-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate pbkdf2 #1334
Comments
The use of PBKDF2 derives a randomised seed from mnemonic words good enough to seed SECP256K1 key pard generation, but is not at all simpler or quicker than any other method developed in the last 20 years. However - because implemented in many hardware - it could be convenient to have in the SDK. This is possible because the library noble-hash we use in the SDK provides the needed functionalities. |
I applied the blackbox approach to compare mnemonic input to wished output. @grenos instructed me 'west liberty trash promote cushion install have coast color parade receive wire should resunt in the address
getting as result The chain to derive address from mnemonics is the following:
Hence, there is no need to provide PDKF2 API in the SDK because the needed functionalities are already provided by the |
The experiment above demonstrates long computational times experienced in some runtime are not caused by the SDK implementation. JS React allows JS code to call a sandbox running code compiled in C/C++. Facebook uses this approach to implement PBKDF2. The Bitcoin Foundation published the required C/C++ libraries I'm investigating. |
Experimenting with the MIT licensed C++ source code published at https://github.com/edwardstock/bip3x. Shortcut to compile the cryptographic shared library to call from C/C++
|
Investigate if it's possible to implement pbkdf2 (used mostly on mobile).
The text was updated successfully, but these errors were encountered: