zabzob (OP)
Member

Offline
Activity: 116
Merit: 46
|
...and is it possible to achieve this highest entropy with a 12-word seed phrase? (Not enough space for complete question in subject field)
I'm trying to figure out what is the most secure seed phrase possible for a BIP-39 bitcoin seed, and whether it's possible to achieve this with a 12-word phrase, with or without a passphrase. I'm no expert in cryptography, but I've been reading up on it and it looks like modern bitcoin seeds are capable of 256 bits of entropy in theory, but only 128 in practice, at least if one is using BIP-39 HD wallets, which is currently the standard. As long as one uses a sufficiently random method for generating the seed, such as dice-rolls, 12 words is sufficient to produce 128 bits of entropy. Does that mean that, in practice, no additional entropy can be achieved for the seed, whether using a passphrase or a longer seed phrase such as 24 words?
I hope I was able to phrase the question clearly. I'm just wondering whether there's really any reason to opt for a 24-word seed phrase when it doesn't offer any real-world gain in seed security. Passphrases have other uses of course, but it seems they're not necessary for maximizing seed entropy.
|
|
|
|
|
hosemary
Legendary
Offline
Activity: 2940
Merit: 6642
|
A 12 word BIP39 seed phrase provides 128 bits of entropy and that's enough. You can have more words and more entropy. For example, a 24 word BIP39 seed phrase provides 256 bits of entropy, but since any bitcoin private key provides 128 bits of security, you don't really increase your security by generating a seed phrase with more than 12 words.
|
|
|
|
|
|
| . betpanda.io | │ |
ANONYMOUS & INSTANT .......ONLINE CASINO....... | │ | ▄███████████████████████▄ █████████████████████████ █████████████████████████ ████████▀▀▀▀▀▀███████████ ████▀▀▀█░▀▀░░░░░░▄███████ ████░▄▄█▄▄▀█▄░░░█▄░▄█████ ████▀██▀░▄█▀░░░█▀░░██████ ██████░░▄▀░░░░▐░░░▐█▄████ ██████▄▄█░▀▀░░░█▄▄▄██████ █████████████████████████ █████████████████████████ █████████████████████████ ▀███████████████████████▀ | ▄███████████████████████▄ █████████████████████████ ██████████▀░░░▀██████████ █████████░░░░░░░█████████ ████████░░░░░░░░░████████ ████████░░░░░░░░░████████ █████████▄░░░░░▄█████████ ███████▀▀▀█▄▄▄█▀▀▀███████ ██████░░░░▄░▄░▄░░░░██████ ██████░░░░█▀█▀█░░░░██████ ██████░░░░░░░░░░░░░██████ █████████████████████████ ▀███████████████████████▀ | ▄███████████████████████▄ █████████████████████████ ██████████▀▀▀▀▀▀█████████ ███████▀▀░░░░░░░░░███████ ██████▀░░░░░░░░░░░░▀█████ ██████░░░░░░░░░░░░░░▀████ ██████▄░░░░░░▄▄░░░░░░████ ████▀▀▀▀▀░░░█░░█░░░░░████ ████░▀░▀░░░░░▀▀░░░░░█████ ████░▀░▀▄░░░░░░▄▄▄▄██████ █████░▀░█████████████████ █████████████████████████ ▀███████████████████████▀ | .
SLOT GAMES ....SPORTS.... LIVE CASINO | │ | ▄░░▄█▄░░▄ ▀█▀░▄▀▄░▀█▀ ▄▄▄▄▄▄▄▄▄▄▄ █████████████ █░░░░░░░░░░░█ █████████████ ▄▀▄██▀▄▄▄▄▄███▄▀▄ ▄▀▄██▄███▄█▄██▄▀▄ ▄▀▄█▐▐▌███▐▐▌█▄▀▄ ▄▀▄██▀█████▀██▄▀▄ ▄▀▄█████▀▄████▄▀▄ ▀▄▀▄▀█████▀▄▀▄▀ ▀▀▀▄█▀█▄▀▄▀▀ | Regional Sponsor of the Argentina National Team |
AVATAR
|
|
|
zabzob (OP)
Member

Offline
Activity: 116
Merit: 46
|
 |
November 03, 2025, 10:09:27 AM |
|
Thanks, this answers my question. The distinction between entropy and security clarifies the issue for me. So any amount of entropy beyond 128 bits will be reduced to the 128 bits of security of the key.
|
|
|
|
|
LoyceV
Legendary
Offline
Activity: 3850
Merit: 20310
Thick-Skinned Gang Leader and Golden Feather 2021
|
A 12 word BIP39 seed phrase provides 128 bits of entropy and that's enough. This still dazzles me after all those years in Bitcoin. I know there are only 2 160 different legacy addresses, which means there must be 2 96 valid private keys for each address. I also know from reading it many times that 128 bit is enough, but cyptography just isn't very intuitive. Further reading: StackExchange: 256-bit ECDSA only has 128 bits of security, so nothing can exceed that. It doesn't matter if an attacker can't find your seed, if they can just find a private key instead. – Pieter Wuille Commented Oct 12, 2021 at 19:54
|
¡uʍop ǝpᴉsdn pɐǝɥ ɹnoʎ ɥʇᴉʍ ʎuunɟ ʞool no⅄
|
|
|
nc50lc
Legendary
Offline
Activity: 2954
Merit: 7845
Self-proclaimed Genius
|
I'm trying to figure out what is the most secure seed phrase possible for a BIP-39 bitcoin seed, and whether it's possible to achieve this with a 12-word phrase, with or without a passphrase.
In BIP39, the number of words is tied with the entropy's size since it's the entropy itself ( plus checksum) presented in words. So if your target is 12-word seed phrase, you wont be able to utilize a higher entropy size in full. For the limit, the standard allows only 128~256 bits, In theory, it's possible to generate a very long seed phrase as long as its entropy is divisible by 32bits. In practice, most wallets will only prompt for 12~24 words, some allows to restore higher number of words like Electrum but that would be non-standard. And as you were informed, higher than 128-bit is not necessarily safer. The most famous argument is: it's for use-cases where they want to make it harder to brutefoce in case a few of the words got compromised, etc.
|
|
|
|
philipma1957
Legendary
Offline
Activity: 4662
Merit: 10760
'The right to privacy matters'
|
 |
November 03, 2025, 01:20:45 PM |
|
I'm trying to figure out what is the most secure seed phrase possible for a BIP-39 bitcoin seed, and whether it's possible to achieve this with a 12-word phrase, with or without a passphrase.
In BIP39, the number of words is tied with the entropy's size since it's the entropy itself ( plus checksum) presented in words. So if your target is 12-word seed phrase, you wont be able to utilize a higher entropy size in full. For the limit, the standard allows only 128~256 bits, In theory, it's possible to generate a very long seed phrase as long as its entropy is divisible by 32bits. In practice, most wallets will only prompt for 12~24 words, some allows to restore higher number of words like Electrum but that would be non-standard. And as you were informed, higher than 128-bit is not necessarily safer. The most famous argument is: it's for use-cases where they want to make it harder to brutefoce in case a few of the words got compromised, etc. I have a thirteen word phase for my electrum I could have done a 25 word phase.
|
|
|
|
satscraper
Legendary
Offline
Activity: 1274
Merit: 2270
|
 |
November 03, 2025, 05:51:08 PM Merited by vapourminer (1) |
|
A 12 word BIP39 seed phrase provides 128 bits of entropy and that's enough. You can have more words and more entropy. For example, a 24 word BIP39 seed phrase provides 256 bits of entropy, b
This statement holds only if the entropy source used by wallets to generate SEED is uniform and random which is ideal case. If it is not, the seed phrase may contain far less entropy. For example, wallets whose PRNGs are seeded with the current Unix timestamp “restrict the internal entropy to 32 bits regardless of settings,” so they generate predictable seed phrases that are susceptible to brute‑force attacks. Effected wallets:
|
| EARNBET | ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ | ███████▄▄███████████ ████▄██████████████████ ██▄▀▀███████████████▀▀███ █▄████████████████████████ ▄▄████████▀▀▀▀▀████████▄▄██ ███████████████████████████ █████████▌████▀████████████ ███████████████████████████ ▀▀███████▄▄▄▄▄█████████▀▀██ █▀█████████████████████▀██ ██▀▄▄███████████████▄▄███ ████▀██████████████████ ███████▀▀███████████ | | ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ |
▄▄▄ ▄▄▄███████▐███▌███████▄▄▄ █████████████████████████ ▀████▄▄▄███████▄▄▄████▀ █████████████████████ ▐███████████████████▌ ███████████████████ ███████████████████ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
| King of The Castle $200,000 in prizes | ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ | 62.5% | RAKEBACK BONUS |
|
|
|
nc50lc
Legendary
Offline
Activity: 2954
Merit: 7845
Self-proclaimed Genius
|
 |
November 04, 2025, 03:50:41 AM |
|
-snip-
I have a thirteen word phase for my electrum I could have done a 25 word phase. If it's about the 12 to 24 word prompts that I've mentioned, that 13th word of your 13-word phrase is just a passphrase ( as you know it) It's not part of the entropy but used as part of the salt when generating the binary seed from the 12~24 words mnemonic.
|
|
|
|
apogio
Legendary
Offline
Activity: 966
Merit: 2188
Trêvoid █ No KYC-AML Crypto Swaps
|
 |
November 04, 2025, 07:05:49 AM Last edit: November 04, 2025, 07:26:02 AM by apogio |
|
It's also worth noting two things: 1. BIP-39 and Electrum seed phrases are entropy representations. Each seed phrase is used to produce key-pairs that can be deterministically derived from the entropy that's given. But, each key-pair has 128 bits security by default, because on a lower level, bitcoin uses Secp256k1. So, in a perfect scenario where a seed phrase is truly random and you also add a strong passphrase, again, each private key will offer on average 128 bits of security. 2. In general, I'll be surprised if entropy can be measured. It's supposed to be random, so I don't see how you could measure randomness in a legitimate way. (edit: number 1 was mentioned by LoyceV above, I just saw that, sorry)
|
|
|
|
satscraper
Legendary
Offline
Activity: 1274
Merit: 2270
|
 |
November 05, 2025, 09:47:45 AM |
|
I'd be more concerned about what will happen in the future. Quantum computers could undermine any protection (not exactly because of the protection itself, but because they could directly decode ECDSA)
If you haven't exposed your public keys meaning you've never sent transactions from addresses holding your stash, then there is no threat from quantum computers, as there is nothing for them to search for. That said, if you're particularly paranoid about the potential threat of quantum computers, especially in the case of an extremely large stash, you may want to consider moving it to a quantum-resilient wallet, like Quastle, which by this offers quantum-grade encrypted keys.
|
| EARNBET | ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ | ███████▄▄███████████ ████▄██████████████████ ██▄▀▀███████████████▀▀███ █▄████████████████████████ ▄▄████████▀▀▀▀▀████████▄▄██ ███████████████████████████ █████████▌████▀████████████ ███████████████████████████ ▀▀███████▄▄▄▄▄█████████▀▀██ █▀█████████████████████▀██ ██▀▄▄███████████████▄▄███ ████▀██████████████████ ███████▀▀███████████ | | ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ |
▄▄▄ ▄▄▄███████▐███▌███████▄▄▄ █████████████████████████ ▀████▄▄▄███████▄▄▄████▀ █████████████████████ ▐███████████████████▌ ███████████████████ ███████████████████ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
| King of The Castle $200,000 in prizes | ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ | 62.5% | RAKEBACK BONUS |
|
|
|
zabzob (OP)
Member

Offline
Activity: 116
Merit: 46
|
 |
November 05, 2025, 01:37:21 PM Last edit: Today at 03:49:06 AM by zabzob |
|
I'd be more concerned about what will happen in the future. Quantum computers could undermine any protection (not exactly because of the protection itself, but because they could directly decode ECDSA) or, more shortly, the discovery of a bug in the generation system (RNG).
