132 bits of entropy only for Electrum seed phrases.
Aren't they 128 too, but with 8 bits of entropy?
EG is it better to have a 12 seed with a library of 32k words
or a 20 seed using a library of 2048
Let's leave the fact that each private key has 128 bits of security; if someone tried to brute force your address, he'd find it easier to go straight by calculating 2
160 hashes rather than 32000
12 or 2048
20. They're far larger numbers than the RIPEMD-160's possible outputs.
The twelve words with 2048 words in total is a great choice, but if you feel insecure, your best option would be 15 words that provide 165 bits. Anything longer than that would be an “overdose”.
yet again..
my whole point was..
the HUMAN ELEMENT
someone handpicking 12 words. means their entropy of library might just be 500 words they commonly use and are personal to them..
EG many IT/Network nerds might choose words affiliated with IT/networking. and not even think to uuse words like 'voyage' / vicious
so 12 words of a library of 500 handpicked words is very bad.
(its why a few passphrase wallets got emptied)
next up is the HUMAN element of when using a randomiser
is it better to have 12 words or 24 words of a 2048 library
or a 20 word of a 32k library
and the answer is. most people write down their seeds so human memory is of no issue and so a 20 word of 32k library allows for the most randomness
..
i honestly thought this topic was about seed word security of DO MORE SEED WORDS EQUAL BETTER SECURITY
seems many want to think its about the edcsa sha ripemd160 process, and the pre to post bit differences either side of that process..
but anyways moving on, ive said my peace
answering to below..
(sticking with speaking laymans<-emphasis)
(using basic math of entropy and not the technical anals of acertain wallets prefered method of conversion)
i know you want to obsess about the 2
160 to go through all keys..
but for a HUMAN wanting to know his security risk of HIS seed key..
ill lay out the math
how many combinations:
a. 2
160 = 1461501600000000000000000000000000000000000000000
b. 2048
12 = 5444517900000000000000000000000000000000
c. 500
12 = 488281250000000000000000000000
a=ripemd160 combinations
b=12 seed with 2048 library+good randomiser
c=manually choosing personalised words from common vocab
his 12 word seed with 2048 library. can be found easier then ripemd160
his personally chosen words from his common vocab can be found even easier
so if a brute forcer was looking for a particular persons seed and knew his vocab preference by scanning all his posts and finding the words he uses.
a bruteforcer could find his seed in 19 less significant figures then bruteforcing all ripemd combinations
it doesnt matter about how many combinations there are in the hash process
because his seed keys have less combinations at the beginning
its never a debate about total combinations a process allowes
its that his key is somewhere in the middle of
5444517900000000000000000000000000000000
or
488281250000000000000000000000
before it even goes though any particular wallets prefered conversion method