Bitcoin Forum
December 11, 2024, 03:27:02 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: 24 word recovery seed: How does it work? Secure?  (Read 226 times)
l_i_g_h_t (OP)
Newbie
*
Offline Offline

Activity: 44
Merit: 0


View Profile
January 01, 2018, 05:51:24 AM
 #1

I can't find any real good answers on it. Apparently there is something called bip 32 and those 24 words create private keys based on that program. Those 24 words in that order will always produce the same private keys.

How does your wallet know not to generate 24 words that are already in use by someone else and what happens if someone even accidentally enters your 24 words?
achow101
Moderator
Legendary
*
Offline Offline

Activity: 3570
Merit: 6927


Just writing some code


View Profile WWW
January 01, 2018, 09:02:56 PM
 #2

The specification for the mnemonic is BIP 39. That mnemonic is then typically used with BIP 32 to generate your private keys.

How does your wallet know not to generate 24 words that are already in use by someone else
It doesn't know, and it does not need to know. The search space is so massive that a crytpgraphically secure random number generator has an extremely small change of generating a seed that someone else has generated before. The probability of that happening is so infinitesimally small that it is nearly impossible. This principle of unlikelihood is the basis of all modern cryptography.

and what happens if someone even accidentally enters your 24 words?
Then they can generate your private keys and spend your Bitcoin. The odds of this happening are extremely small, so much so that it is impossible.

l_i_g_h_t (OP)
Newbie
*
Offline Offline

Activity: 44
Merit: 0


View Profile
January 02, 2018, 04:08:05 AM
 #3

The specification for the mnemonic is BIP 39. That mnemonic is then typically used with BIP 32 to generate your private keys.

How does your wallet know not to generate 24 words that are already in use by someone else
It doesn't know, and it does not need to know. The search space is so massive that a crytpgraphically secure random number generator has an extremely small change of generating a seed that someone else has generated before. The probability of that happening is so infinitesimally small that it is nearly impossible. This principle of unlikelihood is the basis of all modern cryptography.

and what happens if someone even accidentally enters your 24 words?
Then they can generate your private keys and spend your Bitcoin. The odds of this happening are extremely small, so much so that it is impossible.

Hmmm, it doesn't seem like it would be that rare that the same key is produced. Very interesting. Thanks for replying and explaining it.
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4363

<insert witty quote here>


View Profile
January 02, 2018, 04:19:10 AM
 #4

Hmmm, it doesn't seem like it would be that rare that the same key is produced. Very interesting. Thanks for replying and explaining it.
The current (english) wordlist for BIP39 has 2048 words in it... a "typical" seed uses 12 words... some wallets use 24 words... even with just 12 words, the basic calculation for the number of combinations is:

204812 = 5.4445179 * 10^39

With 24 words that would become:

204824 = 2.9642775 * 10^79

even discounting "invalid" seeds (the last word is actually a checksum, so not ALL combinations of words actually generate a valid seed mnemonic) , that's still some fairly large numbers Wink Then you can factor in the fact that you can also add a "passphrase" onto the 24 word seeds... which pretty much makes the number of combinations infinite.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
l_i_g_h_t (OP)
Newbie
*
Offline Offline

Activity: 44
Merit: 0


View Profile
January 02, 2018, 03:39:58 PM
 #5

hahaha ok point made wow....I definitely feel better now. Thanks guys.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!