2016-04-16 14:29:59 +00:00
[[ch05_wallets]]
2023-02-13 20:58:18 +00:00
== Wallet Recovery
Creating pairs of private and public keys is a crucial part of allowing
Bitcoin wallets to receive and spend bitcoins. But losing access to a
private key can make it impossible for anyone to ever spend the bitcoins
received to the corresponding public key. Wallet and protocol
developers over the years have worked to design systems that allow users
to recover access to their bitcoins after a problem without compromising
security the rest of the time.
In this chapter, we'll examine some of the different methods employed by
wallets to prevent the loss of data from becoming a loss of money.
Some solutions have almost no downsides and are universally adopted by
modern wallets. We'll simply recommend those solutions as best
practices. Other solutions have both advantages and disadvantages,
leading different wallet authors to make different tradeoffs.
In those cases, we'll describe the various options available.
2016-04-16 14:29:59 +00:00
2016-10-08 12:38:39 +00:00
=== Wallet Technology Overview
2023-02-11 17:46:57 +00:00
In this section we summarize the various technologies used to construct
user-friendly, secure, and flexible bitcoin wallets.
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "contents of")))A common misconception about bitcoin is
that bitcoin wallets contain bitcoin. In fact, the wallet contains only
keys. The "coins" are recorded in the blockchain on the Bitcoin network.
Users control the coins on the network by signing transactions with the
keys in their wallets. ((("keychains")))In a sense, a bitcoin wallet is
a _keychain_.
2016-04-16 14:29:59 +00:00
2016-10-04 13:32:27 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
Bitcoin wallets contain keys, not coins. Each user has a wallet
containing keys. Wallets are really keychains containing pairs of
private/public keys (see <<private_public_keys>>). Users sign
transactions with the keys, thereby proving they own the transaction
outputs (their coins). The coins are stored on the blockchain in the
form of transaction outputs (often noted as vout or txout).
2016-10-04 13:32:27 +00:00
====
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "types of", "primary distinctions")))There are two primary
types of wallets, distinguished by whether the keys they contain are
related to each other or not.
((("JBOK wallets", seealso="wallets")))((("wallets", "types of", "JBOK
wallets")))((("nondeterministic wallets", seealso="wallets")))The first
type is a _nondeterministic wallet_, where each key is independently
generated from a random number. The keys are not related to each other.
This type of wallet is also known as a JBOK wallet from the phrase "Just
a Bunch Of Keys."
((("deterministic wallets", seealso="wallets")))The second type of
wallet is a _deterministic wallet_, where all the keys are derived from
a single master key, known as the _seed_. All the keys in this type of
wallet are related to each other and can be generated again if one has
the original seed. ((("key derivation methods")))There are a number of
different _key derivation_ methods used in deterministic wallets.
((("hierarchical deterministic (HD) wallets", seealso="wallets")))The
most commonly used derivation method uses a tree-like structure and is
known as a _hierarchical deterministic_ or _HD_ wallet.
((("mnemonic code words")))Deterministic wallets are initialized from a
seed. To make these easier to use, seeds are encoded as English words,
also known as _mnemonic code words_.
The next few sections introduce each of these technologies at a high
level.
2016-10-08 12:38:39 +00:00
2016-10-04 13:32:27 +00:00
[[random_wallet]]
==== Nondeterministic (Random) Wallets
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "types of", "nondeterministic (random) wallets")))In the
first bitcoin wallet (now called Bitcoin Core), wallets were collections
of randomly generated private keys. For example, the original Bitcoin
Core client pregenerates 100 random private keys when first started and
generates more keys as needed, using each key only once. Such wallets
are being replaced with deterministic wallets because they are
cumbersome to manage, back up, and import. The disadvantage of random
keys is that if you generate many of them you must keep copies of all of
them, meaning that the wallet must be backed up frequently. Each key
must be backed up, or the funds it controls are irrevocably lost if the
wallet becomes inaccessible. This conflicts directly with the principle
of avoiding address reuse, by using each Bitcoin address for only one
transaction. Address reuse reduces privacy by associating multiple
transactions and addresses with each other. A Type-0 nondeterministic
wallet is a poor choice of wallet, especially if you want to avoid
address reuse because it means managing many keys, which creates the
need for frequent backups. Although the Bitcoin Core client includes a
Type-0 wallet, using this wallet is discouraged by developers of Bitcoin
Core. <<Type0_wallet>> shows a nondeterministic wallet, containing a
loose collection of random keys.
2016-04-16 14:29:59 +00:00
2016-10-04 13:32:27 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
The use of nondeterministic wallets is discouraged for anything other
than simple tests. They are simply too cumbersome to back up and use.
Instead, use an industry-standard–based _HD wallet_ with a
_mnemonic_ seed for backup.
2016-10-04 13:32:27 +00:00
====
2016-04-16 14:29:59 +00:00
2016-10-04 13:32:27 +00:00
[[Type0_wallet]]
2017-05-11 13:21:00 +00:00
[role="smallersixty"]
2016-10-04 13:32:27 +00:00
.Type-0 nondeterministic (random) wallet: a collection of randomly generated keys
2017-04-04 16:25:23 +00:00
image::images/mbc2_0501.png["Non-Deterministic Wallet"]
2016-04-16 14:29:59 +00:00
2016-10-04 13:32:27 +00:00
==== Deterministic (Seeded) Wallets
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "types of", "deterministic (seeded)
wallets")))Deterministic, or "seeded," wallets are wallets that contain
private keys that are all derived from a common seed, through the use of
a one-way hash function. The seed is a randomly generated number that is
combined with other data, such as an index number or "chain code" (see
<<hd_wallets>>) to derive the private keys. In a deterministic wallet,
the seed is sufficient to recover all the derived keys, and therefore a
single backup at creation time is sufficient. The seed is also
sufficient for a wallet export or import, allowing for easy migration of
all the user's keys between different wallet implementations.
<<Type1_wallet>> shows a logical diagram of a deterministic wallet.
2016-04-16 14:29:59 +00:00
2016-10-06 12:24:42 +00:00
[[Type1_wallet]]
2017-05-11 13:21:00 +00:00
[role="smallersixty"]
2017-04-18 21:47:06 +00:00
.Type-1 deterministic (seeded) wallet: a deterministic sequence of keys derived from a seed
2017-04-04 16:25:23 +00:00
image::images/mbc2_0502.png["Deterministic Wallet"]
2016-10-06 12:24:42 +00:00
2016-10-08 12:38:39 +00:00
[[hd_wallets]]
2023-02-11 18:26:22 +00:00
==== HD Wallets (BIP32/BIP44)
2016-10-06 12:24:42 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "types of", "hierarchical deterministic (HD)
wallets")))((("hierarchical deterministic (HD) wallets")))((("bitcoin
improvement proposals", "Hierarchical Deterministic Wallets
2023-02-11 18:26:22 +00:00
(BIP32/BIP44)")))Deterministic wallets were developed to make it easy
2023-02-11 17:46:57 +00:00
to derive many keys from a single "seed." The most advanced form of
2023-02-11 18:26:22 +00:00
deterministic wallets is the HD wallet defined by the BIP32 standard.
2023-02-11 17:46:57 +00:00
HD wallets contain keys derived in a tree structure, such that a parent
key can derive a sequence of children keys, each of which can derive a
sequence of grandchildren keys, and so on, to an infinite depth. This
tree structure is illustrated in <<Type2_wallet>>.
2016-10-08 12:38:39 +00:00
[[Type2_wallet]]
2017-05-09 20:16:06 +00:00
.Type-2 HD wallet: a tree of keys generated from a single seed
2017-04-04 16:25:23 +00:00
image::images/mbc2_0503.png["HD wallet"]
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
HD wallets offer two major advantages over random (nondeterministic)
keys. First, the tree structure can be used to express additional
organizational meaning, such as when a specific branch of subkeys is
used to receive incoming payments and a different branch is used to
receive change from outgoing payments. Branches of keys can also be used
in corporate settings, allocating different branches to departments,
subsidiaries, specific functions, or accounting categories.
The second advantage of HD wallets is that users can create a sequence
of public keys without having access to the corresponding private keys.
This allows HD wallets to be used on an insecure server or in a
receive-only capacity, issuing a different public key for each
transaction. The public keys do not need to be preloaded or derived in
advance, yet the server doesn't have the private keys that can spend the
funds.
2016-10-08 12:38:39 +00:00
2023-02-11 18:26:22 +00:00
==== Seeds and Mnemonic Codes (BIP39)
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "technology of", "seeds and mnemonic codes")))((("mnemonic
code words")))((("bitcoin improvement proposals", "Mnemonic Code Words
2023-02-11 18:26:22 +00:00
(BIP39)")))HD wallets are a very powerful mechanism for managing many
2023-02-11 17:46:57 +00:00
keys and addresses. They are even more useful if they are combined with
a standardized way of creating seeds from a sequence of English words
that are easy to transcribe, export, and import across wallets. This is
2023-02-11 18:26:22 +00:00
known as a _mnemonic_ and the standard is defined by BIP39. Today, most
2023-02-11 17:46:57 +00:00
bitcoin wallets (as well as wallets for other cryptocurrencies) use this
standard and can import and export seeds for backup and recovery using
interoperable mnemonics.
Let's look at this from a practical perspective. Which of the following
seeds is easier to transcribe, record on paper, read without error,
export, and import into another wallet?
2016-10-06 12:24:42 +00:00
2023-02-01 16:31:10 +00:00
.A seed for an deterministic wallet, in hex
2016-10-06 12:24:42 +00:00
----
0C1E24E5917779D297E14D45F14E1A1A
----
2023-02-01 16:31:10 +00:00
.A seed for an deterministic wallet, from a 12-word mnemonic
2016-10-06 12:24:42 +00:00
----
2017-07-18 04:11:18 +00:00
army van defense carry jealous true
2016-10-06 12:24:42 +00:00
garbage claim echo media make crunch
----
2016-10-08 12:38:39 +00:00
==== Wallet Best Practices
2023-02-11 17:46:57 +00:00
((("wallets", "best practices for")))((("bitcoin improvement proposals",
2023-02-11 18:26:22 +00:00
"Multipurpose HD Wallet Structure (BIP43)")))As bitcoin wallet
2023-02-11 17:46:57 +00:00
technology has matured, certain common industry standards have emerged
that make bitcoin wallets broadly interoperable, easy to use, secure,
and flexible. These common standards are:
2016-10-08 12:38:39 +00:00
2023-02-11 18:26:22 +00:00
* Mnemonic code words, based on BIP39
* HD wallets, based on BIP32
* Multipurpose HD wallet structure, based on BIP43
* Multicurrency and multiaccount wallets, based on BIP44
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
These standards may change or may become obsolete by future
developments, but for now they form a set of interlocking technologies
that have become the de facto wallet standard for bitcoin.
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
The standards have been adopted by a broad range of software and
hardware bitcoin wallets, making all these wallets interoperable. A user
can export a mnemonic generated on one of these wallets and import it in
another wallet, recovering all transactions, keys, and addresses.
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
((("hardware wallets")))((("hardware wallets", see="also wallets")))Some
example of software wallets supporting these standards include (listed
alphabetically) Breadwallet, Copay, Multibit HD, and Mycelium. Examples
of hardware wallets supporting these standards include (listed
alphabetically) Keepkey, Ledger, and Trezor.
2016-10-08 12:38:39 +00:00
2017-07-18 04:11:18 +00:00
The following sections examine each of these technologies in detail.
2016-10-08 12:38:39 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
If you are implementing a bitcoin wallet, it should be built as a HD
wallet, with a seed encoded as mnemonic code for backup, following the
2023-02-11 18:26:22 +00:00
BIP32, BIP39, BIP43, and BIP44 standards, as described in the
2023-02-11 17:46:57 +00:00
following sections.
2016-10-08 12:38:39 +00:00
====
2017-04-18 21:47:06 +00:00
==== Using a Bitcoin Wallet
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "using bitcoin wallets")))In <<user-stories>> we
introduced Gabriel, ((("use cases", "web store", id="gabrielfive")))an
enterprising young teenager in Rio de Janeiro, who is running a simple
web store that sells bitcoin-branded t-shirts, coffee mugs, and
stickers.
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "types of", "hardware wallets")))Gabriel uses a Trezor
bitcoin hardware wallet (<<a_trezor_device>>) to securely manage his
bitcoin. The Trezor is a simple USB device with two buttons that stores
keys (in the form of an HD wallet) and signs transactions. Trezor
wallets implement all the industry standards discussed in this chapter,
so Gabriel is not reliant on any proprietary technology or single vendor
solution.
2016-10-08 12:38:39 +00:00
2017-04-18 21:47:06 +00:00
[[a_trezor_device]]
.A Trezor device: a bitcoin HD wallet in hardware
2017-04-04 16:25:23 +00:00
image::images/mbc2_0504.png[alt]
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
When Gabriel used the Trezor for the first time, the device generated a
mnemonic and seed from a built-in hardware random number generator.
During this initialization phase, the wallet displayed a numbered
sequence of words, one by one, on the screen (see
<<trezor_mnemonic_display>>).
2016-10-08 12:38:39 +00:00
[[trezor_mnemonic_display]]
.Trezor displaying one of the mnemonic words
2017-04-04 16:25:23 +00:00
image::images/mbc2_0505.png["Trezor wallet display of mnemonic word"]
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
By writing down this mnemonic, Gabriel created a backup (see
<<mnemonic_paper_backup>>) that can be used for recovery in the case of
loss or damage to the Trezor device. This mnemonic can be used for
recovery in a new Trezor or in any one of the many compatible software
or hardware wallets. Note that the sequence of words is important, so
mnemonic paper backups have numbered spaces for each word. Gabriel had
to carefully record each word in the numbered space to preserve the
correct sequence.
2016-10-08 12:38:39 +00:00
[[mnemonic_paper_backup]]
.Gabriel's paper backup of the mnemonic
[cols="<1,^50,<1,^50", width="80%"]
2016-10-06 12:24:42 +00:00
|===
2016-10-08 12:38:39 +00:00
|*1.*| _army_ |*7.*| _garbage_
|*2.*| _van_ |*8.*| _claim_
|*3.*| _defense_ |*9.*| _echo_
|*4.*| _carry_ |*10.*| _media_
|*5.*| _jealous_ |*11.*| _make_
|*6.*| _true_ |*12.*| _crunch_
2016-10-06 12:24:42 +00:00
|===
2016-10-08 12:38:39 +00:00
[NOTE]
====
2023-02-11 17:46:57 +00:00
A 12-word mnemonic is shown in <<mnemonic_paper_backup>>, for
simplicity. In fact, most hardware wallets generate a more secure
24-word mnemonic. The mnemonic is used in exactly the same way,
regardless of length.
2016-10-08 12:38:39 +00:00
====
2023-02-11 17:46:57 +00:00
For the first implementation of his web store, Gabriel uses a single
Bitcoin address, generated on his Trezor device. This single address is
used by all customers for all orders. As we will see, this approach has
some drawbacks and can be improved upon with an HD wallet.((("",
startref="gabrielfive")))
2016-10-10 15:13:09 +00:00
2016-10-08 12:38:39 +00:00
=== Wallet Technology Details
2023-02-11 17:46:57 +00:00
Let's now examine each of the important industry standards that are used
by many bitcoin wallets in detail.
2016-10-08 12:38:39 +00:00
2016-10-06 12:24:42 +00:00
[[mnemonic_code_words]]
2023-02-11 18:26:22 +00:00
==== Mnemonic Code Words (BIP39)
2016-10-06 12:24:42 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "technology of", "mnemonic code words")))((("mnemonic code
words", id="mnemonic05")))((("bitcoin improvement proposals", "Mnemonic
2023-02-11 18:26:22 +00:00
Code Words (BIP39)", id="BIP3905")))Mnemonic code words are word
2023-02-11 17:46:57 +00:00
sequences that represent (encode) a random number used as a seed to
derive a deterministic wallet. The sequence of words is sufficient to
re-create the seed and from there re-create the wallet and all the
derived keys. A wallet application that implements deterministic wallets
with mnemonic words will show the user a sequence of 12 to 24 words when
first creating a wallet. That sequence of words is the wallet backup and
can be used to recover and re-create all the keys in the same or any
compatible wallet application. Mnemonic words make it easier for users
to back up wallets because they are easy to read and correctly
transcribe, as compared to a random sequence of numbers.
2016-10-06 12:24:42 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
((("brainwallets")))Mnemonic words are often confused with
"brainwallets." They are not the same. The primary difference is that a
brainwallet consists of words chosen by the user, whereas mnemonic words
are created randomly by the wallet and presented to the user. This
important difference makes mnemonic words much more secure, because
humans are very poor sources of randomness.
2016-10-06 12:24:42 +00:00
====
2023-02-11 18:26:22 +00:00
Mnemonic codes are defined in BIP39 (see <<appdxbitcoinimpproposals>>).
Note that BIP39 is one implementation of a mnemonic code standard.
2023-02-11 17:46:57 +00:00
((("Electrum wallet", seealso="wallets")))There is a different standard,
with a different set of words, used by the Electrum wallet and predating
2023-02-11 18:26:22 +00:00
BIP39. BIP39 was proposed by the company behind the Trezor hardware
2023-02-11 17:46:57 +00:00
wallet and is incompatible with Electrum's implementation. However,
2023-02-11 18:26:22 +00:00
BIP39 has now achieved broad industry support across dozens of
2023-02-11 17:46:57 +00:00
interoperable implementations and should be considered the de facto
industry standard.
2023-02-11 18:26:22 +00:00
BIP39 defines the creation of a mnemonic code and seed, which we
2023-02-11 17:46:57 +00:00
describe here in nine steps. For clarity, the process is split into two
parts: steps 1 through 6 are shown in <<generating_mnemonic_words>> and
steps 7 through 9 are shown in <<mnemonic_to_seed>>.
2016-10-06 12:24:42 +00:00
[[generating_mnemonic_words]]
2017-04-18 21:47:06 +00:00
===== Generating mnemonic words
2016-10-06 12:24:42 +00:00
2023-02-11 17:46:57 +00:00
Mnemonic words are generated automatically by the wallet using the
2023-02-11 18:26:22 +00:00
standardized process defined in BIP39. The wallet starts from a source
2023-02-11 17:46:57 +00:00
of entropy, adds a checksum, and then maps the entropy to a word list:
2016-10-06 12:24:42 +00:00
1. Create a random sequence (entropy) of 128 to 256 bits.
2023-02-11 17:46:57 +00:00
2. Create a checksum of the random sequence by taking the first
(entropy-length/32) bits of its SHA256 hash.
2016-10-06 12:24:42 +00:00
3. Add the checksum to the end of the random sequence.
2023-02-11 17:46:57 +00:00
2018-03-14 16:47:50 +00:00
4. Split the result into 11-bit length segments.
2023-02-11 17:46:57 +00:00
5. Map each 11-bit value to a word from the predefined dictionary of
2048 words.
2016-10-06 12:24:42 +00:00
6. The mnemonic code is the sequence of words.
2017-04-18 21:47:06 +00:00
2023-02-11 17:46:57 +00:00
<<generating_entropy_and_encoding>> shows how entropy is used to
generate mnemonic words.
2017-04-18 21:47:06 +00:00
[[generating_entropy_and_encoding]]
2017-05-18 14:13:32 +00:00
[role="smallerseventy"]
2016-10-06 12:24:42 +00:00
.Generating entropy and encoding as mnemonic words
2017-04-04 16:25:23 +00:00
image::images/mbc2_0506.png["Generating entropy and encoding as mnemonic words"]
2017-04-18 21:47:06 +00:00
2023-02-11 17:46:57 +00:00
<<table_4-5>> shows the relationship between the size of the entropy
data and the length of mnemonic codes in words.
2017-04-24 15:10:10 +00:00
2016-10-06 12:24:42 +00:00
[[table_4-5]]
.Mnemonic codes: entropy and word length
[options="header"]
|=======
|Entropy (bits) | Checksum (bits) | Entropy *+* checksum (bits) | Mnemonic length (words)
| 128 | 4 | 132 | 12
| 160 | 5 | 165 | 15
| 192 | 6 | 198 | 18
| 224 | 7 | 231 | 21
| 256 | 8 | 264 | 24
|=======
2017-04-18 21:47:06 +00:00
2016-10-06 12:24:42 +00:00
[[mnemonic_to_seed]]
2017-04-18 21:47:06 +00:00
===== From mnemonic to seed
2023-02-11 17:46:57 +00:00
((("key-stretching function")))((("PBKDF2 function")))The mnemonic words
represent entropy with a length of 128 to 256 bits. The entropy is then
used to derive a longer (512-bit) seed through the use of the
key-stretching function PBKDF2. The seed produced is then used to build
a deterministic wallet and derive its keys.
2016-10-06 12:24:42 +00:00
2023-02-11 17:46:57 +00:00
((("salts")))((("passphrases")))The key-stretching function takes two
parameters: the mnemonic and a _salt_. The purpose of a salt in a
key-stretching function is to make it difficult to build a lookup table
2023-02-11 18:26:22 +00:00
enabling a brute-force attack. In the BIP39 standard, the salt has
2023-02-11 17:46:57 +00:00
another purpose—it allows the introduction of a passphrase that
serves as an additional security factor protecting the seed, as we will
describe in more detail in <<mnemonic_passphrase>>.
2017-04-18 21:47:06 +00:00
2023-02-11 17:46:57 +00:00
The process described in steps 7 through 9 continues from the process
described previously in <<generating_mnemonic_words>>:
2017-04-18 21:47:06 +00:00
++++
<ol start="7">
2023-02-11 17:46:57 +00:00
<li>The first parameter to the PBKDF2 key-stretching function is the
<em>mnemonic</em> produced from step 6.</li>
<li>The second parameter to the PBKDF2 key-stretching function is a
<em>salt</em>. The salt is composed of the string constant
"<code>mnemonic</code>" concatenated with an optional user-supplied
passphrase string.</li>
<li>PBKDF2 stretches the mnemonic and salt parameters using 2048
rounds of hashing with the HMAC-SHA512 algorithm, producing a 512-bit
value as its final output. That 512-bit value is the seed.</li>
2017-04-18 21:47:06 +00:00
</ol>
++++
2016-10-06 12:24:42 +00:00
2017-04-24 19:27:27 +00:00
<<fig_5_7>> shows how a mnemonic is used to generate a seed.
[[fig_5_7]]
2016-10-06 12:24:42 +00:00
.From mnemonic to seed
2017-04-04 16:25:23 +00:00
image::images/mbc2_0507.png["From mnemonic to seed"]
2016-10-06 12:24:42 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
The key-stretching function, with its 2048 rounds of hashing, is a very
effective protection against brute-force attacks against the mnemonic or
the passphrase. It makes it extremely costly (in computation) to try
more than a few thousand passphrase and mnemonic combinations, while the
number of possible derived seeds is vast (2^512^).
2016-10-06 12:24:42 +00:00
====
2023-02-11 17:46:57 +00:00
Tables pass:[<a data-type="xref" href="#mnemonic_128_no_pass"
data-xrefstyle="select: labelnumber">#mnemonic_128_no_pass</a>],
pass:[<a data-type="xref" href="#mnemonic_128_w_pass"
data-xrefstyle="select: labelnumber">#mnemonic_128_w_pass</a>], and
pass:[<a data-type="xref" href="#mnemonic_256_no_pass"
data-xrefstyle="select: labelnumber">#mnemonic_256_no_pass</a>] show
some examples of mnemonic codes and the seeds they produce (without any
passphrase).
2016-10-06 12:24:42 +00:00
[[mnemonic_128_no_pass]]
.128-bit entropy mnemonic code, no passphrase, resulting seed
[cols="h,"]
|=======
| *Entropy input (128 bits)*| +0c1e24e5917779d297e14d45f14e1a1a+
| *Mnemonic (12 words)* | +army van defense carry jealous true garbage claim echo media make crunch+
| *Passphrase*| (none)
2017-04-18 21:47:06 +00:00
| *Seed (512 bits)* | +5b56c417303faa3fcba7e57400e120a0ca83ec5a4fc9ffba757fbe63fbd77a89a1a3be4c67196f57c39+
+a88b76373733891bfaba16ed27a813ceed498804c0570+
2016-10-06 12:24:42 +00:00
|=======
[[mnemonic_128_w_pass]]
.128-bit entropy mnemonic code, with passphrase, resulting seed
[cols="h,"]
|=======
| *Entropy input (128 bits)*| +0c1e24e5917779d297e14d45f14e1a1a+
| *Mnemonic (12 words)* | +army van defense carry jealous true garbage claim echo media make crunch+
| *Passphrase*| SuperDuperSecret
2017-04-18 21:47:06 +00:00
| *Seed (512 bits)* | +3b5df16df2157104cfdd22830162a5e170c0161653e3afe6c88defeefb0818c793dbb28ab3ab091897d0+
+715861dc8a18358f80b79d49acf64142ae57037d1d54+
2016-10-06 12:24:42 +00:00
|=======
[[mnemonic_256_no_pass]]
.256-bit entropy mnemonic code, no passphrase, resulting seed
[cols="h,"]
|=======
| *Entropy input (256 bits)* | +2041546864449caff939d32d574753fe684d3c947c3346713dd8423e74abcf8c+
2017-07-18 04:11:18 +00:00
| *Mnemonic (24 words)* | +cake apple borrow silk endorse fitness top denial coil riot stay wolf
2016-10-06 12:24:42 +00:00
luggage oxygen faint major edit measure invite love trap field dilemma oblige+
| *Passphrase*| (none)
2017-04-18 21:47:06 +00:00
| *Seed (512 bits)* | +3269bce2674acbd188d4f120072b13b088a0ecf87c6e4cae41657a0bb78f5315b33b3a04356e53d062e5+
+5f1e0deaa082df8d487381379df848a6ad7e98798404+
2016-10-06 12:24:42 +00:00
|=======
[[mnemonic_passphrase]]
2023-02-11 18:26:22 +00:00
===== Optional passphrase in BIP39
2016-10-06 12:24:42 +00:00
2023-02-11 18:26:22 +00:00
((("passphrases")))The BIP39 standard allows the use of an optional
2023-02-11 17:46:57 +00:00
passphrase in the derivation of the seed. If no passphrase is used, the
mnemonic is stretched with a salt consisting of the constant string
+"mnemonic"+, producing a specific 512-bit seed from any given mnemonic.
If a passphrase is used, the stretching function produces a _different_
seed from that same mnemonic. In fact, given a single mnemonic, every
possible passphrase leads to a different seed. Essentially, there is no
"wrong" passphrase. All passphrases are valid and they all lead to
different seeds, forming a vast set of possible uninitialized wallets.
The set of possible wallets is so large (2^512^) that there is no
practical possibility of brute-forcing or accidentally guessing one that
is in use.
2016-10-06 12:24:42 +00:00
[TIP]
====
2023-02-11 18:26:22 +00:00
There are no "wrong" passphrases in BIP39. Every passphrase leads to
2023-02-11 17:46:57 +00:00
some wallet, which unless previously used will be empty.
2016-10-06 12:24:42 +00:00
====
The optional passphrase creates two important features:
2023-02-11 17:46:57 +00:00
- A second factor (something memorized) that makes a mnemonic useless on
its own, protecting mnemonic backups from compromise by a thief.
2016-10-06 12:24:42 +00:00
2023-02-11 17:46:57 +00:00
- A form of plausible deniability or "duress wallet," where a chosen
passphrase leads to a wallet with a small amount of funds used to
distract an attacker from the "real" wallet that contains the majority
of funds.
2016-10-06 12:24:42 +00:00
However, it is important to note that the use of a passphrase also introduces the risk of loss:
2023-02-01 16:31:10 +00:00
* If the wallet owner is incapacitated or dead and no one else knows the passphrase, the seed is useless and all the funds stored in the wallet are lost forever.
2016-10-06 12:24:42 +00:00
2023-02-01 16:31:10 +00:00
* Conversely, if the owner backs up the passphrase in the same place as the seed, it defeats the purpose of a second factor.
2016-10-06 12:24:42 +00:00
2023-02-11 17:46:57 +00:00
While passphrases are very useful, they should only be used in
combination with a carefully planned process for backup and recovery,
considering the possibility of surviving the owner and allowing his or
her family to recover the cryptocurrency estate.
2016-10-06 12:24:42 +00:00
2016-10-08 12:38:39 +00:00
===== Working with mnemonic codes
2016-04-16 14:29:59 +00:00
2023-02-11 18:26:22 +00:00
BIP39 is implemented as a library in many different programming
2023-02-11 17:46:57 +00:00
languages:
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
https://github.com/trezor/python-mnemonic[python-mnemonic]:: The
reference implementation of the standard by the SatoshiLabs team that
2023-02-11 18:26:22 +00:00
proposed BIP39, in Python
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
https://github.com/bitcoinjs/bip39[bitcoinjs/bip39]:: An implementation
2023-02-11 18:26:22 +00:00
of BIP39, as part of the popular bitcoinJS framework, in JavaScript
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
https://github.com/libbitcoin/libbitcoin/blob/master/src/wallet/mnemonic.cpp[libbitcoin/mnemonic]::
2023-02-11 18:26:22 +00:00
An implementation of BIP39, as part of the popular Libbitcoin
2023-02-11 17:46:57 +00:00
framework, in pass:[<span class="keep-together">C++</span>]
2016-04-16 14:29:59 +00:00
2023-02-11 18:26:22 +00:00
There is also a BIP39 generator implemented in a standalone webpage,
2023-02-11 17:46:57 +00:00
which is extremely useful for testing and experimentation.
<<a_bip39_generator_as_a_standalone_web_page>> shows a standalone web
page that generates mnemonics, seeds, and extended private keys.
2023-02-01 16:31:10 +00:00
[[a_bip39_generator_as_a_standalone_web_page]]
2023-02-11 18:26:22 +00:00
.A BIP39 generator as a standalone web page
image::images/mbc2_0508.png["BIP39 generator web-page"]
2023-02-01 16:31:10 +00:00
2023-02-11 17:46:57 +00:00
((("", startref="mnemonic05")))((("", startref="BIP3905")))The page
(https://iancoleman.github.io/bip39/) can be used offline in a browser,
or accessed online.
2023-02-01 16:31:10 +00:00
2017-04-18 21:47:06 +00:00
==== Creating an HD Wallet from the Seed
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
((("wallets", "technology of", "creating HD wallets from root
seed")))((("root seeds")))((("hierarchical deterministic (HD)
wallets")))HD wallets are created from a single _root seed_, which is a
128-, 256-, or 512-bit random number. Most commonly, this seed is
generated from a _mnemonic_ as detailed in the previous section.
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
Every key in the HD wallet is deterministically derived from this root
seed, which makes it possible to re-create the entire HD wallet from
that seed in any compatible HD wallet. This makes it easy to back up,
restore, export, and import HD wallets containing thousands or even
millions of keys by simply transferring only the mnemonic that the root
seed is derived from.
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
The process of creating the master keys and master chain code for an HD
wallet is shown in <<HDWalletFromSeed>>.
2016-04-16 14:29:59 +00:00
[[HDWalletFromSeed]]
.Creating master keys and chain code from a root seed
2017-04-04 16:25:23 +00:00
image::images/mbc2_0509.png["HDWalletFromRootSeed"]
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
The root seed is input into the HMAC-SHA512 algorithm and the resulting
hash is used to create a _master private key_ (m) and a _master chain
code_ (c).
