From 5fd902946ccd7a10f54c139c34a6051df55301ba Mon Sep 17 00:00:00 2001 From: "judymcconville@roadrunner.com" Date: Fri, 28 Apr 2017 12:40:49 -0700 Subject: [PATCH] Edited ch05.asciidoc with Atlas code editor --- ch05.asciidoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ch05.asciidoc b/ch05.asciidoc index 25b1c6e5..4513333c 100644 --- a/ch05.asciidoc +++ b/ch05.asciidoc @@ -196,7 +196,7 @@ image::images/mbc2_0506.png["Generating entropy and encoding as mnemonic words"] ((("key-stretching function")))((("PBKDF2 function")))The mnemonic words represent entropy with a length of 128 to 256 bits. The entropy is then used to derive a longer (512-bit) seed through the use of the key-stretching function PBKDF2. The seed produced is then used to build a deterministic wallet and derive its keys. -((("salts")))The key-stretching function takes two parameters: the mnemonic and a _salt_. The purpose of a salt in a key-stretching function is to make it difficult to build a lookup table enabling a brute force attack. In the BIP-39 standard, the salt has another purpose—it allows the introduction of a passphrase that serves as an additional security factor protecting the seed, as we will describe in more detail in <>. +((("salts")))((("passphrases")))The key-stretching function takes two parameters: the mnemonic and a _salt_. The purpose of a salt in a key-stretching function is to make it difficult to build a lookup table enabling a brute force attack. In the BIP-39 standard, the salt has another purpose—it allows the introduction of a passphrase that serves as an additional security factor protecting the seed, as we will describe in more detail in <>. The process described in steps 7 through 9 continues from the process described previously in <>: