Bitcoin Forum
December 26, 2025, 09:17:27 AM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Brain master private key  (Read 207 times)
velhoti (OP)
Full Member
***
Offline Offline

Activity: 162
Merit: 110


In the land of fiat, the one-bitcoined man is king


View Profile
December 21, 2025, 03:04:28 AM
Merited by ABCbits (2), vapourminer (1)
 #1

I have searched and I was not able to find some method for generate master key from some password, just like abundantly available brain wallet software generate private key from password.

I believe that brain master key is as (in)secure as as brain wallets, and it is simple to implement, none technical issue.

Am I missing something, why there are no brain master private key generators? 

WWW.TALKIMG.COM | Image hosting for BitcoinTalk | Official Topic
nc50lc
Legendary
*
Offline Offline

Activity: 3010
Merit: 8171


Self-proclaimed Genius


View Profile
December 21, 2025, 03:24:22 AM
Merited by vapourminer (4), pooya87 (4), ABCbits (2)
 #2

I believe that brain master key is as (in)secure as as brain wallets, and it is simple to implement, none technical issue.
It can be very simple, for example: one could use SHA512 instead of SHA256 to get the desired size for a master private key.
Then the 512-bit result can be encoded into an xprv key.

But it's as you said, it's as insecure as a Brainwallet.

Quote from: velhoti
Am I missing something, why there are no brain master private key generators?  
The reason is the above.
Since Brainwallet isn't recommended and actually proven insecure, why would anyone create something that's an HD version of it?
Even if someone does, they would label it "not for practical use" or not even share it.

pooya87
Legendary
*
Offline Offline

Activity: 4046
Merit: 12110



View Profile
December 21, 2025, 04:00:33 AM
 #3

Maybe because real developers always try to expand ideas that are good and useful. For example we had BIP-32 which was a solid proposal and a safe key derivation method, so they expanded it by introducing BIP-39 which improved it. Because of its popularity, the improvements continued: we have BIP-43, BIP-44, BIP-47, BIP-48, BIP-49, BIP-84, BIP-85, BIP-86 even SLIP-32.

They usually don't try to build on top of a bad/broken ideas, in this case "brainwallets". This is why all these years we've only seen people change the hash function in brainwallets (eg. increasing rounds, replacing SHA256 with scrypt) in a failed attempt to fix a broken idea that never gained any popularity either.

velhoti (OP)
Full Member
***
Offline Offline

Activity: 162
Merit: 110


In the land of fiat, the one-bitcoined man is king


View Profile
December 21, 2025, 04:54:47 AM
 #4

Since Brainwallet isn't recommended and actually proven insecure, why would anyone create something that's an HD version of it?

I guess brain wallets were designed as cold wallets, and it adds an extra layer of security if it neves signs something, although still insecure.

Brain HD wallets may preserve privacy even when it sign txs. Seems less bad.

WWW.TALKIMG.COM | Image hosting for BitcoinTalk | Official Topic
ABCbits
Legendary
*
Offline Offline

Activity: 3458
Merit: 9509



View Profile
December 21, 2025, 07:28:31 AM
Merited by vapourminer (1)
 #5

Quote from: velhoti
Am I missing something, why there are no brain master private key generators?  
The reason is the above.
Since Brainwallet isn't recommended and actually proven insecure, why would anyone create something that's an HD version of it?
Even if someone does, they would label it "not for practical use" or not even share it.

FWIW, warpwallet[1] attempt to reduce security issue by using "salt" and scrypt (that replace SHA-256) with about half million rounds.

[1] https://github.com/keybase/warpwallet

CryptoVoyager24
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
December 21, 2025, 08:19:42 AM
 #6

I agree with @nc50lc. Building dedicated tools for this encourages dangerous habits.
​However, users who insist on a 'brain key' setup effectively already have it with the BIP39 Passphrase feature (the 13th word). If you take a standard seed and add a very complex memorized passphrase, you get the benefits of a brainwallet (useless without the password) combined with the cryptographic strength of the random seed. This is the only 'brain' approach that doesn't sacrifice security.
LoyceV
Legendary
*
Offline Offline

Activity: 3906
Merit: 20751


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
December 21, 2025, 01:33:25 PM
Merited by vapourminer (1)
 #7

why there are no brain master private key generators?
I created my own system as an experiment years ago. I can create unlimited private keys from this. See I REGAINED access to Bitcoins in my made-up brainwallet!
Note: I don't dare use it for any serious amount Smiley

¡uʍop ǝpᴉsdn pɐǝɥ ɹnoʎ ɥʇᴉʍ ʎuunɟ ʞool no⅄
nc50lc
Legendary
*
Offline Offline

Activity: 3010
Merit: 8171


Self-proclaimed Genius


View Profile
December 22, 2025, 03:10:13 AM
Merited by vapourminer (4)
 #8

I guess brain wallets were designed as cold wallets, and it adds an extra layer of security if it neves signs something, although still insecure.

Brain HD wallets may preserve privacy even when it sign txs. Seems less bad.
Ah since you mentioned "signs something", it's about the future and QC resistance then?
It may be true if it's not used to spend, but the actual underlying issue is the weakness of "human entropy".
This is proven that even a long brainwallet is susceptible to bruteforce attacks.

On the other hand, some others who made their "creative" security patches ended up with lost funds due to the complexity of its recovery or having no standard to follow.
I'm not saying that most of them lost their bitcoins;
But since the main problem of not using RNG isn't solved by using the same concept as Brainwallet, not a single version of it became popular.

velhoti (OP)
Full Member
***
Offline Offline

Activity: 162
Merit: 110


In the land of fiat, the one-bitcoined man is king


View Profile
December 22, 2025, 03:39:33 AM
Last edit: December 22, 2025, 04:27:58 AM by velhoti
Merited by vapourminer (4)
 #9

Ah since you mentioned "signs something", it's about the future and QC resistance then?
It may be true if it's not used to spend, but the actual underlying issue is the weakness of "human entropy".

I didn't really think about QC, I thought about security from classical attacks, and yes, I know the main problem is most people's low entropy.

The point is that brainwallets do not preserve privacy because they use a single address in all UTXOs, if you are going to use one, it is better to use a BrainHDWallet.

Regarding entropy, I admit that it is a broken idea and the only thing that comes to my mind are body metrics as RNG (fingerprint, iris...), to give entropy to some password. Still "human", not sure if it has high entropy.

I created my own system as an experiment years ago. I can create unlimited private keys from this. See I REGAINED access to Bitcoins in my made-up brainwallet!
Note: I don't dare use it for any serious amount Smiley

It seems to be very important in this case to store the generation method safely and redundantly. And since you have to store something, it might be better to store a passphrase instead.

WWW.TALKIMG.COM | Image hosting for BitcoinTalk | Official Topic
Eze BTC
Newbie
*
Offline Offline

Activity: 14
Merit: 1


View Profile
December 24, 2025, 12:50:02 AM
Last edit: December 24, 2025, 01:28:38 AM by Eze BTC
 #10

Ah since you mentioned "signs something", it's about the future and QC resistance then?
It may be true if it's not used to spend, but the actual underlying issue is the weakness of "human entropy".

I didn't really think about QC, I thought about security from classical attacks, and yes, I know the main problem is most people's low entropy.

The point is that brainwallets do not preserve privacy because they use a single address in all UTXOs, if you are going to use one, it is better to use a BrainHDWallet.

Regarding entropy, I admit that it is a broken idea and the only thing that comes to my mind are body metrics as RNG (fingerprint, iris...), to give entropy to some password. Still "human", not sure if it has high entropy.

I created my own system as an experiment years ago. I can create unlimited private keys from this. See I REGAINED access to Bitcoins in my made-up brainwallet!
Note: I don't dare use it for any serious amount Smiley

It seems to be very important in this case to store the generation method safely and redundantly. And since you have to store something, it might be better to store a passphrase instead.

A passphrase is better for real. You can easily get it backed up and as well stored in several locations. This will handle and minimize risks of failure. Also, when passphrase has been compromised, it can easily be changed.
nc50lc
Legendary
*
Offline Offline

Activity: 3010
Merit: 8171


Self-proclaimed Genius


View Profile
December 24, 2025, 03:24:29 AM
Merited by LoyceV (6), ABCbits (5), vapourminer (4)
 #11

Also, when passphrase has been compromised, it can easily be changed.
Please expand this part, I'm very interested to know your thoughts on why you think it's easy to change.

IMO, while BIP39 passphrase is indeed better than using an HD version of Brainwallet, it can't be changed that easily.
Because changing the passphrase will entirely change the wallet's binary seed, thus its master private key, private keys to addresses.
So if you want to change it, the whole HD wallet's BTC has to be sent to the new wallet with the new passphrase, same seed phrase or not.
I think it's not an easy task with security and privacy in consideration.

Eze BTC
Newbie
*
Offline Offline

Activity: 14
Merit: 1


View Profile
December 24, 2025, 08:51:47 AM
 #12

Also, when passphrase has been compromised, it can easily be changed.
Please expand this part, I'm very interested to know your thoughts on why you think it's easy to change.

IMO, while BIP39 passphrase is indeed better than using an HD version of Brainwallet, it can't be changed that easily.
Because changing the passphrase will entirely change the wallet's binary seed, thus its master private key, private keys to addresses.
So if you want to change it, the whole HD wallet's BTC has to be sent to the new wallet with the new passphrase, same seed phrase or not.
I think it's not an easy task with security and privacy in consideration.

You're not far from the truth in most of things said.

Howbeit, it's important to know that, just like you agree, it is better BIP39 passphrase is better than using HD version of Brainwallet, being easier to change shouldn't be a sole reason one would prefer the later.

Now, to respond to you, that I said it's easy doesn't mean it is easier. My point is, changing passphrase is not difficult, not really against HD version, but it's something you can do without much difficulties. If we can all agree that it's better, why should the mere fact that the other is easier to change make us prefer it? It must not be easier to change compared to the other, in fact, not being easier shows how much better it is regarding security. The point is, it is possible to change without one crying his way out. You get me now?

On the second issue, you seem to point that one will be trapped in one passphrase. I disagree with that. Lots of wallets give you privilege to get many passphrases saved to microSD or keep them associated with another PINs. This suggests you can migrate funds progressively and run both wallets in parallel till movement is completed.

I sincerely hope you get my points bro, especially the issue of being easy and it's different with being easier

ABCbits
Legendary
*
Offline Offline

Activity: 3458
Merit: 9509



View Profile
December 24, 2025, 09:53:38 AM
Merited by vapourminer (1)
 #13

--snip--
A passphrase is better for real. You can easily get it backed up and as well stored in several locations. This will handle and minimize risks of failure. Also, when passphrase has been compromised, it can easily be changed.

Do you realize the security would be reduced if someone follow your advice? Previously attacker need to guess both BIP39 words and passphrase, but afterwards the attack only need to guess new passphrase.

Eze BTC
Newbie
*
Offline Offline

Activity: 14
Merit: 1


View Profile
December 24, 2025, 10:10:33 AM
 #14

--snip--
A passphrase is better for real. You can easily get it backed up and as well stored in several locations. This will handle and minimize risks of failure. Also, when passphrase has been compromised, it can easily be changed.

Do you realize the security would be reduced if someone follow your advice? Previously attacker need to guess both BIP39 words and passphrase, but afterwards the attack only need to guess new passphrase.

I disagree with that though. There are thousands of possibilities that need to be guessed to arrive at new phrase. The possibility of attacker guessing right is very low. Just like when we were kids and tried guessing numbers of mobile service providers airtime recharge numbers. It may seem easy, but when you make attempts, you'd notice that it's nearly impossible.
ABCbits
Legendary
*
Offline Offline

Activity: 3458
Merit: 9509



View Profile
December 24, 2025, 10:19:54 AM
Merited by vapourminer (4)
 #15

--snip--
A passphrase is better for real. You can easily get it backed up and as well stored in several locations. This will handle and minimize risks of failure. Also, when passphrase has been compromised, it can easily be changed.

