How Seed Phrases Generate Private Keys

A seed phrase isn't just a backup — it's a standardized encoding of a master secret that deterministically generates your entire wallet. Here's the four-step mechanism: entropy to words (BIP-39), words to 512-bit seed (PBKDF2), root seed to master key (BIP-32), and derivation paths (BIP-44).
Lewis Jackson
CEO and Founder

A seed phrase — those 12 or 24 words your wallet assigns you during setup — looks random. It isn't. It's a standardized encoding of a single, very large number. That number is the master secret from which your entire wallet — every private key, every public address, every account across multiple blockchains — is mathematically derived.

This is where a lot of confusion sits. People treat the seed phrase as "the backup for my wallet" without understanding why it works that way, or what makes it different from a password. Understanding the mechanism changes how seriously you engage with it, and what risks you're actually managing.

The Four-Step Derivation Process

Going from 12-24 words to a functional wallet involves four well-defined steps, each standardized across the industry.

Step 1: Entropy to Words (BIP-39)

When a wallet generates a seed phrase, it starts by producing cryptographic entropy — a random number, typically 128-256 bits depending on whether you're creating 12 or 24 words. This randomness is the foundation. If it's weak, everything downstream is weak. This is one reason you should never use wallets that let you choose your own words: human-selected "random" words are orders of magnitude less unpredictable than properly generated entropy.

The random bits are then encoded using the BIP-39 wordlist — a standardized set of 2,048 English words. Each group of 11 bits maps to one word. A 128-bit entropy source, plus a 4-bit checksum, gives you 132 bits and 12 words. A 256-bit source, plus an 8-bit checksum, gives you 264 bits and 24 words.

That checksum — derived from the first bits of a SHA-256 hash of the entropy — is there to catch transcription errors. Most wallets will refuse to import a phrase with a bad checksum, which gives you feedback that something went wrong when writing it down. This is intentional design, not just convenience.

Step 2: Words to 512-Bit Seed (PBKDF2)

Here's where it gets non-obvious. The 12 or 24 words aren't themselves the private key. They're converted into a 512-bit root seed using a key-stretching function called PBKDF2-HMAC-SHA512. The conversion runs 2,048 rounds of hashing — intentionally slow, to make brute-force attacks computationally expensive.

The inputs are the mnemonic phrase (as UTF-8 bytes) and a salt: the string "mnemonic" concatenated with an optional passphrase. This is how the "25th word" feature works in hardware wallets like Ledger and Trezor. Appending a passphrase produces an entirely different 512-bit seed — and therefore an entirely different wallet — from the same 12 or 24 words.

The implication: if someone finds your written seed phrase but not your passphrase, they access a different (empty) wallet. Two separate secrets, two separate attack vectors, and a material improvement in physical security. It also means you now have two things to back up and protect independently.

Step 3: Root Seed to Master Key (BIP-32)

The 512-bit root seed is split into two 256-bit halves. The left half becomes the master private key. The right half becomes the master chain code — a value that adds entropy to child key derivation, preventing one exposed child key from compromising the parent or siblings.

From the master key, you can derive an unlimited number of child private keys using HMAC-SHA512. Each child has an index number (0, 1, 2, 3…) and can itself parent further derivation, producing a tree. This is the "hierarchical deterministic" part of HD wallets.

Derivation is one-way. You can go from master to any child, but you can't reverse from a child back to the master. And each child at the same level is independent — knowing child key 3 tells you nothing about child key 4. This independence is structurally important: it's what allows wallets to generate fresh addresses for every receive transaction without exposing the root.

Step 4: Derivation Paths (BIP-44)

BIP-44 standardized how the tree is organized. A path like m/44'/60'/0'/0/0 means:

  • m — master key
  • 44' — BIP-44 standard (hardened derivation)
  • 60' — coin type 60, Ethereum (Bitcoin uses 0)
  • 0' — first account
  • 0 — external chain (receiving addresses)
  • 0 — first address index

This is why the same seed phrase produces different Bitcoin and Ethereum addresses. Both are derived from the same root, following different paths through the same tree.

Where Constraints Live

Two constraints in this model are binding and unlikely to change.

The first is finality. There's no recovery mechanism outside the seed phrase itself. If it's lost and there's no passphrase, no customer support request, legal proceeding, or technical intervention can help. This isn't a design flaw — it's the mechanism working correctly. The same property that removes intermediaries also removes recovery paths.

The second is full exposure on compromise. The same determinism that makes backups possible means anyone with your seed phrase has everything: all accounts, all assets, across every chain your wallet supports. Partial exposure doesn't exist in this model. One compromise is total compromise.

What's Changing

The BIP-32/39/44 standards are stable and widely adopted. The layer shifting above them is account abstraction (ERC-4337 and related standards), which enables wallets controlled by smart contracts rather than raw private keys. These accounts can use device-native authentication — Face ID, passkeys — and support programmable recovery through trusted contacts or threshold schemes.

This matters because it challenges the assumption that users must directly manage seed phrases. The derivation mechanics described here remain the foundation for the vast majority of self-custody wallets in use. But the product layer is being rebuilt.

What Would Confirm This Direction

Seed-phrase derivation remains dominant: continued BIP-39/44 adoption across hardware wallets, no significant security failures traced to the standard, and no mainstream wallet defaulting to passkey-only onboarding.

Displacement is underway: measurable growth in on-chain smart contract wallet activations (ERC-4337 UserOperation volume as a share of total transactions), passkey-signing wallets becoming defaults at major providers.

What Would Break or Invalidate It

The BIP-32/39/44 mechanism is cryptographically sound. What could change the picture at a deeper level: a credible attack on the secp256k1 elliptic curve (the basis for private key math), a significant weakness in HMAC-SHA512 affecting HD derivation, or quantum computing advances reducing the security margin of 256-bit keys to practical attack range. None of these are near-term threats. They sit on the long-horizon risk register.

Timing Perspective

Now: This is the live mechanism for essentially all self-custody wallets. Understanding it is operationally relevant today.

Next (2026-2027): Smart contract wallets and passkey-based signing will likely become mainstream onboarding options, but seed-phrase wallets aren't going away in this window.

Later: Whether seed phrases as a user-facing primitive get fully displaced depends on the security track record of account abstraction — an open question.

Boundary Statement

This is a mechanism explanation. It doesn't address the operational security of any specific wallet product, tax treatment of crypto activity, or what custody setup is appropriate for any particular situation.

The mechanism works as described. Whether it represents the right custody approach depends on factors outside this scope.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.