I made a thread before about what life was like before seed phrase and I mentioned there briefly the BIP32 or the arrival of Hierarchical Deterministic Wallets.
Since, I focused on how seed phrase came to be I thought it would be a good idea to dive deeper this time into Hierarchical Deterministic Wallet.
The passage itself is a summary. This BIP32 allowed for us to generate multiple private keys or "accounts" from only one private or master key. From each private key generated from the master key comes a public key/public address.
(For those confused, a public address is the shortened version of the public key.) This public address is the one we share to the public so they can send crypto to that address. Here is an example of a public address:
1BvBPSEYmtWeeqTFn5Au5y4GFg7xJaNVN2
[2]This is what we typically see on blockchain explorer. But take note that just because public addresses are visible to everyone doesn't mean anyone can have access to your wallet. People can however see the entire transaction history of that specific public address.
Are public addresses safe to share? I will discuss what we call The Trapdoor Function. The trapdoor function is a function easy to compute in one direction but almost impossible to compute in the opposite direction without a specific information. This is a concept within the broad cryptography. How cryptocurrency works may be better understood with this in mind however, cryptocurrency like Bitcoin does not literally follow the trapdoor function but follows a similar concept of one-way computation which is called the Elliptic Curve Cryptography.
[1]Now this algorithm is a lot more complicated than my simple explanation of a trapdoor function. Think of ECC as this:
The main idea behind the algorithm is “dotting” a point with itself some relatively large number of times.
Let's say you have your private key, this private key is a number. You then dot a point within the elliptical curve the number of times your private key is which would generate your public key. A private key is a number
priv, and a public key is the public point dotted with itself
priv times.
[3]How does a public key become a public address?This is where the process of hashing comes in. What happens in hashing is data is passed through a specific algorithm called the SHA-256 algorithm which transforms the public key to become a public address.
[4]In conclusion, your private key is your lifeline. This is what you should keep safe and not give out to random people. Your public key is public to everyone and this will not put your wallet in danger. Personally, the complexity of cryptocurrency and the intentionality of each step makes me in awe even though I know I have barely scratched the surface.
Sources:
[1]
Public Address Meaning[2]
A (Relatively Easy To Understand) Primer on Elliptic Curve Cryptography[3]
Elliptic Curve Cryptography[4]
What is public key cryptography?