Bitcoin Forum
May 05, 2024, 04:06:25 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Restoring password using unencrypted and encrypted wallet  (Read 217 times)
x-creature (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
November 06, 2017, 02:25:20 PM
 #1

Hi guys,

I have two copies of my wallet: unencrypted and encrypted. All keys from unencrypted wallet are also in encrypted version. I can access half of the private keys (on the picture: key 1, key 2, key 3).
Second wallet is encrypted and have more keys (key 4, key 5, key 6).
 wallet unencrypted        wallet encrypted
+-------------------+    +-----------------+
| key 1 unencrypted |    | key 1 encrypted |
| key 2 unencrypted |    | key 2 encrypted |
| key 3 unencrypted |    | key 3 encrypted |
+-------------------+    | key 4 encrypted |
                         | key 5 encrypted |
                         | key 6 encrypted |
                         +-----------------+
Base on unencrypted wallet, is it possible to restore password for encrypted wallet?
If not, is it somehow easier to brute force password in my situation?
1714881985
Hero Member
*
Offline Offline

Posts: 1714881985

View Profile Personal Message (Offline)

Ignore
1714881985
Reply with quote  #2

1714881985
Report to moderator
1714881985
Hero Member
*
Offline Offline

Posts: 1714881985

View Profile Personal Message (Offline)

Ignore
1714881985
Reply with quote  #2

1714881985
Report to moderator
1714881985
Hero Member
*
Offline Offline

Posts: 1714881985

View Profile Personal Message (Offline)

Ignore
1714881985
Reply with quote  #2

1714881985
Report to moderator
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, which will follow the rules of the network no matter what miners do. Even if every miner decided to create 1000 bitcoins per block, full nodes would stick to the rules and reject those blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714881985
Hero Member
*
Offline Offline

Posts: 1714881985

View Profile Personal Message (Offline)

Ignore
1714881985
Reply with quote  #2

1714881985
Report to moderator
1714881985
Hero Member
*
Offline Offline

Posts: 1714881985

View Profile Personal Message (Offline)

Ignore
1714881985
Reply with quote  #2

1714881985
Report to moderator
1714881985
Hero Member
*
Offline Offline

Posts: 1714881985

View Profile Personal Message (Offline)

Ignore
1714881985
Reply with quote  #2

1714881985
Report to moderator
RGBKey
Hero Member
*****
Offline Offline

Activity: 854
Merit: 658


rgbkey.github.io/pgp.txt


View Profile WWW
November 06, 2017, 04:07:52 PM
 #2

Unfortunately not. It is not any easier to derive a password from an encrypted and unencrypted version of a file than it is to find the unencrypted version of an encrypted file. Also, since the files aren't even the same file (one includes more private keys) it wouldn't be possible anyways.

What wallet are you using? If you're using a wallet that generates addresses deterministically, then it could be possible to generate the addresses you don't have in your unencrypted backup.
x-creature (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
November 06, 2017, 04:23:28 PM
 #3

It is Bitcoin Core wallet. It does not have HD keys, as they were not implemented back in time when I created my wallet.

One more thing (correct me if I am wrong). By default, Bitcoin Core generates you 100 unencrypted non HD keys (older versions). When you encrypt your wallet Core adds 100 more keys and encrypts the rest. After encryption you have 200 keys. Previous keys, that were initially unencrypted, are not in use anymore, but you can still spend balance from them.
Is my way of thinking right?
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!