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
The master private key (m) then generates a corresponding master public
key (M) using the normal elliptic curve multiplication process +m * G+
that we saw in <<pubkey>>.
2016-10-08 12:38:39 +00:00
2023-02-11 17:46:57 +00:00
The chain code (c) is used to introduce entropy in the function that
creates child keys from parent keys, as we will see in the next section.
2016-04-16 14:29:59 +00:00
===== Private child key derivation
2023-02-11 17:46:57 +00:00
((("child key derivation (CKD)")))((("public and private keys", "child
key derivation (CKD)")))HD wallets use a _child key derivation_ (CKD)
function to derive child keys from parent keys.
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
The child key derivation functions are based on a one-way hash function
that combines:
2016-04-16 14:29:59 +00:00
2023-02-01 16:31:10 +00:00
* A parent private or public key (ECDSA uncompressed key)
2016-04-16 14:29:59 +00:00
* A seed called a chain code (256 bits)
* An index number (32 bits)
2023-02-11 17:46:57 +00:00
The chain code is used to introduce deterministic random data to the
process, so that knowing the index and a child key is not sufficient to
derive other child keys. Knowing a child key does not make it possible
to find its siblings, unless you also have the chain code. The initial
chain code seed (at the root of the tree) is made from the seed, while
subsequent child chain codes are derived from each parent chain code.
These three items (parent key, chain code, and index) are combined and
hashed to generate children keys, as follows.
The parent public key, chain code, and the index number are combined and
hashed with the HMAC-SHA512 algorithm to produce a 512-bit hash. This
512-bit hash is split into two 256-bit halves. The right-half 256 bits
of the hash output become the chain code for the child. The left-half
256 bits of the hash are added to the parent private key to produce the
child private key. In <<CKDpriv>>, we see this illustrated with the
index set to 0 to produce the "zero" (first by index) child of the
parent.
2016-04-16 14:29:59 +00:00
[[CKDpriv]]
.Extending a parent private key to create a child private key
2017-04-04 16:25:23 +00:00
image::images/mbc2_0510.png["ChildPrivateDerivation"]
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
Changing the index allows us to extend the parent and create the other
children in the sequence, e.g., Child 0, Child 1, Child 2, etc. Each
parent key can have 2,147,483,647 (2^31^) children (2^31^ is half of the
entire 2^32^ range available because the other half is reserved for a
special type of derivation we will talk about later in this chapter).
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
Repeating the process one level down the tree, each child can in turn
become a parent and create its own children, in an infinite number of
generations.
2016-04-16 14:29:59 +00:00
===== Using derived child keys
2023-02-11 17:46:57 +00:00
Child private keys are indistinguishable from nondeterministic (random)
keys. Because the derivation function is a one-way function, the child
key cannot be used to find the parent key. The child key also cannot be
used to find any siblings. If you have the n~th~ child, you cannot find
its siblings, such as the n–1 child or the n+1 child, or any
other children that are part of the sequence. Only the parent key and
chain code can derive all the children. Without the child chain code,
the child key cannot be used to derive any grandchildren either. You
need both the child private key and the child chain code to start a new
branch and derive grandchildren.
So what can the child private key be used for on its own? It can be used
to make a public key and a Bitcoin address. Then, it can be used to sign
transactions to spend anything paid to that address.
2016-04-16 14:29:59 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
A child private key, the corresponding public key, and the Bitcoin
address are all indistinguishable from keys and addresses created
randomly. The fact that they are part of a sequence is not visible
outside of the HD wallet function that created them. Once created, they
operate exactly as "normal" keys.
2016-04-16 14:29:59 +00:00
====
===== Extended keys
2023-02-11 17:46:57 +00:00
((("public and private keys", "extended keys")))((("extended keys")))As
we saw earlier, the key derivation function can be used to create
children at any level of the tree, based on the three inputs: a key, a
chain code, and the index of the desired child. The two essential
ingredients are the key and chain code, and combined these are called an
_extended key_. The term "extended key" could also be thought of as
"extensible key" because such a key can be used to derive children.
Extended keys are stored and represented simply as the concatenation of
the 256-bit key and 256-bit chain code into a 512-bit sequence. There
are two types of extended keys. An extended private key is the
combination of a private key and chain code and can be used to derive
child private keys (and from them, child public keys). An extended
public key is a public key and chain code, which can be used to create
child public keys (_public only_), as described in
<<public_key_derivation>>.
Think of an extended key as the root of a branch in the tree structure
of the HD wallet. With the root of the branch, you can derive the rest
of the branch. The extended private key can create a complete branch,
whereas the extended public key can _only_ create a branch of public
keys.
2016-04-16 14:29:59 +00:00
[TIP]
====
2023-02-11 17:46:57 +00:00
An extended key consists of a private or public key and chain code. An
extended key can create children, generating its own branch in the tree
structure. Sharing an extended key gives access to the entire branch.
2017-07-18 04:11:18 +00:00
====
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
Extended keys are encoded using Base58Check, to easily export and import
2023-02-11 18:26:22 +00:00
between different BIP32–compatible wallets. The Base58Check
2023-02-11 17:46:57 +00:00
coding for extended keys uses a special version number that results in
the prefix "xprv" and "xpub" when encoded in Base58 characters to make
them easily recognizable. Because the extended key is 512 or 513 bits,
it is also much longer than other Base58Check-encoded strings we have
seen previously.
2016-04-16 14:29:59 +00:00
2016-10-08 12:38:39 +00:00
Here's an example of an extended _private_ key, encoded in Base58Check:
2016-04-16 14:29:59 +00:00
----
xprv9tyUQV64JT5qs3RSTJkXCWKMyUgoQp7F3hA1xzG6ZGu6u6Q9VMNjGr67Lctvy5P8oyaYAL9CAWrUE9i6GoNMKUga5biW6Hx4tws2six3b9c
----
2016-10-08 12:38:39 +00:00
Here's the corresponding extended _public_ key, encoded in Base58Check:
2016-04-16 14:29:59 +00:00
----
xpub67xpozcx8pe95XVuZLHXZeG6XWXHpGq6Qv5cmNfi7cS5mtjJ2tgypeQbBs2UAR6KECeeMVKZBPLrtJunSDMstweyLXhRgPxdp14sk9tJPW9
----
[[public__child_key_derivation]]
===== Public child key derivation
2023-02-11 17:46:57 +00:00
((("public and private keys", "public child key derivation")))As
mentioned previously, a very useful characteristic of HD wallets is the
ability to derive public child keys from public parent keys, _without_
having the private keys. This gives us two ways to derive a child public
key: either from the child private key, or directly from the parent
public key.
An extended public key can be used, therefore, to derive all of the
_public_ keys (and only the public keys) in that branch of the HD wallet
structure.
This shortcut can be used to create very secure public key–only
deployments where a server or application has a copy of an extended
public key and no private keys whatsoever. That kind of deployment can
produce an infinite number of public keys and Bitcoin addresses, but
cannot spend any of the money sent to those addresses. Meanwhile, on
another, more secure server, the extended private key can derive all the
corresponding private keys to sign transactions and spend the money.
One common application of this solution is to install an extended public
key on a web server that serves an ecommerce application. The web server
can use the public key derivation function to create a new Bitcoin
address for every transaction (e.g., for a customer shopping cart). The
web server will not have any private keys that would be vulnerable to
theft. Without HD wallets, the only way to do this is to generate
thousands of Bitcoin addresses on a separate secure server and then
preload them on the ecommerce server. That approach is cumbersome and
requires constant maintenance to ensure that the ecommerce server
doesn't "run out" of keys.
((("cold storage")))((("storage", "cold storage")))((("hardware
wallets")))Another common application of this solution is for
cold-storage or hardware wallets. In that scenario, the extended private
key can be stored on a paper wallet or hardware device (such as a Trezor
hardware wallet), while the extended public key can be kept online. The
user can create "receive" addresses at will, while the private keys are
safely stored offline. To spend the funds, the user can use the extended
private key on an offline signing Bitcoin client or sign transactions on
the hardware wallet device (e.g., Trezor). <<CKDpub>> illustrates the
mechanism for extending a parent public key to derive child public keys.
2016-04-16 14:29:59 +00:00
[[CKDpub]]
.Extending a parent public key to create a child public key
2017-04-04 16:25:23 +00:00
image::images/mbc2_0511.png["ChildPublicDerivation"]
2016-04-16 14:29:59 +00:00
2023-02-01 16:31:10 +00:00
==== Using an Extended Public Key on a Web Store
2023-02-11 17:46:57 +00:00
((("wallets", "technology of", "using extended public keys on web
stores")))Let's see how HD wallets are used by continuing our story with
Gabriel's web store.((("use cases", "web store", id="gabrielfivetwo")))
Gabriel first set up his web store as a hobby, based on a simple hosted
Wordpress page. His store was quite basic with only a few pages and an
order form with a single bitcoin address.
Gabriel used the first bitcoin address generated by his Trezor device as
the main bitcoin address for his store. This way, all incoming payments
would be paid to an address controlled by his Trezor hardware wallet.
Customers would submit an order using the form and send payment to
Gabriel's published bitcoin address, triggering an email with the order
details for Gabriel to process. With just a few orders each week, this
system worked well enough.
However, the little web store became quite successful and attracted many
orders from the local community. Soon, Gabriel was overwhelmed. With all
the orders paying the same address, it became difficult to correctly
match orders and transactions, especially when multiple orders for the
same amount came in close together.
Gabriel's HD wallet offers a much better solution through the ability to
derive public child keys without knowing the private keys. Gabriel can
load an extended public key (xpub) on his website, which can be used to
derive a unique address for every customer order. Gabriel can spend the
funds from his Trezor, but the xpub loaded on the website can only
generate addresses and receive funds. This feature of HD wallets is a
great security feature. Gabriel's website does not contain any private
keys and therefore does not need high levels of security.
To export the xpub, Gabriel uses the web-based software in conjunction
with the Trezor hardware wallet. The Trezor device must be plugged in
for the public keys to be exported. Note that hardware wallets will
never export private keys—those always remain on the device.
<<export_xpub>> shows the web interface Gabriel uses to export the xpub.
2023-02-01 16:31:10 +00:00
[[export_xpub]]
.Exporting an xpub from a Trezor hardware wallet
image::images/mbc2_0512.png["Exporting the xpub from the Trezor"]
2023-02-11 17:46:57 +00:00
Gabriel copies the xpub to his web store's bitcoin shop software. He
uses _Mycelium Gear_, which is an open source web-store plugin for a
variety of web hosting and content platforms. Mycelium Gear uses the
xpub to generate a unique address for every purchase. ((("",
startref="gabrielfivetwo")))
2023-02-01 16:31:10 +00:00
2016-04-16 14:29:59 +00:00
===== Hardened child key derivation
2023-02-11 17:46:57 +00:00
((("public and private keys", "hardened child key
derivation")))((("hardened derivation")))The ability to derive a branch
of public keys from an xpub is very useful, but it comes with a
potential risk. Access to an xpub does not give access to child private
keys. However, because the xpub contains the chain code, if a child
private key is known, or somehow leaked, it can be used with the chain
code to derive all the other child private keys. A single leaked child
private key, together with a parent chain code, reveals all the private
keys of all the children. Worse, the child private key together with a
parent chain code can be used to deduce the parent private key.
To counter this risk, HD wallets use an alternative derivation function
called _hardened derivation_, which "breaks" the relationship between
parent public key and child chain code. The hardened derivation function
uses the parent private key to derive the child chain code, instead of
the parent public key. This creates a "firewall" in the parent/child
sequence, with a chain code that cannot be used to compromise a parent
or sibling private key. The hardened derivation function looks almost
identical to the normal child private key derivation, except that the
parent private key is used as input to the hash function, instead of the
parent public key, as shown in the diagram in <<CKDprime>>.
2016-04-16 14:29:59 +00:00
[[CKDprime]]
.Hardened derivation of a child key; omits the parent public key
2017-04-04 16:25:23 +00:00
image::images/mbc2_0513.png["ChildHardPrivateDerivation"]
2016-04-16 14:29:59 +00:00
2017-07-18 16:32:03 +00:00
[role="pagebreak-before"]
2023-02-11 17:46:57 +00:00
When the hardened private derivation function is used, the resulting
child private key and chain code are completely different from what
would result from the normal derivation function. The resulting "branch"
of keys can be used to produce extended public keys that are not
vulnerable, because the chain code they contain cannot be exploited to
reveal any private keys. Hardened derivation is therefore used to create
a "gap" in the tree above the level where extended public keys are used.
In simple terms, if you want to use the convenience of an xpub to derive
branches of public keys, without exposing yourself to the risk of a
leaked chain code, you should derive it from a hardened parent, rather
than a normal parent. As a best practice, the level-1 children of the
master keys are always derived through the hardened derivation, to
prevent compromise of the master keys.
