Hello,
When we have a valid entropy from mnemonic seed, we need to transform it to a valid seed.
To do it we use PBKDF2 - Password Based Key Derivation Function 2.
https://learnmeabitcoin.com/technical/mnemonic PBKDF2 Settings:
Password: Mnemonic Sentence
Salt: "mnemonic"+(optional passphrase)
Iterations: 2048
Algorithm: HMAC-SHA512
Size: 64 bytes
1) If I do more iterations, I will have another valid seed ?
2) For example, if I decide to do 2048+1 PBKDF2 iterations, an attack against "standart wallet with 2048 iterations" will not be effective event if attacker have my mnemonic seed ?
3) If I want an off-standard seed, I can do like 2048x16 = 32k iterations, my wallet will be longer to set up but it's juste few minutes more, I will gain more resilience against brute force attack event if my mnemonic seed is leaked ?
4) I read severals iterations advice, 1024, 2048 or 4096, those advices change with time as computer become more and more powerful. So I can have several differents private key/address results if I use differents software version etc. ?
5) There is 2048^12 mnemonic possibility, is it enough to not care for PBKDF2 validity and just SHA-256 my mnemonic phrase to have a valid seed ? (discusion here :
https://security.stackexchange.com/questions/16354/...)