Post
Topic
Board Development & Technical Discussion
Merits 2 from 1 user
Topic OP
PBKDF2 iterations questions (seed to private key)
by
Sanglotslongs2
on 22/12/2020, 17:45:31 UTC
⭐ Merited by NotATether (2)
Hello,

When we have a valid entropy from mnemonic seed, we need to transform it to a valid seed.
To do it we use PBKDF2 - Password Based Key Derivation Function 2.

https://learnmeabitcoin.com/technical/mnemonic
 
Quote
PBKDF2 Settings:

Password: Mnemonic Sentence
Salt: "mnemonic"+(optional passphrase)
Iterations: 2048
Algorithm: HMAC-SHA512
Size: 64 bytes

1) If I do more iterations, I will have another valid seed ?

2) For example, if I decide to do 2048+1 PBKDF2 iterations, an attack against "standart wallet with 2048 iterations" will not be effective event if attacker have my mnemonic seed ?

3) If I want an off-standard seed, I can do like 2048x16 = 32k iterations, my wallet will be longer to set up but it's juste few minutes more, I will gain more resilience against brute force attack event if my mnemonic seed is leaked ?

4) I read severals iterations advice, 1024, 2048 or 4096, those advices change with time as computer become more and more powerful. So I can have several differents private key/address results if I use differents software version etc. ?

5) There is 2048^12 mnemonic possibility, is it enough to not care for PBKDF2 validity and just SHA-256 my mnemonic phrase to have a valid seed ? (discusion here : https://security.stackexchange.com/questions/16354/...)