Apr 13 - Apr 13, 2025
This approach involves splitting a nonce into two parts: the first half containing the 12 seed words (equating to 132 bits of information) and the second half comprising a random seed (124 bits). This random seed is made highly public to ensure it cannot be forgotten, operating under the principle that widespread knowledge equals personal remembrance.
The technical strategy outlined suggests setting the mining difficulty to match the entropy of the seed words potentially forgotten. For example, to allow for the forgetting of 6 seed words, one would need to execute 2^66 hash computations. The feasibility of this task is exemplified by estimating that a 100 TH/s miner could complete it within 8 days at an approximate expense of $50. The proposed target hash value for this operation is calculated as (2^256-1)/2^66.
The security premise behind this method rests on the significant disparity in effort between the legitimate user and a potential attacker. While the user knows half of the nonce (the 12 seed words), an attacker starting from scratch faces a vastly larger search space of 2^132. Consequently, for the attacker, each incorrect guess out of the possible 2^65 carries a cost of $50, theoretically imposing a prohibitive financial barrier to unauthorized access.
This concept hinges on the assumption that an attacker cannot hash more than ten times as efficiently as a standard home setup, aiming to leverage computational work as a defensive mechanism against unauthorized seed word discovery.
TLDR
We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project?
Give Feedback