@@ -46,7 +46,7 @@ We propose the following format of the shares:
...
@@ -46,7 +46,7 @@ We propose the following format of the shares:
*`threshold (M)` field indicates how many shares are needed to reconstruct the secret
*`threshold (M)` field indicates how many shares are needed to reconstruct the secret
*`index (I)` and `threshold (M)` fields values are from range 1-31, value 0 is not considered valid
*`index (I)` and `threshold (M)` fields values are from range 1-31, value 0 is not considered valid
*`share (S)` field is the corresponding SSS part's `y` value (see the diagram above) right-padded with zeroes to the nearest multiple of 10 bits
*`share (S)` field is the corresponding SSS part's `y` value (see the diagram above) right-padded with zeroes to the nearest multiple of 10 bits
*`checksum (C)` field is a Bech32 checksum (defined in BIP-0173) of the whole share (that is `n || I || M || S`), human-readable part (hrp) of Bech32 is "SLIP0039"
*`checksum (C)` field is a Bech32 checksum (defined in BIP-0173) of the whole share (that is `n || I || M || S`), human-readable part (hrp) of Bech32 is "slip0039"
This structure is then converted into a mnemonic code by splitting it up by 10 bits which correspond as an index to the a word list containing exactly 1024 words (see below).
This structure is then converted into a mnemonic code by splitting it up by 10 bits which correspond as an index to the a word list containing exactly 1024 words (see below).
...
@@ -72,7 +72,7 @@ Passphrase should contain only printable ASCII characters (codepoints 32-126) to
...
@@ -72,7 +72,7 @@ Passphrase should contain only printable ASCII characters (codepoints 32-126) to
![passphrase](slip-0039/passphrase.png)
![passphrase](slip-0039/passphrase.png)
We will use `PBKDF2(PRF = HMAC-SHA256, Password = master_secret, Salt = ("SLIP0039" || passphrase || n), iterations = 20000, dkLen = 256 bits)` as the key derivation function. Nonce value `n` is encoded as two words from the wordlist separated by exactly one space (codepoint 32).
We will use `PBKDF2(PRF = HMAC-SHA256, Password = master_secret, Salt = ("slip0039" || passphrase || n), iterations = 20000, dkLen = 256 bits)` as the key derivation function. Nonce value `n` is encoded as two lowercase words from the wordlist separated by exactly one space (codepoint 32).
We suggest to use the obtained seed as a master seed `S` for Hierarchical Deterministic Wallets described in BIP-0032.
We suggest to use the obtained seed as a master seed `S` for Hierarchical Deterministic Wallets described in BIP-0032.