![]() ![]() ![]() It is the smallest representation of data we have, and it is expressed in a language our computers understand. You have seen the word "bit" used a few times in this article. Each 11-bit chunk of data will map to a word from the BIP39 word list Here's the next step: We slice the result into 11-bit chunks of data. So in order to get the seed phrase, you have to convert the checksum from hexadecimal format to binary format. However, the SHA256 hash function returns the checksum as a sequence of numbers and letters, called a hexadecimal. It's important to note that BIP39 generates the seed phrase from binary code, which is made up of 0's and 1's. The first X digits of the checksum are then added to the random source data/entropy, where X is equal to: (amount of bits of entropy / 32).Ģ56 bits of entropy (256/32 = 8) - add the first 8 bits of the checksum to the random dataĢ24 bits of entropy (224/32 = 7) - add the first 7 bits of the checksum to the random dataġ92 bits of entropy (192/32 = 6) - add the first 6 bits of the checksum to the random dataġ60 bits of entropy (160/32 = 5) - add the first 5 bits of the checksum to the random dataġ28 bits of entropy 128/32 = 4) - add the first 4 bits of the checksum to the random data In this step, the random source data is run through a SHA256 hash function. If you change anything in that source data, you will get a different result from the hash function. The input can be any source of data, and running the same hash function again will always return the same checksum as the result.įor example, running your random source data of 128 bits of entropy through a hash function will always return the same result as the checksum. How are SHA256 and BIP39 word lists used to generate a seed phrase?Ī hash function is a computer program that takes an input of data and returns a verifiable result, called a checksum. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |