[ad_1]
I am designing a easy, hands-on zero-trust pockets utilizing an air-gapped machine and would admire a safety evaluate of my proposed setup. Here is my method:
- Generate 256 bits of entropy utilizing a 6-sided cube.
- Use the ensuing 256-bit worth because the personal key.
- Confirm that the personal key measurement is lower than p-1 (the order of the elliptic curve).
- Derive the corresponding public key from the personal key.
- Generate a BIP39 mnemonic from the personal key, which might be saved offline.
This setup avoids utilizing PBKDF2 to derive a personal key from a seed, choosing an easier method. Nevertheless, I might like to make sure I am not introducing any safety vulnerabilities.
Can anybody determine potential safety flaws or points with this setup?
[ad_2]
Supply hyperlink
Leave a Reply