Do you realize the security would be reduced if someone follow your advice? Previously attacker need to guess both BIP39 words and passphrase, but afterwards the attack only need to guess new passphrase.

I disagree with that though. There are thousands of possibilities that need to be guessed to arrive at new phrase. The possibility of attacker guessing right is very low. Just like when we were kids and tried guessing numbers of mobile service providers airtime recharge numbers. It may seem easy, but when you make attempts, you'd notice that it's nearly impossible.

Your analogy is a poor one, because computer can guess/brute-force much faster than human. BTCRecover have speed over 100 thousand per second using GPU released 6 years ago[1]. BIP39 use 2048 rounds[2] while average brainwallet only use 1 round, but human usually can't avoid using guessable passphrase[3].

[1] https://docs.btcrecover.org/en/latest/GPU_Acceleration/#performance-notes
[2] https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki#from-mnemonic-to-seed
[3] https://bitcointalk.org/index.php?topic=4768828.0

Eze BTC
Newbie
*
Offline Offline

Activity: 14
Merit: 1


View Profile
December 24, 2025, 10:36:43 AM
 #16

--snip--
A passphrase is better for real. You can easily get it backed up and as well stored in several locations. This will handle and minimize risks of failure. Also, when passphrase has been compromised, it can easily be changed.

Do you realize the security would be reduced if someone follow your advice? Previously attacker need to guess both BIP39 words and passphrase, but afterwards the attack only need to guess new passphrase.

I disagree with that though. There are thousands of possibilities that need to be guessed to arrive at new phrase. The possibility of attacker guessing right is very low. Just like when we were kids and tried guessing numbers of mobile service providers airtime recharge numbers. It may seem easy, but when you make attempts, you'd notice that it's nearly impossible.

Your analogy is a poor one, because computer can guess/brute-force much faster than human. BTCRecover have speed over 100 thousand per second using GPU released 6 years ago[1]. BIP39 use 2048 rounds[2] while average brainwallet only use 1 round, but human usually can't avoid using guessable passphrase[3].

[1] https://docs.btcrecover.org/en/latest/GPU_Acceleration/#performance-notes
[2] https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki#from-mnemonic-to-seed
[3] https://bitcointalk.org/index.php?topic=4768828.0

The irony is that, your analogy is wrong. Having a strong, long and confidential passphrase makes it difficult to brutforce and arrive at expected result. Don't get me wrong, nothing is 100% perfect. The main point is that, it is not easy as you think.

https://api.cms.eset.com/au/cyber-resilience-why-cyber-risk-audit-makes-you-stronger
Dimitri.V.PSN
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
December 24, 2025, 10:38:45 AM
 #17

I have searched and I was not able to find some method for generate master key from some password, just like abundantly available brain wallet software generate private key from password.

I believe that brain master key is as (in)secure as as brain wallets, and it is simple to implement, none technical issue.

Am I missing something, why there are no brain master private key generators? 

You're absolutely right — from a cryptographic standpoint, deriving a master private key (e.g., for BIP32/BIP44 HD wallets) from a password is conceptually just as feasible and secure (or insecure) as brain wallets — it all comes down to entropy, KDF strength (e.g., PBKDF2, Argon2), and usage hygiene (password strength, salt handling, etc.).

The main reason dedicated "brain master key" tools are rare is likely UX and standardization: most users rely on mnemonic phrases (BIP39) as the human-friendly input, and wallets derive the master key from that. But technically — yes, password → seed → master key is trivial and sound.

That said, if you're looking for a simple, open, and secure way to generate HD-compatible master keys directly from a password (with optional salt and KDF tuning), I built a tool exactly for this use case:
👉 https://cutt.ly/QtdlHjOW

It supports:

BIP32/BIP44/BIP49/BIP84 derivation paths
Custom salts & strong KDFs (Argon2id, PBKDF2-HMAC-SHA512)
Export in WIF, xprv, and mnemonic (via reversible seed)
Client-side only — no data leaves your browser
Would love your feedback — especially from someone who’s thought this through as deeply as you have! 😊

💡 P.S. As with any brain- anything*, always remember: your password is your private key. No recovery, no second chances.*
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!