It is enough to read only this sentence in the whole article:
China intends to open up its market to attract foreign investment.
Because without foreign investment, the internal circulation will soon prove to be a dead end.
A little guess on it, the 10 letters b, d, k, l, r, v, w, x, y, z do not appear in this character set, therefore, among the 2048 words in BIP-39, cut the first 4 letters out first, and then delete all the words containing these 10 letters, leaving only about 600 candidate words.
On the other hand, to uniquely express 12 seed words, each taking the first 4 letters requires 48 letters. Only 46 are given here. Therefore, there are, and only 2 words that are 3 letters long, and there are 10 words are 4 letters in length.
If this guess is correct, it should be feasible to run a letter counting program for random combinations of 12 words on the compiled 600-length word list, but this may cause collisions, different combinations may produce the same letter count.
FYI.
I don't think this information is helpful, in other words, in practice to resist reverse derivation, the attack vectors won't contain this information.
no, this challenge is to restore the private key from random characters, which is the security foundation of Bitcoin and cannot be challenged
In fact, the painting gives clues to restore the 12 seed words in the correct order, as the author said, this is a simple substitution cypher, it is impossible to restore it by just have the seed plate, and you can't even start guessing with just the painting, only by putting the seed plate and the painting together can you solve the private key.
And as I told the author, the password management tool I have actually used for the past 8 years can also be used for seed word encryption, which allows to publish seed plate and painting at the same time and still be unbreakable
In fact, the whole method should be put on fire, not just the most secure part. You can send me these 12 seed words in the correct order in a private message, and I will encrypt them using a public substitution table and send the ciphertext back to you. If you already know the plaintext and the ciphertext, and the table, try to reverse the encryption rules.
Brute force is not feasible for this problem. With the current global computing power, brute force can significantly reduce the search range, but it is still not small enough for luck to play a role in a meaningful time.
In simple terms, the ciphertext and substitution table are publicly displayed, and without knowing the rules, it is impossible to reverse deduce the plaintext. Even if the plaintext, ciphertext, and substitution table are publicly displayed, it is impossible to reverse deduce the rules. I will give an example to illustrate this later.
Let's take an example
you have 12 seed words in the following order:
anger animal check effort eight episode just oppose pig possible question sea
By the way, this happens to be one set of possible solutions to your challenge.
I re-encrypted them with my password card as below
https://image.nostr.build/3a4d3f8a72c7cfe3ff77eaa7d256e1b4743024637b5ef0dad4ac0ba137d6d0ad.jpg
to get the following strings:
h+ike2Tk2hK9!%%+%@7#S9fVhMV^pVMV!h9Tb=2S9&Xe+hs8~npf5eMss
I can write this string of characters on a piece of paper and put it anywhere in the public domain, along with my password card.
If no one else knows the plaintext and substitution rules, then your seed words are safe.
And even you yourself know the plaintext of the 12 words, and you know the ciphertext, and you have this substitution table from my password card, but you still can't backtrack my substitution RULES.
Once you can do that, guess my substitution rules, you can restore another ciphertexts that I have written on paper and made public:
5hK9!spT&=h+Vs%9K9bXh+hY7fM2&8%+X@e9M2fVhMXspVT^h%Ss@2h+XP
You'll find this is another group of MY seed words:
XXXXXX XXXXXXX XXXXXXX XXXXXX XXX XXXXX XXXXX XXX XXXXXX XXXXX XXXXXX XXXXXXXX
By the way, this group of seed words is another set of possible solutions to your challenge.
can you make it?
As you can see, the key to security becomes the RULES, and it's always easier to memorize the rules than it is to memorize individual ciphers one by one, so I use this card to manage all of my high-strength passwords over 8 years, and I'm sure it can be used to keep the seed words safe as well.
My original words are about a method:
1. among the 2048 words in BIP-39, cut the first 4 letters out first
2. delete all the words containing these 10 letters, leaving only about 600 candidate words.
3. to uniquely express 12 seed words, each taking the first 4 letters requires 48 letters. Only 46 are given here, so there are 2 words that are 3 letters long, and there are 10 words are 4 letters in length.
4. run a letter counting program for random combinations of 12 words on the compiled 600-length word list
It's hard to understand from these words that all seed words longer than 4 letters are excluded, right?
It seems to be purely a work of art and has no practical use.
I'm actually working on a metal card for managing passwords, so I thought there was some other solution here that would inspire me
I understand that this is a substitution, but the introduction of 44 new symbols is inconvenient for users.
In fact, I currently use a credit card-sized metal card, with a one-to-many substitution table on the card face, and then switch the substitution set through the rules I define, as long as the rules are kept secret, your plaintext will be safe no matter the ciphertext is displayed publicly, or the card face and ciphertext are displayed at the same time. FYI.
Notes by ₿itCat | export