Search content
Sort by

Showing 9 of 9 results by tobben1998
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 11:34:26 UTC
The only thing i enter my private key into is a ledger/trezor. When I sign something, the private key never leaves those devices.

What Trezor device do you have? Trezor T natively supports Shamir Backup. It generates up to 16 shares with 20 or 33 words each. You can also set the number of shares needed to recover your wallet (the minimum is 2).

Currently I only have a ledgers, but I have been thinking of buying trezor too. Thanks, i will check it out.
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 10:53:29 UTC
I want to do it on pen and paper, so that I never have to type my hole private key into a computer. I do not have any good hardware that i do know for sure that no one has hacked or spyed on in some kind of way.

Unless you are going to try to sign transactions using a pen and paper, at some point you will need to enter your private key into a computer.
Same applies to the generation of the private-/public keypair.

You won't be able to do everything without a computer. Do you already have a solution for the generation and transaction signing ?

The only thing i enter my private key into is a ledger/trezor. When I sign something, the private key never leaves those devices.
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 10:16:37 UTC
Do you have a link to scheme that is made and approved by cryptographer, that i am able to do with pen and paper and would require 2 of 4 parts? I would be more than happy to use that, but I have not been able to find it.

Secret sharing schemes usually involve mathematics (and not just simple calculations).
You can do every scheme with pen and paper, altough it is not that easy.

Sharing schemes based on the chinese remainder theorem aren't that hard to calculate with pen and paper (and a calculator maybe).
Take a look at Mignotte's and Asmuth-Bloom's sharing schemes. There is even an example on wikipedia on how to split and retrieve the secret.

You can definitely do them without a computer. However using a small (even self-written) script which implements that scheme should be fine too from a security-related point of view. But then, i don't know what your thread model is and why you want to do it with pen/paper only.

Thanks, i will look it up. I want to do it on pen and paper, so that I never have to type my hole private key into a computer. I do not have any good hardware that i do know for sure that no one has been hacked or spyed on in some kind of way.

The model is simply lots of one timpads combined in a way that that i only two parts to construct back to the original. I have found serval posts on rediit, bitcointalk etc that describe this method with 2 of 3, I have simply added more onetime pads and combined them to fit with 2 of 4
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 09:51:19 UTC
Just stop creating your own techniques.
Use a very well known, common and functional secret sharing scheme, such as Shamir's (SSS).

Doing your own crypto always fails. Whether encryption or something else doesn't matter.
Professionals in the field of crypto already created several good secret sharing schemes.

You don't have to use Shamir'r secret sharing scheme which is based on polynomial interpolation.
There are other gemoetric schemes or schemes based on the chinese remainder theorem available.

Just use a scheme made and approved by cryptographer.

Don't do your own crypto!

Do you have a link to scheme that is made and approved by cryptographer, that i am able to do with pen and paper and would require 2 of 4 parts? I would be more than happy to use that, but I have not been able to find it.
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 09:21:28 UTC
secret sharing (splitting a secret) =/= encryption

if you are looking for security for your secrets (including mnemonic words) then try finding an actual encryption method (such as AES) to actually encrypt them instead of trying to re-invent the wheel. specifically speaking unless you are a cryptography expert you should not attempt at coming up with your own methods, because there is a good chance that you'll end up with a lot of flaws even if they aren't apparent in the beginning.

It appers to me that onetimepad is fairly commin way to encrypt. It will give no information about the seed, as long as it is truly random and the length of it is equal or larger than the orginal seed.
http://users.telenet.be/d.rijmenants/en/onetimepad.htm
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 09:11:42 UTC
Let me ask you a completely different question... what do you want to achieve by splitting the sheets? You are faced with the same problem as if you split the sheet into two parts: keeping them safe so that no third party can access them.
Splitting the sheets even more only bears the risk of making a mistake during the transformation or recovery. In my opinion, the added value of frequent splitting is - compared to the effort and the error-proneness - quite low.

If you are doing this for another reason (trying out different methods of how to split the sheets, ...) then this is of course a different issue, but I don't think so because of your question.


I want to be able to construct the orginal back from only two parts, so if i am able to lose one or even to parts, i can construct it back anyway. I also want the extra security that if someone only find one they cant use it. If the hiding spot i was thinking of was a lot worse than i thougt and some people find it, i dont want them to be able to get any information from that and get acess to my fund. I know I need to construct them back one time, but i can do that mannualy, so the only thing I need to trust with my hole private key is ledger. But I think that is safe enough for me
Post
Topic
Board Development & Technical Discussion
Re: Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 08/06/2020, 09:03:47 UTC
I want to be able to construct the orginal back from only two parts, so if i am able to lose one or even to parts, i can construct it back anyway. I also want the extra security that if someone only find one they cant use it. If the hiding spot i was thinking of was a lot worse than i thougt and some people find it, i dont want them to be able to get any information from that and get acess to my fund. I know I need to construct them back one time, but i can do that mannualy, so the only thing I need to trust with my hole private key is ledger. But I think that is safe enough for me.
Post
Topic
Board Development & Technical Discussion
Topic OP
Splitting seed. 2 of 4 requierd to construct back
by
tobben1998
on 07/06/2020, 20:08:16 UTC
Hi, I want to split my private key/seed into 4 parts, and only need 2 to construct it back to original  I am thinking of using onetimepad for the encryption. My plan is to generate serval random 24 word seeds with bip 39.

A1, B1 ... is random  generatet, and A2,B2 is constructet so the equations are equal to S

I will add them word by word and use modulo 2048 if the number gets over 2048. I want to do this, so it is easy to do by hand, and so I dont need to trust on some software to do it correct. I will make serval equations and split them in different locations nr1, nr2 ... , as listet below


S=A1+A2
S=B1+B2
S=C1+C2
S=D1+D2
S=E1+E2
S=F1+F2

Nr1:A1B1C1
Nr2:A2D1E1
Nr3:B2D2F1
Nr4:C2E2F2

My questions is. Do you see some major problems with this kind of splitting? I will only add them together mannualy an enter them in to an ledger, so ofcourse I need to trust the ledger, but no other software or hardware.

Antoher question. I have read some places that is it hard to construct x1 and x2 so the checksums of those  seeds are correct, butdoes  that really matter. Will it be sigificant easier to bruteforce in a way, or make some other problems for me.

Thanks for your advises.

Post
Topic
Board Development & Technical Discussion
Re: My technique to split seed for cold storage
by
tobben1998
on 05/06/2020, 13:36:51 UTC
This method does work with with 2 of 3; You perform the method 3 times and divide the encryption seeds like this:

Alex: A1, A2
Bob: B1, A3
Charlie: B2, B3

IMO this is a better method that SSS. SSS relies to heavily on non standard software, must be done on a secure computer and the resulting shares are difficult to record. SSS is better suited for n of m where m is large as this method does not scale favourably; You need to create a share for each subset of m of size n, which grows exponentially as m increases.

http://users.telenet.be/d.rijmenants/en/secretsplitting.htm
https://bitcoin.stackexchange.com/a/65434/69224


Is this the correct way for 2 of 4 if S=x1+x2, x=(A to F)?

Nr1:A1,B1,C1
Nr2:A2,D1,E1
Nr3:B2,D2,F1
nr4:C2,E2,F2