What if Ethereum faces a quantum attack? Vitalik: No need to worry

V God said that most users’ private keys are themselves a result of a series of hash calculations. Many keys are generated using BIP-32, which generates each address through a series of hash values starting from a master seed phrase. The working principles of many non-BIP-32 key generation methods are also similar. For example, if a user has a brain wallet, it usually applies a series of hash values (or a moderately difficult KDF) to certain passwords.

Leave a Reply

Your email address will not be published. Required fields are marked *