As for potential bugs in RNG, use of physical source of entropy such as dice rolls to generate the seed is one way to avoid this risk. I'd be more concerned about what will happen in the future. Quantum computers could undermine any protection (not exactly because of the protection itself, but because they could directly decode ECDSA)
If you haven't exposed your public keys meaning you've never sent transactions from addresses holding your stash, then there is no threat from quantum computers, as there is nothing for them to search for. That said, if you're particularly paranoid about the potential threat of quantum computers, especially in the case of an extremely large stash, you may want to consider moving it to a quantum-resilient wallet, like Quastle, which by this offers quantum-grade encrypted keys. I wasn't going to bring up the quantum issue, but since it's come up in this thread, I'll mention one question I have about quantum brute-forcing...not of exposed public keys, but of 12-word seed phrases specifically: According to my research, brute-forcing a 24-word seed phrase (i.e., guessing random phrases until finding one with a balance) would be impossible even for the most powerful quantum computer theoretically conceivable. It would take way longer to do that than it will take the Sun to run out of hydrogen, switch to burning helium, and expand until it engulfs the Earth. It's not as clear to me that this is also the case for 12-word seed phrases. Could a future quantum computer brute-force a 12-word seed phrase? I doubt this is likely to happen in practice, not within the next 50 years anyway, but is it possible in theory?
|
|
|
|
|
nc50lc
Legendary
Offline
Activity: 2954
Merit: 7845
Self-proclaimed Genius
|
 |
Today at 04:56:37 AM |
|
Thanks, this answers my question. The distinction between entropy and security clarifies the issue for me. So any amount of entropy beyond 128 bits will be reduced to the 128 bits of security of the key.
It's not as clear to me that this is also the case for 12-word seed phrases. Could a future quantum computer brute-force a 12-word seed phrase? I doubt this is likely to happen in practice, not within the next 50 years anyway, but is it possible in theory?
I've quoted two of your posts since it's relevant to this reply: If it's just theoretical bruteforce, brutefocing 12-words mnemonic will be quite harder than bruteforcing a 128-bit entropy. That's simply 2048^12 combinations which is higher that 2^128. But since the last word is part of the checksum ( 4 bits), the two would be equal if the it'll only include valid 12th words; that's: (2028^11)128 = 2^128But it also means that it'll be slower with those extra operations than just straight bruteforcing 128-bits. So even with bruteforce, 12-words is as good as a 128-bit entropy. Thus, we go back to the initial answer that anything higher isn't necessarily better.
|
|
|
|
zabzob (OP)
Member

Offline
Activity: 116
Merit: 46
|
 |
Today at 06:19:52 AM |
|
Thanks, this answers my question. The distinction between entropy and security clarifies the issue for me. So any amount of entropy beyond 128 bits will be reduced to the 128 bits of security of the key.
It's not as clear to me that this is also the case for 12-word seed phrases. Could a future quantum computer brute-force a 12-word seed phrase? I doubt this is likely to happen in practice, not within the next 50 years anyway, but is it possible in theory?
I've quoted two of your posts since it's relevant to this reply: If it's just theoretical bruteforce, brutefocing 12-words mnemonic will be quite harder than bruteforcing a 128-bit entropy. That's simply 2048^12 combinations which is higher that 2^128. But since the last word is part of the checksum ( 4 bits), the two would be equal if the it'll only include valid 12th words; that's: (2028^11)128 = 2^128But it also means that it'll be slower with those extra operations than just straight bruteforcing 128-bits. So even with bruteforce, 12-words is as good as a 128-bit entropy. Thus, we go back to the initial answer that anything higher isn't necessarily better. I'm wondering whether higher is better when it comes to brute-forcing seed phrases, even though it's not better in the case of cracking 128-bit public keys. It seems to me that, in the former case, you're not limited by the 128-bit security of the key, so that with a 24-word seed phrase you're getting the entire 256-bit space of possible word combinations. This difference wouldn't matter with traditional computers, since they're not able to brute-force a 12-word phrase. I'm wondering if this is also the case with any possible quantum computer. No quantum computer could brute-force a 24-word seed, but is that also the case with 12-word seeds? My understanding is that 128-bit keys are potentially vulnerable to quantum computers, otherwise the experts wouldn't be advising people to avoid keeping balances in addresses with exposed public keys. So if quantum computers might turn out to be capable of cracking 128-bit keys, could they also be capable of brute-forcing 12-word (but not 24-word) seed phrases? I realize that the two cases are not equivalent, since quantum computers may not have as much of an advantage in brute-forcing phrases as they do at cracking ECDSA encryption. But even if that's the case, it seems that 24-word seed phrases do have this specific advantage (resistance to brute-forcing) over 12-word phrases.
|
|
|
|
|
|