Merci pour ta réponse. Ton exemple parle bien de clé privée Bitcoin avec une chaîne de 64 caractères associant des lettres et des chiffres qui ressemble plus ou moins à cela ?E9873D79C6D87DC0FB6A5778633389F4453213303DA61F20BD67FC233AA
Oui tout à fait !
Mais si on attaque par dictionnaire avec les 2048 mots, on hautement les chances de trouver un wallet? Surtout avec 12 mots comparé au 24 mots, ou c'est aussi impossible?
Non, que ça soit 12 ou 24 mots, pour le moment c'est encore safe
Il y a une excellente réponse de nc50lc à ce sujet :
Im curios how safe is currently the 12 mnemonic seed phase for example of of electrum 12 words against bruteforce?
is it possible to get a hit if someone would use all words and has some capabilities have any success or is it safe as of now?
From this context you want to check if Electrum's default wordlist^12 is safe?
Electrum by default uses the same word list as BIP39 (
but not limited to that) so you have 2048 words and will be bruteforcing 12 words.
2048^12 is 5,444,517,870,735,015,415,413,993,718,908,291,383,296
So based from the number, I don't think that there's a good chance to hit another person' seed phrase by bruteforcing the words alone.
I mean, it's not 1% low or even 0.000001% chance, it's 0.0000000000000000000000000000000000000002% chance.
Don't even think that starting from the entropy is slightly faster either since Electrum's seed doesn't have a checksum unlike BIP39,
all those 12 words are part of the entropy so you'll start with 132bits of entropy which is the same as the above.
In terms of actual resistance against bruteforce, read this document:
electrum.readthedocs.io/en/latest/seedphrase.html#security-implications