilton
Legendary
*
Offline Offline

Activity: 3346
Merit: 4505



View Profile
December 01, 2015, 03:46:54 PM
 #5

- snip -
you'd need to know which specific algo has been used to create your key in order to recreate it from the passphrase.

Correct.

There is no standard method of turning a passphrase into a private key.  While some methods might be a bit more secure than others (and some possible methods are horrible insecure), everyone is free to implement whatever method they like.  Therefore, if you are going to use a method, you better know what method you used (in case you lose access to the tool you used).
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!