Bitcoin Forum
May 10, 2024, 09:20:02 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: 400 digits vs 24 mnemonic phrase  (Read 763 times)
jeffytune (OP)
Full Member
***
Offline Offline

Activity: 140
Merit: 100

Peace not piece.


View Profile
April 29, 2017, 08:00:47 PM
Last edit: April 29, 2017, 09:29:17 PM by jeffytune
 #1

There are many popular wallets which have quite secure seeds and generate mnemonics which are quite difficult to crack in reasonable time.

But I just want to know if I generate private key from my own 400 digits (only numeric) then how it would be less secure than 24 mnemonic recovery phrase?
1715332802
Hero Member
*
Offline Offline

Posts: 1715332802

View Profile Personal Message (Offline)

Ignore
1715332802
Reply with quote  #2

1715332802
Report to moderator
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, which will follow the rules of the network no matter what miners do. Even if every miner decided to create 1000 bitcoins per block, full nodes would stick to the rules and reject those blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Casy
Member
**
Offline Offline

Activity: 149
Merit: 22

🔴🔵 FoxMixer.com 🔵🔴


View Profile WWW
May 01, 2017, 09:24:33 AM
 #2

There are many popular wallets which have quite secure seeds and generate mnemonics which are quite difficult to crack in reasonable time.

But I just want to know if I generate private key from my own 400 digits (only numeric) then how it would be less secure than 24 mnemonic recovery phrase?

With 400 digits there are (10)^400 = 1e400 possibilities, with 24 mnemonic recovery phrase (assuming only small letters and an average word length of 8 characters) there are 26^(8*24) = 5e271 possibilities. There are even less as here I count all possible char combinations, but in an mnemonic, there are only words that make sense.
But just as a rough estimation, it should be ok.

jambola2
Legendary
*
Offline Offline

Activity: 1120
Merit: 1038


View Profile
May 01, 2017, 10:12:03 AM
 #3

Even at ~13-15 chars, the likelihood of someone bruteforcing it is near zero.   
Heck it might be even closer to 10-12 chars, because nobody would try even if 10 chars might be almost possible.

The only point of weakness is you. Where are you getting the 400 digits from? Is it truly random? If not, you might have some weakness someone can exploit to figure out the numbers.
Where are you getting the 24 words from? Are they a sentence? Are they closely related words? Did something generate them from you, or did you think of them? If you use a sentence from anywhere, it will instantly make it much easier than bruteforcing.

The truth is nobody is going to bruteforce any password >15 characters or any mnemonic >6-7 truly random words anytime soon. Don't overdo it, it doesn't increase the likelihood of safety, and to the contrary, may decrease it (you might forget the password, or you might write it down somewhere and someone might find it it). Good luck.

No longer active on bitcointalk, however, you can still reach me via PMs if needed.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!