Public key, private key and seed phrases (2024)

How to create a key pair

A defining feature of cryptocurrencies is the fact that they are true digital bearer instruments, meaning that you can exert full and complete ownership over them. A cryptocurrency does not "exist" as an account entry in a centralized balance sheet (like money in a bank account), but as tokens residing on a distributed ledger.

Because of that nature, a cryptocurrency can be possessed independently of any third party and can be owned self-sovereignly. As an "owner" you are not just entitled to owning it, you can take actual ownership of it.

A good illustration is the comparison of Bitcoin and gold: although the cryptocurrency represents an abstract, digital form of money, it can be handled directly by its holder just like you can own and control a piece of gold by yourself.

In the case of Bitcoin and any other cryptocurrency, that control is wielded through electronic signatures.

Public/private key cryptography

Cryptocurrencies (and that is where their name comes from) are based on cryptography, which can be seen as the art of making mathematical problems very difficult to solve.

With Bitcoin, a specific cryptographic algorithm is used, which is called Elliptic Curve Digital Signature Algorithm, or ECDSA. This algorithm ensures that "funds" on the Bitcoin network can only be spent by their rightful owner and not by anyone else. Other cryptocurrencies might use different cryptographic algorithms, but they all achieve the same goal.

An important concept to understand how cryptography is applied to cryptocurrency. It is called a signature scheme, which is made of two parts:

  1. The signature, where an owner uses his private key to produce a digital signature.
  2. The verification, where the signed message and the public key are used to check whether the digital signature has been made with the associated private key.

As you probably see it by now, the key concepts to grasp in this scheme are the public key, the private key and the digital signature. The verifying key is always public as it can be used by anyone to do the verification. Generally, this key is referred to as the public key.

The signing key on the other hand has to remain private, which is also why it is commonly called the private key. Typical of any public/private key cryptography is the fact that every public key matches with a corresponding private key. Both of these keys are created in pairs and they always have a definite mathematical relationship.

Signing a message

When the owner of a cryptocurrency wants to move some coins, the network demands that person to sign a corresponding message, i.e. the transaction.

To do so, the owner applies a mathematical transformation to the transaction message (usually done through a digital wallet software) by using the signing key (private key). The output of this signing process will be a definite string of numbers called the digital signature.

In order for the transaction to go through, its message has to be validated. All that is needed for this verification procedure is the transaction message, the digital signature of this message that has been created by the private key, and the corresponding public key.

One-way hash function

A public key is derived from a private key when it is created. Between the two keys exists what is called a one-way hash function. It means that with a private key, it is easy to derive its corresponding public key but not the other way around. With today's technology, it is impossible to generate a private key from a public key.

This is thanks to Bitcoin's SHA-256 algorithm. With it, private keys are 256 bits long, meaning that Bitcoin's private key space (the number of different distinct keys that are possible to create) is about 2256, which is an ridiculously large number. It is about 1077 in decimal. In comparison, the universe is estimated to contain 1080 atoms. It is therefore practically impossible that anyone will guess or be able to brute force your private key randomly.

Public key, private key and seed phrases (1)

Crypto keys and signature scheme

Practically speaking, what does all of this mean?

For all intents and purposes, your private keys are your crypto. If you lose the private keys, access to and the ability to control your crypto are lost forever. This is why private keys need to be kept safe and secret at all times, because revealing them to anyone is equivalent to giving them control over the funds secured by that private key.

While the private key is like the password to your bank account, the corresponding public key can be thought of as your personal IBAN number. Anyone willing to send you cryptocurrency will have to send it to your public key that, again, is controlled by you through the corresponding private key.

Another analogy for your public key is to see it as your email address but for money. Just like you send messages to/from email addresses, in crypto you send funds to/from public keys. Unlike an email address that is tied to an email client (Gmail, Outlook, etc.), or an IBAN that is tied to a bank, your public/private key pair is independent from any software and can be used with any non-custodial wallet application, like Bridge Wallet. This analogy also nicely conveys the fact that a public key is sometimes also called a public address.

The power of secret phrases

Ultimately, private keys can be shown in many different formats. Their most common form used to be a long string of random numbers and characters, which wasn't particularly user-friendly. Learning and remembering one's private key was very hard and therefore prone to errors. This is why a better way to display them was gradually adopted: in the form of a secret phrase.

