0 0 0

BIP39 Keymark to transfer private key

rinay
1月前 287

The process of BIP39 notes to the private key involves a series of complex steps. These steps follow the standards such as Bitcoin improvement proposal (BIP) 39 and BIP32. The following is a detailed process of BIP39 notes converted into a private key:

1. Overview of BIP39 Notes Generation Generation Process

BIP39 notes are a short saying of easy memory words to generate a private key for cryptocurrencies. The generation of notes usually includes the following steps:

1. Generate random numbers: First of all, a random number of 128-256 digits is for all.
2. Add school test: SHA256 hash, take the front X bit (x = random digit / 32) as the verification bit, and add it to the random number.
3. Grouping and conversion: The random number of the additional school test is divided into one group in one group. Each 11 -bit binary number can be converted into a number of 0 ~ 2047, and then check the table (notes of the word dictionary, Contains 2048 words) to get the corresponding words, which constitutes a helping word.

Second, the steps of BIP39 notes to the private key

1. Standardized coding: NPKD is used for standardized coding to use NFKD with "Mnemonic" plus the user settings). This step is to ensure that the input aid and salt are consistent in coding to avoid errors caused by differences in coding.

2. Generate seeds: Use PASSWORD-BASED KEY DERIVATION FUNCTION 2) Algorithm and HMAC-SHA512 hash functions to encrypt the standardized coding notes and salt. Essence This seed is the key to generating a private key in the future.

3. Extract private key: From the generated 512 seeds, the first 256 digits are private keys. Private key is the cornerstone of the security of cryptocurrency accounts, which is used to sign a transaction and prove the identity of the trading initiator.

Third, precautions

1. Safety: When generating and storing assistance, it is necessary to maintain high security. Once the notes are leaked, the security of private keys and cryptocurrency assets will be seriously threatened.
2. Backup: It is recommended to properly back up the notes in multiple safety places to prevent loss or damage. At the same time, avoid storing notes on equipment or networks that are easily attacked.
3. Verification: Before converting the aid words into a private key, the correctness of the aid word should be verified. This usually involves converting the word -of -the -ware transformation back to the original random number and re -calculating the SHA256 hash calculation to verify whether the school test is correct.

In summary, the process of BIP39 notes to the private key is a complex encryption process, involving multiple steps and algorithms. Be sure to operate in accordance with the standard process and ensure the safety of the word aid.

Mnemonic to private key

最新回复 (0)

    暂无评论

请先登录后发表评论!

返回
  • 请先登录后发表评论!