mirror of
https://github.com/bitcoin/bips.git
synced 2025-05-12 12:03:29 +00:00
commit
8ac51158bd
@ -5,6 +5,7 @@
|
|||||||
Pavol Rusnak <stick@satoshilabs.com>
|
Pavol Rusnak <stick@satoshilabs.com>
|
||||||
ThomasV <thomasv@bitcointalk.org>
|
ThomasV <thomasv@bitcointalk.org>
|
||||||
Aaron Voisine <voisine@gmail.com>
|
Aaron Voisine <voisine@gmail.com>
|
||||||
|
Sean Bowe <ewillbefull@gmail.com>
|
||||||
Status: Draft
|
Status: Draft
|
||||||
Type: Standards Track
|
Type: Standards Track
|
||||||
Created: 10-09-2013
|
Created: 10-09-2013
|
||||||
@ -12,35 +13,39 @@
|
|||||||
|
|
||||||
==Abstract==
|
==Abstract==
|
||||||
|
|
||||||
This BIP describes an usage of mnemonic code or mnemonic sentence - a group of
|
This BIP describes the implementation of a mnemonic code or mnemonic sentence --
|
||||||
easy to remember words - to generate deterministic wallets.
|
a group of easy to remember words -- for the generation of deterministic wallets.
|
||||||
|
|
||||||
It consists of two parts: generating the mnemonic and converting it into
|
It consists of two parts: generating the mnenomic, and converting it into a
|
||||||
a binary seed. This seed can be later used to generate deterministic wallets
|
binary seed. This seed can be later used to generate deterministic wallets using
|
||||||
using BIP-0032 or similar methods.
|
BIP-0032 or similar methods.
|
||||||
|
|
||||||
==Motivation==
|
==Motivation==
|
||||||
|
|
||||||
Such mnemonic code or mnemonic sentence is much easier to work with than working
|
A mnenomic code or sentence is superior for human interaction compared to the
|
||||||
with the binary data directly (or its hexadecimal interpretation). The sentence
|
handling of raw binary or hexidecimal representations of a wallet seed. The
|
||||||
could be writen down on paper (e.g. for storing in a secure location such as
|
sentence could be written on paper or spoken over the telephone.
|
||||||
safe), told over telephone or other voice communication method, or memorized
|
|
||||||
in ones memory (this method is called brainwallet).
|
This guide meant to be as a way to transport computer-generated randomnes over
|
||||||
|
human readable transcription. It's not a way how to process user-created
|
||||||
|
sentences (also known as brainwallet) to wallet seed.
|
||||||
|
|
||||||
==Generating the mnemonic==
|
==Generating the mnemonic==
|
||||||
|
|
||||||
First, we decide how much entropy we want mnemonic to encode. Recommended size
|
The mnemonic must encode entropy in any multiple of 32 bits. With larger entropy
|
||||||
is 128-256 bits, but basically any multiple of 32 bits will do. More bits
|
security is improved but the sentence length increases. We can refer to the
|
||||||
mean more security, but also longer word sentence.
|
initial entropy length as ENT. The recommended size of ENT is 128-256 bits.
|
||||||
|
|
||||||
We take initial entropy of ENT bits and compute its checksum by taking first
|
First, an initial entropy of ENT bits is generated. A checksum is generated by
|
||||||
ENT / 32 bits of its SHA256 hash. We append these bits to the end of the initial
|
taking the first <pre>ENT / 32</pre> bits of its SHA256 hash. This checksum is
|
||||||
entropy. Next we take these concatenated bits and split them into groups of 11
|
appended to the end of the initial entropy. Next, these concatenated bits are
|
||||||
bits. Each group encodes number from 0-2047 which is a position in a wordlist.
|
are split into groups of 11 bits, each encoding a number from 0-2047, serving
|
||||||
We convert numbers into words and use joined words as mnemonic sentence.
|
as an index to a wordlist. Later, we will convert these numbers into words and
|
||||||
|
use the joined words as a mnemonic sentence.
|
||||||
|
|
||||||
The following table describes the relation between initial entropy length (ENT),
|
The following table describes the relation between the initial entropy
|
||||||
checksum length (CS) and length of the generated mnemonic sentence (MS) in words.
|
length (ENT), the checksum length (CS) and length of the generated mnemonic
|
||||||
|
sentence (MS) in words.
|
||||||
|
|
||||||
<pre>
|
<pre>
|
||||||
CS = ENT / 32
|
CS = ENT / 32
|
||||||
@ -57,49 +62,57 @@ MS = (ENT + CS) / 11
|
|||||||
|
|
||||||
==Wordlist==
|
==Wordlist==
|
||||||
|
|
||||||
In previous section we described how to pick words from a wordlist. Now we
|
An ideal wordlist has the following characteristics:
|
||||||
describe how does a good wordlist look like.
