Note these addresses are derived from the BIP32 Extended Key
Path
|
Address
|
Public Key
|
Private Key
|
---|---|---|---|
Entropy values should not include the BIP39 checksum. This is automatically added by the tool.
Entropy values must be sourced from a strong source of randomness. This can be coin flipping, dice rolling, random noise data etc. Never use your own words, sentences from books, keyword smashing or anything random at a first glance. It will be not random enough for this application.
Do not store entropy.
Storing entropy (i.e. keeping a deck of cards in a specific shuffled order) is unreliable compared to storing a seed phrase (mnemonic). Instead of storing entropy, store the mnemonic generated from the entropy. Preferably on some solid medium.
This random seed phrase generator uses a random number generator that is cryptographically secure. If random cryptographic module is not available in your browser, the tool will show you a warning and the tool will not work. If that happens you may want to changea browser or use your own source of entropy.
Card entropy has been implemented assuming cards are replaced, not drawn one after another.
What is PBKDF2 (Password Based Key Derivation Function 2) ?
Refer to this article about PBKDF2 or this wikipedia page for more info.
Default number of iterations used in wallets is 2048. Increasing this number should make it more secure against brute force attacks, however you will have to store this value. To access your wallet with custom PBKDF2 you should use this script (or similar) to calculate your BIP39 seed phrase.
PBKDF2 iterations less than 2048 might be insecure without extra passphrase.