Most of today's crypto wallets won't give you a cryptic private key by default anymore. Instead, the private key will be translated into seed words. Depending on the wallet, you will be given either 12, 18 or 24 seed words (a secret phrase). These seed words make up your private key and are just another way of displaying in a human-readable way what could be shown as a painfully long string of random numbers and characters.

A secret phrase is also called seed phrase, mnemonic phrase, mnemonic, mnemonic seed, mnemonic seed phrase, seed key, or recovery phrase. All those terms are ultimately the same thing and simply describe the 12 or 24 words long sequence of a secret phrase.

In order to secure the funds associated with the seed words, they have to be memorized or written down in the exact order that they were given. What we have already said about private keys is true for secret phrases as well: there is virtually no way for anyone to guess a secret phrase. When creating a new secret phrase, the words are chosen randomly from a list of 2,048 English words.

That sequence of words, entered in the right order, is converted using formulas into numbers that give access to a wallet and all the public key - private key pairs that it contains.

Example of a 12-words secret phrase:

Public key, private key and seed phrases (2)

Keeping a secret phrase private and ensuring that it won't be lost is critical, as it is the only way to access and recover a wallet and all of its content. Anyone getting access to a secret phrase can take control of the content of its wallet and transfer it elsewhere, an operation that cannot be reverted due to blockchain's nature.

Split seed phrases

A split seed phrase is an alternative form of secret phrase that generates a sequence of 100 seed words (instead of the 12/18/24 words of a regular secret phrase) and splits it in 5 pieces, which are then distributed among a group of 5 different storage nodes. That secret phrase can only be reconstructed when at least 3 pieces are combined together.

This method is more secure than a regular secret phrase. It is a good trade-off to mitigate the risk of theft and the risk of loss/destruction of the secret phrase.

The tree structure of secret phrases

Today's wallets don't merely create one private key and one public address for you but many. They follow a widely adopted standard to create so-called deterministic (HD) wallets. Simply speaking, with such wallets a master private key is generated. This master private key can then be used by the wallet software to create many child private keys and their corresponding public keys.

This leads to a sort of tree structure where multiple child keys are derived from a parent key. Because all the child private and public keys are ultimately derived from the master key, they can all be controlled by the same secret phrase that is given to you by your crypto wallet.

A secret phrase contains many public/private key pairs, meaning that with one secret phrase you can basically use as many addresses as you need. That also includes public/private key pairs on different blockchains, which is why for instance with Bridge Wallet (and most wallet applications) you control with a single secret phrase a Bitcoin wallet, an Ethereum wallet, a Tezos wallet, and so on.

Backing up secret phrases

Most of non-custodial wallet apps ask you to back up your secret phrase immediately after creating it. Although that step is not mandatory, you should really back up your secret phrase sooner rather than later if you plan to use seriously.

You should either write your secret phrase down on a piece of paper and store it somewhere safe (waterproof and fireproof if possible), or you could even use more durable support like metallic plates, where you can engrave your seed words. You can buy such products online from manufacturers like Ledger or Trezor.

Most importantly, never make a screenshot of your secret phrase and never write it on a digital medium (email, SMS, text file, etc.). When using a mobile wallet, your secret phrase is indeed stored on your mobile phone but it is locally encrypted and protected by passwords, which is already more secure than most options (we'll explain the different options in more detail in another chapter). If you write or screenshot your secret phrase, it is openly available on your device and can be easily hacked. If anyone gets access to that text or picture file, your cryptocurrencies will be gone in minutes.

We will have a deeper look in the next chapters the different ways to use secret phrases and the best ways to keep them secure.

Public key, private key and seed phrases (2024)

FAQs

Public key, private key and seed phrases? ›

The seed phrase is the master key; therefore, if it is lost, forgotten, or mixed up, the user cannot access their crypto wallet permanently. A user's private and public keys are intrinsically linked to the seed phrase. A seed phrase is a collection of random words.

Is a seed phrase the same thing as a private key? ›

While seed phrases provide access to a single crypto address, a private key will grant access to the user's entire wallet on any given blockchain (which can be linked to multiple blockchain accounts). In this sense, private keys could be considered less secure, as more can be accessed with just one line of data.

Is the 12 word phrase a private key? ›

Each address for every crypto has its own private key. Private keys are used to authorize transactions and prove ownership of your funds. All private keys in Exodus are generated from and tied to your 12-word secret recovery phrase.

What is the difference between secret phrase and private key? ›

While a Secret Recovery Phrase is used to create and restore your entire MetaMask Wallet, including all accounts created in that wallet, each account has its own private key. This key can be used to import that account, and that account only, into a different wallet.

What is the difference between public key and private key? ›

Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

Does every wallet have a seed phrase? ›

Most crypto wallets automatically generate a seed phrase when set up. There aren't many choices available for customizing the seed phrase's settings because the procedure is often mechanical.

What is my Coinbase wallet private key? ›

A string of letters and numbers that is used to access and spend cryptocurrencies or NFTs stored in a wallet. A Seed Phrase represents your private keys within a wallet. Neither your private keys or seed phrase should ever be shared with anyone otherwise they could gain access to your wallet and steal your funds.

Do public keys have passphrases? ›

As I understand, private keys can have passphrases, but not public keys. The purpose of a passphrase is to protect your key on your computer; like the private key, it should be kept secret.

What is an example of a seed phrase? ›

Here is an example of a 12-word seed phrase: timber, sword, where, noodle, joy, eagle, admit, tuna, vibrant, museum, gossip, river. The standard method for seed phrases is called BIP-39 —short for Bitcoin improvement proposal-39. BIP-39 was introduced in 2013 with a list of 2,048 words that could be in seed phrases.

Can you brute force a 12 word seed phrase? ›

Since there are so many possible word combinations, it's next to impossible for a hacker to crack. They could create a program to work through all the options (a brute force search approach), but the chances of getting the right combination are 1 out of the big number above.

How many private keys can a seed phrase generate? ›

A private key is a long string of digits that gives its owner access to cryptocurrency on a specific blockchain address. A seed phrase is typically a set of 12 random words that is used to garner access to a self-custody wallet. An infinite number of private keys can be stored under a single seed phrase.

Should a private key have a passphrase? ›

SSH passphrases protect your private key from being used by someone who doesn't know the passphrase. Without a passphrase, anyone who gains access to your computer has the potential to copy your private key. For example, family members, coworkers, system administrators, and hostile actors could gain access.

What is the 24 word private key? ›

Your 24-word recovery phrase (sometimes called a mnemonic or seed phrase) is the master key to all your crypto accounts. Anyone gaining access to your recovery phrase can very easily clone your accounts on their own device (or software wallet) and spend your funds.

What is an example of a public and private key? ›

Public and private keys: an example

Bob wants to send Alice an encrypted email. To do this, Bob takes Alice's public key and encrypts his message to her. Then, when Alice receives the message, she takes the private key that is known only to her in order to decrypt the message from Bob.

How do I know if my key is public or private? ›

Those commands validate if the private key belongs to the public certificate:
  1. openssl x509 -noout -modulus -in <public.crt> | openssl md5 > /tmp/crt.pub. Note: Replace <public. ...
  2. openssl rsa -noout -modulus -in <private.key> | openssl md5 > /tmp/key.pub. Note: Replace <private. ...
  3. diff /tmp/crt.pub /tmp/key.pub.
5 days ago

What are public and private keys for dummies? ›

A public key is also used to encrypt a message or check the legitimacy of a digital signature. It is accompanied by a corresponding private key, which is known only to its owner. Private keys are used to decrypt messages that were created with the corresponding public key or to create signatures.

What is the difference between seed phrase and private key ledger? ›

A private key is a long string of digits that gives its owner access to cryptocurrency on a specific blockchain address. A seed phrase is typically a set of 12 random words that is used to garner access to a self-custody wallet. An infinite number of private keys can be stored under a single seed phrase.

What is a private key also known as? ›

A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data.

What is a seed phrase also known as? ›

A seed phrase is a series of 12 or 24 random words that provides the data needed to recover a lost or broken crypto wallet. It is also known as a mnemonic phrase and is best understood as a security measure for self-custodied digital assets. Both hot wallets and cold wallets can use a seed phrase for recovery.

What is another word for private key? ›

Synonyms for private key cryptography include symmetric-key cryptography, shared secret encryption, and secret key cryptography. These terms all refer to the same concept of using a shared, secret key to encrypt and decrypt messages.

Top Articles
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 5416

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.