Mnemonic:

bip39 0.2 | 2305

... ...

... ... ...

In the world of cryptography and digital assets, one of the most critical aspects of managing digital assets
is the ability to restore them in case of device loss or failure. BIP39 provides an excellent solution for this issue,
as it presents a more user-friendly method of backup compared to random strings of characters.
(Trezor)

With 11 bits, we can have 2

| I: 0011 | A: 0111 | T: 0011 |

If you share the information generated by this page with anyone, they can steal your assets. Anyone asking you to share your your secret recovery phrase or BIP 32 root key is a scammer.

SLIP-00039 |
github.com/trezor/python-shamir-mnemonic |

agama_point_crypto/../ slip2_ 3generate_vectors.py | slip3_5recovery.py

agama_point_crypto/../ slip2_ 3generate_vectors.py | slip3_5recovery.py

:.: Security | Padded share value length | Total share length ----------+---------------------------+------------------- 128 bits | 130 bits 200 bits = 20 words 256 bits | 260 bits 330 bits = 33 words20 words:2 - 2 - 13 - 3 The first two words are random but the same for all multishare backup sets. The third and fourth words contain information about the number of sets and the number required to recover the wallet. The following 13 words (i.e., words 5 to 17) represent the actual seed. The last three words (i.e., words 18 to 20) form the checksum.

Format of the share mnemonic• identifier (id) field is a random 15-bit value that is the same for all shares and verifies that they belong together. • extendable backup flag (ext) field indicates whether the id is used as salt in the encryption of the master secret (ext = 0). • iteration exponent (e) field specifies the number of iterations in PBKDF2, calculated as 10000×2^e. • group index (GI) field represents the x value of the group share. • group threshold (Gt) field indicates the number of group shares needed to reconstruct the master secret, encoded as Gt = GT − 1. • group count (g) indicates the total number of groups, encoded as g = G − 1. • member index (I) field is the x value of the member share in the group. • member threshold (t) field shows how many member shares are needed to reconstruct the group share, encoded as t = T − 1. • padded share value (ps) field is a list of the SSS part's fk(x) values, each encoded as an 8-bit string. The share value is left-padded with "0" bits to make its length a multiple of 10. • checksum (C) field is an RS1024 checksum of the share's data part. The RS1024 customization string is "shamir" for ext = 0 and "shamir_extendable" for ext = 1. bits id ext e GI Gt g I t ps C 15 - 1 - 4 --- 4 - 4 - 4 - 4 - 4 --- +8 ---- 30 2 - 2 - 13 - 3 12 * 11 = 132 13 * 10 = 130 12 * 10 + 8 = 128

SLIP-0039: - standard and interoperable implementation of Shamir's secret-sharing (SSS) and a specification for its use in backing up Hierarchical Deterministic Wallets described in BIP-0032. SSS splits a master secret into unique parts which can be distributed among participants. A specified minimum number of parts is required to be supplied in order to reconstruct the original secret. Knowledge of fewer than the required number of parts does not leak information about the master secret. This SLIP is mainly intended as a replacement for BIP-0039 and for the most part, the two are not compatible.

id ext e GI GtgI t ps C 15 - 1 - 4 --- 4 - 4 -4- 4 - 4 --- +8 ---- 30 2 - 2 - 13 - 3 3/2: album academic acrobat leader curly endless ... 1/1: purple branch academic academic antenna ... 9/5: walnut flea agree academic acne skin rapids ... walnut 10 | zero 11

:.