2016-04-16 14:29:59 +00:00
===== Index numbers for normal and hardened derivation
2023-02-11 17:46:57 +00:00
The index number used in the derivation function is a 32-bit integer. To
easily distinguish between keys derived through the normal derivation
function versus keys derived through hardened derivation, this index
number is split into two ranges. Index numbers between 0 and
2^31^–1 (0x0 to 0x7FFFFFFF) are used _only_ for normal
derivation. Index numbers between 2^31^ and 2^32^–1 (0x80000000
to 0xFFFFFFFF) are used _only_ for hardened derivation. Therefore, if
the index number is less than 2^31^, the child is normal, whereas if the
index number is equal or above 2^31^, the child is hardened.
To make the index number easier to read and display, the index number
for hardened children is displayed starting from zero, but with a prime
symbol. The first normal child key is therefore displayed as 0, whereas
the first hardened child (index 0x80000000) is displayed as 0++'++.
In sequence then, the second hardened key would have index 0x80000001
and would be displayed as 1++'++, and so on. When you see an HD
wallet index i++'++, that means 2^31^+i.
2016-04-16 14:29:59 +00:00
===== HD wallet key identifier (path)
2023-02-11 17:46:57 +00:00
((("hierarchical deterministic (HD) wallets")))Keys in an HD wallet are
identified using a "path" naming convention, with each level of the tree
separated by a slash (/) character (see <<table_4-8>>). Private keys
derived from the master private key start with "m." Public keys derived
from the master public key start with "M." Therefore, the first child
private key of the master private key is m/0. The first child public key
is M/0. The second grandchild of the first child is m/0/1, and so on.
2017-07-18 04:11:18 +00:00
2023-02-11 17:46:57 +00:00
The "ancestry" of a key is read from right to left, until you reach the
master key from which it was derived. For example, identifier m/x/y/z
describes the key that is the z-th child of key m/x/y, which is the y-th
child of key m/x, which is the x-th child of m.
2016-04-16 14:29:59 +00:00
[[table_4-8]]
.HD wallet path examples
[options="header"]
|=======
|HD path | Key described
| m/0 | The first (0) child private key from the master private key (m)
2023-02-01 16:31:10 +00:00
| m/0/0 | The first grandchild private key from the first child (m/0)
| m/0'/0 | The first normal grandchild from the first _hardened_ child (m/0')
| m/1/0 | The first grandchild private key from the second child (m/1)
| M/23/17/0/0 | The first great-great-grandchild public key from the first great-grandchild from the 18th grandchild from the 24th child
2016-04-16 14:29:59 +00:00
|=======
===== Navigating the HD wallet tree structure
2023-02-11 17:46:57 +00:00
The HD wallet tree structure offers tremendous flexibility. Each parent
extended key can have 4 billion children: 2 billion normal children and
2 billion hardened children. Each of those children can have another 4
billion children, and so on. The tree can be as deep as you want, with
an infinite number of generations. With all that flexibility, however,
it becomes quite difficult to navigate this infinite tree. It is
especially difficult to transfer HD wallets between implementations,
because the possibilities for internal organization into branches and
subbranches are endless.
Two BIPs offer a solution to this complexity by creating some proposed
2023-02-11 18:26:22 +00:00
standards for the structure of HD wallet trees. BIP43 proposes the use
2023-02-11 17:46:57 +00:00
of the first hardened child index as a special identifier that signifies
2023-02-11 18:26:22 +00:00
the "purpose" of the tree structure. Based on BIP43, an HD wallet
2023-02-11 17:46:57 +00:00
should use only one level-1 branch of the tree, with the index number
identifying the structure and namespace of the rest of the tree by
defining its purpose. For example, an HD wallet using only branch
m/i++'++/ is intended to signify a specific purpose and that
purpose is identified by index number "i."
2023-02-11 18:26:22 +00:00
Extending that specification, BIP44 proposes a multiaccount structure
as "purpose" number +44'+ under BIP43. All HD wallets following the
BIP44 structure are identified by the fact that they only used one
2023-02-11 17:46:57 +00:00
branch of the tree: m/44'/.
2016-04-16 14:29:59 +00:00
2023-02-11 18:26:22 +00:00
BIP44 specifies the structure as consisting of five predefined tree levels:
2016-04-16 14:29:59 +00:00
2017-04-25 13:36:26 +00:00
-----
m / purpose' / coin_type' / account' / change / address_index
-----
2016-04-16 14:29:59 +00:00
2023-02-11 17:46:57 +00:00
The first-level "purpose" is always set to +44'+. The second-level
"coin_type" specifies the type of cryptocurrency coin, allowing for
multicurrency HD wallets where each currency has its own subtree under
the second level. There are three currencies defined for now: Bitcoin is
m/44'/0', Bitcoin Testnet is m/44++'++/1++'++, and Litecoin is
m/44++'++/2++'++.
The third level of the tree is "account," which allows users to
subdivide their wallets into separate logical subaccounts, for
accounting or organizational purposes. For example, an HD wallet might
contain two bitcoin "accounts": m/44++'++/0++'++/0++'++
and m/44++'++/0++'++/1++'++. Each account is the root of
its own subtree.
((("keys and addresses", see="also public and private keys")))On the
fourth level, "change," an HD wallet has two subtrees, one for creating
receiving addresses and one for creating change addresses. Note that
whereas the previous levels used hardened derivation, this level uses
normal derivation. This is to allow this level of the tree to export
extended public keys for use in a nonsecured environment. Usable
addresses are derived by the HD wallet as children of the fourth level,
making the fifth level of the tree the "address_index." For example, the
third receiving address for bitcoin payments in the primary account
would be M/44++'++/0++'++/0++'++/0/2. <<table_4-9>> shows
a few more examples.
2016-04-16 14:29:59 +00:00
[[table_4-9]]
2023-02-11 18:26:22 +00:00
.BIP44 HD wallet structure examples
2016-04-16 14:29:59 +00:00
[options="header"]
|=======
|HD path | Key described
2017-04-25 13:45:19 +00:00
| M/44++'++/0++'++/0++'++/0/2 | The third receiving public key for the primary bitcoin account
| M/44++'++/0++'++/3++'++/1/14 | The fifteenth change-address public key for the fourth bitcoin account
| m/44++'++/2++'++/0++'++/0/1 | The second private key in the Litecoin main account, for signing transactions
2016-04-16 14:29:59 +00:00
|=======