Author

Topic: Good idea to salt? (Read 248 times)

legendary
Activity: 3682
Merit: 1580
November 30, 2018, 06:16:06 AM
#10
electrum doesn't use bip39. the security of the electrum seed is explained here: http://docs.electrum.org/en/latest/seedphrase.html#security-implications . i honestly don't understand that math.
HCP
legendary
Activity: 2086
Merit: 4361
November 29, 2018, 04:54:32 PM
#9
Your math still is not correct...

There are no 'shortest' seeds. Seeds are randomly chosen.
12 word seeds have an entropy of 121 124 bits (last 7 4 bits are a checksum) and 24 word seeds have an entropy of 253 248 bits (last 11 8 bits are a checksum).

Edited for correctness
12 word seeds have an entropy of 128 bits... they have 4 bits ADDED as a checksum... making them 132 bits long... 12 words * 11 bits = 132 bits.

The table provided in the BIP39 docs show it all:
The following table describes the relation between the initial entropy length (ENT), the checksum length (CS) and the length of the generated mnemonic sentence (MS) in words.

CS = ENT / 32
MS = (ENT + CS) / 11

|  ENT  | CS | ENT+CS |  MS  |
+-------+----+--------+------+
|  128  |  4 |   132  |  12  |
|  160  |  5 |   165  |  15  |
|  192  |  6 |   198  |  18  |
|  224  |  7 |   231  |  21  |
|  256  |  8 |   264  |  24  |
legendary
Activity: 1624
Merit: 2481
November 28, 2018, 09:01:31 AM
#8

12 word seeds have an entropy of 121 bits (last 7 bits are a checksum) and 24 word seeds have an entropy of 253 bits (last 11 bits are a checksum).
According to BIP39 12 word seeds have an entropy of 128 bits (last 4 bits are a checksum) and 24 word seeds have an entropy of 256 bits (last 8 bits are a checksum).

You are right, thanks for pointing it out!

Not that i have only assumed 7 (instead of 4) and 11 (instead of 8 ) bit checksum, i have also made a very embarrassing mistake (256 - 11 = 253)  Roll Eyes
legendary
Activity: 1848
Merit: 2033
Crypto Swap Exchange
November 27, 2018, 02:01:41 PM
#7

12 word seeds have an entropy of 121 bits (last 7 bits are a checksum) and 24 word seeds have an entropy of 253 bits (last 11 bits are a checksum).
According to BIP39 12 word seeds have an entropy of 128 bits (last 4 bits are a checksum) and 24 word seeds have an entropy of 256 bits (last 8 bits are a checksum).
legendary
Activity: 1624
Merit: 2481
November 27, 2018, 07:31:37 AM
#6
The idea was, that an attacker might rainbow-table the N shortest (as in number of characters) seeds.

Rainbow tables can't be applied in this case.

There are no 'shortest' seeds. Seeds are randomly chosen.
12 word seeds have an entropy of 121 124 bits (last 7 4 bits are a checksum) and 24 word seeds have an entropy of 253 248 bits (last 11 8 bits are a checksum).


Rainbow tables can be used when looking for passwords by having large dictionaries with the initial password and the correct hash being stored together.
In case of finding hashes, you simply search the dictionary for this hash to find the corresponding password.

But since seeds (which are represented by 12-/24- word mnemonic codes) are random, there is no attack surface using rainbow tables.




Edited for correctness
newbie
Activity: 13
Merit: 12
November 27, 2018, 04:36:46 AM
#5
The idea was, that an attacker might rainbow-table the N shortest (as in number of characters) seeds. Like WarpWallet, the e-mail salt would mitigate any such broad attack which isn't specifically aimed at a particular person.
HCP
legendary
Activity: 2086
Merit: 4361
November 26, 2018, 04:48:59 PM
#4
While it doesn't harm you in any way (except maybe for the case where you don't find / forget your salt and cant recover your wallet), it doesn't increase the security of your wallet.

It can add plausible deniability, but security-wise it is not necessary.
As bob123 has pointed out, the maths of the seed words is currently more than sufficient to prevent the seed mnemonic from being brute forced in the first place. So, "salting" is not really necessary from that perspective... But in my opinion, it does offer an increase in security... for one particular scenario.

By adding such a "salt", it means that even if your seed mnemonic is compromised (for instance, your home is burgled and the thief takes the physical backup of your seed mnemonic) your wallet is still "secure", as without the necessary seed mnemonic extension they will be unable to access your 'actual' wallet. It's like 2FA for your seed mnemonic Smiley

Of course, it should go without saying, that the security will only be as good as the passphrase that you use Wink
legendary
Activity: 1624
Merit: 2481
November 26, 2018, 11:17:23 AM
#3
A salt should be somewhat random. So definitely not an email address (which is guessable in like 5 to 10 trials).

Anyways, the math behind the seed words is 'sufficient' (more than safe). You don't really need an additional salt for security reasons.

While it doesn't harm you in any way (except maybe for the case where you don't find / forget your salt and cant recover your wallet), it doesn't increase the security of your wallet.

It can add plausible deniability, but security-wise it is not necessary.
staff
Activity: 3500
Merit: 6152
November 26, 2018, 09:27:31 AM
#2
As long as your seed is hidden somewhere safe and the extension word is not written, that should be okay but for better security, I don't suggest using info that can easily be obtained such as birth date, first name, email address, state of residence etc.
newbie
Activity: 13
Merit: 12
November 26, 2018, 09:17:39 AM
#1
Is it general good practice to salt your Electrum seed with for example your e-mail address in the seed extension? Kind of like WarpWallet does?

Jump to: