From ad6742ce8b33e7516677d609cf97afae6c5dfc04 Mon Sep 17 00:00:00 2001 From: "judymcconville@roadrunner.com" Date: Fri, 28 Apr 2017 12:40:09 -0700 Subject: [PATCH] Edited ch05.asciidoc with Atlas code editor --- ch05.asciidoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ch05.asciidoc b/ch05.asciidoc index 196c75f8..2d1ec8eb 100644 --- a/ch05.asciidoc +++ b/ch05.asciidoc @@ -194,7 +194,7 @@ image::images/mbc2_0506.png["Generating entropy and encoding as mnemonic words"] [[mnemonic_to_seed]] ===== From mnemonic to seed -The mnemonic words represent entropy with a length of 128 to 256 bits. The entropy is then used to derive a longer (512-bit) seed through the use of the key-stretching function PBKDF2. The seed produced is then used to build a deterministic wallet and derive its keys. +((("key-stretching function")))((("PBKDF2 function")))The mnemonic words represent entropy with a length of 128 to 256 bits. The entropy is then used to derive a longer (512-bit) seed through the use of the key-stretching function PBKDF2. The seed produced is then used to build a deterministic wallet and derive its keys. The key-stretching function takes two parameters: the mnemonic and a _salt_. The purpose of a salt in a key-stretching function is to make it difficult to build a lookup table enabling a brute force attack. In the BIP-39 standard, the salt has another purpose—it allows the introduction of a passphrase that serves as an additional security factor protecting the seed, as we will describe in more detail in <>.