You can enter an existing BIP39 recovery phrase, or generate a new random one.
Entropy is an advanced feature. Your recovery phrase may be insecure if this feature is used incorrectly. Read more
Valid entropy values include:
Some characters have been discarded.
Time To Crack
Event Count
Entropy Type
Avg Bits Per Event
Raw Entropy Words
Total Bits
Filtered Entropy
Raw Binary
Recovery Phrase Length
The recovery phrase will appear more secure than it really is.
Binary Checksum
Word Indexes
Typing your own words will probably not work how you expect, since the words require a particular structure (the last word contains a checksum).
This is an advanced feature and should only be used if you understand what it does. Please read the BIP85 spec for more information.
The value of this field is not used elsewhere on this page. It can be used as a new key. In case of the BIP39 application, you can paste it into the "BIP39 Recovery Phrase" field to use it as a new recovery phrase.
The account extended keys can be used for importing to most BIP44 compatible wallets, such as mycelium or electrum.
The BIP32 derivation path and extended keys are the basis for the derived addresses.
Use path m/0'/0'
with hardened addresses.
For more info see the Bitcoin Core BIP32 implementation
Use path m/0'/0
.
For change addresses use path
m/0'/1
.
For more info see MultiBit HD
Use path m/44'/0'/0'
.
Only enter the xpub
extended key into
block explorer search fields, never the
xprv
key.
Can be used with: blockchain.info
BIP49 is unavailable for this coin.
The account extended keys can be used for importing to most BIP49 compatible wallets.
The BIP32 derivation path and extended keys are the basis for the derived addresses.
BIP141 is unavailable for this coin.
BIP84 is unavailable for this coin.
The account extended keys can be used for importing to most BIP84 compatible wallets.
The BIP32 derivation path and extended keys are the basis for the derived addresses.
Path
|
Address
|
Public Key
|
Private Key
|
---|---|---|---|
Recovery phrase for generating deterministic keys. Read more at the official BIP39 spec.
Hierarchical Deterministic Wallets. Read more at the official BIP32 spec. See the demo at bip32.org.
Multi-Account Hierarchy for Deterministic Wallets. Read more at the official BIP44 spec.
Derivation scheme for P2WPKH-nested-in-P2SH based accounts. Read more at the official BIP49 spec.
Deterministic Entropy From BIP32 Keychains. Read more at the official BIP85 spec.
Entropy values should not include the BIP39 checksum. This is automatically added by the tool.
Entropy values must be sourced from a strong source of randomness. This means flipping a fair coin, rolling a fair dice, noise measurements etc. Do NOT use phrases from books, lyrics from songs, your birthday or street address, keyboard mashing, or anything you think is random, because chances are overwhelming it isn't random enough for the needs of this tool.
Do not store entropy.
Storing entropy (such as keeping a deck of cards in a specific shuffled order) is unreliable compared to storing a recovery phrase. Instead of storing entropy, store the recovery phrase generated from the entropy. Steganography may be beneficial when storing the recovery phrase.
The random recovery phrase generator on this page uses a cryptographically secure random number generator. The built in random generator can generally be trusted more than your own intuition about randomness. If cryptographic randomness isn't available in your browser, this page will show a warning and the generate button will not work. In that case you might choose to use your own source of entropy.
You are not a good source of entropy.
Card entropy has been implemented assuming cards are replaced, not drawn one after another. A full deck with replacement generates 232 bits of entropy (21 words). A full deck without replacement generates 225 bits of entropy (21 words).
Please refer to the software license for more detail.
The software is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.