3 Comments

Hi Massimo, you say 'Splitting a seed phrase into multiple parts significantly weakens its security against brute-force attacks.' why is that so? I thought the risk of splitting the seed would be of loosing some of the seed words, but not weakening against brute force attacks

Expand full comment
author

in that part we talk about simple splitting (not other techniques). The affirmation is based on maths. A 24-word seed phrase contains 256 bits of entropy, making it incredibly difficult (virtually impossible) to crack through brute force. When you split the seed phrase into parts, each part has significantly less entropy. For instance, if you split a 24-word seed phrase into three 8-word parts, each part now only has 80 bits of entropy. If a split seed phrase part includes the checksum word, an attacker can guess the missing words much more easily. They only need to find words that create a valid checksum, significantly reducing the number of possible combinations. Instead of basic seed splitting, techniques like Seed XOR offer a more secure way to split a seed phrase while maintaining a high level of security.

Expand full comment

great thxs

Expand full comment