BIP141 is mainly related to Bitcoin block expansion, while the process of converting mnemonics to private keys does not directly depend on a specific BIP number, such as BIP141. The process of converting mnemonics to private keys usually follows the standards of BIP32 and BIP39. The following are the general steps for converting BIP39 mnemonics to private keys:
I. Overview of the BIP39 mnemonic generation process
The BIP39 specification provides an algorithm for calculating seeds through mnemonics, so that users can more conveniently remember and use private keys. The mnemonic generation process is roughly as follows:
1. Generate a random number: First, generate a 128-256 bit random number, and the number of bits of this random number must be a multiple of 32.
2. Add check digits: Perform SHA256 hash operation on the random number, and take the first X bits as check digits (X = number of random number bits / 32).
3. Grouping: Divide the random number with check digits into groups of 11 bits each, forming several groups.
4. Find the mnemonic: Every 11 bits can get a number ranging from 0 to 2047. According to these numbers, the corresponding English words are found in the mnemonic dictionary to get the mnemonic.
2. The process of converting mnemonics to private keys
1. Normalized encoding: The mnemonic and salt (usually "mnemonic" plus the password set by the user) are normalized using NFKD.
2. Get the seed: Use the PBKDF2 algorithm (based on the HMAC-SHA512 hash algorithm and 2048 calculations) to derive a 512-bit seed from the mnemonic and salt.
3. Extract the private key: From the 512-bit seed, the first 256 bits are the private key. This part of the private key is used to encrypt and decrypt data to ensure that only users with private keys can access and control the cryptocurrency.
3. Precautions
1. Security: The security of mnemonics and private keys is critical. Users must keep the mnemonics properly to avoid leaking them to unauthorized personnel.
2. Compatibility: Different wallet manufacturers may use different mnemonic dictionaries or generation rules, but wallets that follow the BIP39 standard are generally compatible with each other.
3. Backup: In order to prevent the loss of mnemonics, users should back up mnemonics in multiple safe places and ensure the integrity and readability of the backups.
In summary, although BIP141 is related to the expansion of the Bitcoin block, the process of converting mnemonics to private keys mainly follows the standards of BIP39 and BIP32. Users should ensure that they follow the correct steps to ensure the security of cryptocurrency.
Mnemonic to private key
I. Overview of the BIP39 mnemonic generation process
The BIP39 specification provides an algorithm for calculating seeds through mnemonics, so that users can more conveniently remember and use private keys. The mnemonic generation process is roughly as follows:
1. Generate a random number: First, generate a 128-256 bit random number, and the number of bits of this random number must be a multiple of 32.
2. Add check digits: Perform SHA256 hash operation on the random number, and take the first X bits as check digits (X = number of random number bits / 32).
3. Grouping: Divide the random number with check digits into groups of 11 bits each, forming several groups.
4. Find the mnemonic: Every 11 bits can get a number ranging from 0 to 2047. According to these numbers, the corresponding English words are found in the mnemonic dictionary to get the mnemonic.
2. The process of converting mnemonics to private keys
1. Normalized encoding: The mnemonic and salt (usually "mnemonic" plus the password set by the user) are normalized using NFKD.
2. Get the seed: Use the PBKDF2 algorithm (based on the HMAC-SHA512 hash algorithm and 2048 calculations) to derive a 512-bit seed from the mnemonic and salt.
3. Extract the private key: From the 512-bit seed, the first 256 bits are the private key. This part of the private key is used to encrypt and decrypt data to ensure that only users with private keys can access and control the cryptocurrency.
3. Precautions
1. Security: The security of mnemonics and private keys is critical. Users must keep the mnemonics properly to avoid leaking them to unauthorized personnel.
2. Compatibility: Different wallet manufacturers may use different mnemonic dictionaries or generation rules, but wallets that follow the BIP39 standard are generally compatible with each other.
3. Backup: In order to prevent the loss of mnemonics, users should back up mnemonics in multiple safe places and ensure the integrity and readability of the backups.
In summary, although BIP141 is related to the expansion of the Bitcoin block, the process of converting mnemonics to private keys mainly follows the standards of BIP39 and BIP32. Users should ensure that they follow the correct steps to ensure the security of cryptocurrency.
Mnemonic to private key