|
|
||||||
|
|
||||||
a) smart selection of words
|
a) smart selection of words
|
||||||
- wordlist is created in such way that it's enough to type just first four
|
- wordlist is created in such way that it's enough to type the first four
|
||||||
letters to unambiguously identify the word
|
letters to unambiguously identify the word
|
||||||
|
|
||||||
b) similar words avoided
|
b) similar words avoided
|
||||||
- words as "build" and "built", "woman" and "women" or "quick" or "quickly"
|
- word pairs like "build" and "built", "woman" and "women", or "quick" and "quickly"
|
||||||
not only make remembering the sentence difficult, but are also more error
|
not only make remembering the sentence difficult, but are also more error
|
||||||
prone and more difficult to guess (see point below)
|
prone and more difficult to guess
|
||||||
- we avoid these words by carefully selecting them during addition
|
|
||||||
|
|
||||||
c) sorted wordlists
|
c) sorted wordlists
|
||||||
- wordlist is sorted which allow more efficient lookup of the code words
|
- wordlist is sorted which allows for more efficient lookup of the code words
|
||||||
(i.e. implementation can use binary search instead of linear search)
|
(i.e. implementation can use binary search instead of linear search)
|
||||||
- this also allows trie (prefix tree) to be used, e.g. for better compression
|
- this also allows trie (prefix tree) to be used, e.g. for better compression
|
||||||
|
|
||||||
Wordlist can contain native characters, but they have to be encoded using UTF-8.
|
The wordlist can contain native characters, but they have to be encoded in UTF-8
|
||||||
|
using Normalization Form Compatibility Decomposition (NFKD).
|
||||||
|
|
||||||
==From mnemonic to seed==
|
==From mnemonic to seed==
|
||||||
|
|
||||||
User can decide to protect his mnemonic by passphrase. If passphrase is not present
|
A user may decide to protect their mnemonic by passphrase. If a passphrase is not
|
||||||
an empty string "" is used instead.
|
present, an empty string "" is used instead.
|
||||||
|
|
||||||
To create binary seed from mnemonic, we use PBKDF2 function with mnemonic sentence
|
To create a binary seed from the mnemonic, we use PBKDF2 function with a mnemonic
|
||||||
(in UTF-8) used as a password and string "mnemonic" + passphrase (again in UTF-8)
|
sentence (in UTF-8 NFKD) used as a password and string "mnemonic" + passphrase (again
|
||||||
used as a salt. Iteration count is set to 4096 and HMAC-SHA512 is used as a pseudo-
|
in UTF-8 NFKD) used as a salt. Iteration count is set to 2048 and HMAC-SHA512 is used as
|
||||||
random function. Desired length of the derived key is 512 bits (= 64 bytes).
|
a pseudo-random function. Desired length of the derived key is 512 bits (= 64 bytes).
|
||||||
|
|
||||||
This seed can be later used to generate deterministic wallets using BIP-0032 or
|
This seed can be later used to generate deterministic wallets using BIP-0032 or
|
||||||
similar methods.
|
similar methods.
|
||||||
|
|
||||||
The conversion of the mnemonic sentence to binary seed is completely independent
|
The conversion of the mnemonic sentence to binary seed is completely independent
|
||||||
from generating the sentence. This results in rather simple code, there are no
|
from generating the sentence. This results in rather simple code; there are no
|
||||||
constraints on sentence structure and clients are free to implement their own
|
constraints on sentence structure and clients are free to implement their own
|
||||||
wordlists or even whole sentence generators (they'll lose the proposed method
|
wordlists or even whole sentence generators, allowing for flexibility in wordlists
|
||||||
for typo detection in that case, but they can come up with their own).
|
for typo detection or other purposes.
|
||||||
|
|
||||||
Described method also provides plausable deniability, because every passphrase
|
Although using mnemonic not generated by algorithm described in "Generating the
|
||||||
|
mnemonic" section is possible, this is not advised and software must compute
|
||||||
|
checksum of the mnemonic sentence using wordlist and issue a warning if it is
|
||||||
|
invalid.
|
||||||
|
|
||||||
|
Described method also provides plausible deniability, because every passphrase
|
||||||
generates a valid seed (and thus deterministic wallet) but only the correct one
|
generates a valid seed (and thus deterministic wallet) but only the correct one
|
||||||
will make the desired wallet available.
|
will make the desired wallet available.
|
||||||
|
|
||||||
|
==Wordlists==
|
||||||
|
|
||||||
|
* [[bip-0039/english.txt|English]]
|
||||||
|
|
||||||
==Test vectors==
|
==Test vectors==
|
||||||
|
|
||||||
See https://github.com/trezor/python-mnemonic/blob/master/vectors.json
|
See https://github.com/trezor/python-mnemonic/blob/master/vectors.json
|
||||||
|
2048
bip-0039/english.txt
Normal file
2048
bip-0039/english.txt
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user