go-bip32 | Golang implementation of the BIP32 HD address spec
kandi X-RAY | go-bip32 Summary
kandi X-RAY | go-bip32 Summary
Golang implementation of the BIP32 HD address spec
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Deserialize deserializes a Key from a byte slice .
- NewMasterKey generates a new master key
- expandPublicKey takes a serialized key and returns the result .
- PublicKey returns a copy of the key .
- addPrivateKeys adds two private keys .
- Compress public key
- hash160 returns the hash of the given data .
- hashDoubleSha256 hashes data using SHA256
- validateChildPublicKey returns an error if the key is not valid .
- checks if the key is valid
go-bip32 Key Features
go-bip32 Examples and Code Snippets
Community Discussions
Trending Discussions on go-bip32
QUESTION
I am using BIP39 specifications to generate 12 word mnemonic which will later used to generate Master Public/Private and their 2^32-1 child keys. These children keys will then be used for asymmetric encryption.
...ANSWER
Answered 2018-Sep-08 at 20:06My question is, When people say that the keys not generated properly from random functions are susceptible to break, what they actually mean?
Bad randomness is attacked in cryptography in two ways:
By exhaustive search of the seed that was used to generate the stream of bits. A prominent example is the Debian OpenSSH vulnerability.
By attacking the predictability of random number generators that were not designed to meet cryptographic requirements. In statistical random number generators, the main requirement is that the data looks random. In cryptographic random number generators, we require more: given the stream of bits, a very smart person who knows the algorithm cannot figure out what future or previous bits for the random number generator are. As an example, although the Mersenne Twister has a large internal state, it does not meet the cryptographic requirement.
Your question about measuring entropy is the wrong question. Measuring entropy is treating it like it is a statistical random number generator, not like a cryptographic random number generator. You say:
GenerateRandomString and GenerateRandomSalt just generates random string and bytes based on crypto/rand packages.
That's all you need to know -- you should not need to worry about anything else. As mentioned above, no amount of measuring entropy is going to tell you that your keys are secure. Instead, you need to be a cryptographic expert to analyse such algorithms. For a consumer of the randomness, all you can do (short of using another source such as /dev/urandom) is trust that this has been designed well and analysed by cryptographic experts.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install go-bip32
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page