Question 1 Show how a user in possession of k1,1 can use this key and the public values to obtain k1,0, k0,1, and k0,0. Use this equation to solve the first part. xi,j-1 = ki,j-1 _ Hash(ki,j || li,j-1) and yi-1,j = ki-1,j _ Hash(ki,j || li-1,j). Analyse the security of this design. In particular, discuss if it is possible for someone in possession of k2,1 to derive higher level keys such as k3,1, k2,2, or k3,2. Justify your answers. Answer is no, you need need to refer to the property of the exclusive-OR operation and the properties of a hash function
The post Understanding Hierarchical Deterministic (HD) wallet appeared first on .