Tuesday, April 16, 2024
HomeBitcoinWhat is the uncooked logic for changing a seed phrase to non-public...

What is the uncooked logic for changing a seed phrase to non-public key



The method of changing a seed phrase (also referred to as a mnemonic seed phrase) into a personal key entails a couple of steps which might be based mostly on cryptographic capabilities. Under is a normal overview of the steps sometimes used within the Bitcoin protocol (BIP39 and BIP32 requirements):

(Instance: My EN generated is a 128 bit size of randomly generated ones and zeros. Divide 128 into 32 you get 4. Add 4 to 128 is 132. Then 132 divided by 11 ends in 12. These 12 bits are in contrast with the established 2048 phrases giving us the mnemonic 12 phrase phrase.)

( An instance making use of such operate will be considered by utilizing the calculator discovered at https://8gwifi.org/pbkdf.jsp)

  •   Producing the Grasp Personal Key and Chain Code:
    
    • The seed derived from the mnemonic is then used to generate the grasp non-public key and a grasp chain code.
    • That is performed utilizing the HMAC-SHA512 algorithm. The seed is used because the enter, and the hot button is set because the string “Bitcoin seed”.
    • The left 256 bits of the HMAC output are used because the grasp non-public key, and the fitting 256 bits are used because the grasp chain code.
      (This may be generated utilizing the compiler such because the one at https://instruments.onecompiler.com/hmac-sha512)
  •   Deriving Additional Keys:
    
    • The Prolonged Key makes use of the grasp non-public key and chain code, and thru a course of outlined in BIP32 (Hierarchical Deterministic Wallets), it permits producing a number of baby keys.
    • Every baby key can additional derive its personal baby keys, making a tree-like construction of keys. This permits for straightforward administration and backup of a number of addresses and accounts from a single seed.
      ( you may apply the generator on http://bip32.org)
  •   Public Keys or Handle Technology:
    
    • Personal keys derived within the above method will be additional processed to generate public keys utilizing elliptic curve multiplication (particularly on the secp256k1 curve in Bitcoin).
    • Public keys are then hashed and encoded to type cryptocurrency addresses, that are utilized in transactions.

( This course of is a little more concerned for an instance. There’s a calculator launched by Mr Maxwell however I’ve not ventured to put in: https://github.com/MrMaxweII/Secp256k1-Calculator/blob/grasp/README.md. For a dialogue on making use of the calculations I discovered this text helpful: https://steemit.com/ellipticcurve/@sso/calculate-bitcoin-publickey )

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments