Skip to main content

Private Key

security
wallet
basics
cryptography

A cryptographic key used to sign blockchain transactions and derive public keys; ultimate proof of control over funds.

Also known as
secret key
cryptographic key
1
general

A private key is a fundamental element of public-key cryptography used in blockchain technology. It's essentially a randomly generated, extremely large number that serves as the root of your cryptocurrency ownership. Private keys serve two critical functions: they generate public keys through one-way cryptographic functions, and they sign transactions to prove ownership without revealing the key itself. When you "own cryptocurrency," you actually own the private key that controls a blockchain address containing those assets.

2
technical

Technically, a private key in most cryptocurrencies is a 256-bit number, often displayed as a 64-character hexadecimal string. This provides 2^256 possible combinations, making properly generated private keys computationally impossible to guess. From this private key, a public key is derived using the Elliptic Curve Digital Signature Algorithm (ECDSA) or similar methods. The public key is then hashed and encoded to create the address that receives funds.

3
forms

Private keys can be encoded and presented in various formats to improve usability while maintaining their cryptographic properties. Common formats include:

  1. Raw hexadecimal format (64 characters)
  2. Wallet Import Format (WIF) - a base58-encoded format with checksum
  3. Mnemonic seed phrases (12 to 24 common words) that can regenerate private keys
  4. Hardware wallet secured keys that never leave the device
  5. Multi-signature setups requiring multiple private keys
4
security

The security of cryptocurrency assets ultimately depends on the secrecy and proper storage of private keys. If a private key is lost, the funds associated with it become permanently inaccessible—there is no "forgot password" option in decentralized systems. Conversely, if a private key is compromised, an attacker can transfer all funds without the possibility of reversal.

5
best_practices

Best practices for private key security include:

  1. Using hardware wallets for significant holdings
  2. Creating secure, offline backups of keys or seed phrases
  3. Never sharing private keys or seed phrases with anyone
  4. Using multisignature wallets for additional security layers
  5. Considering inheritance planning for your keys
  6. Being wary of phishing attempts targeting your private keys
  7. Testing recovery procedures before storing large amounts
6
hierarchical_keys

Modern cryptocurrency wallets typically use Hierarchical Deterministic (HD) key generation, following the BIP32/BIP44 standards. This allows a single seed phrase to generate an entire tree of private keys and corresponding addresses. HD wallets provide better privacy by creating a new address for each transaction while still allowing the user to back up just one seed phrase.

Conceptual links

Related terms

6 linked

Explore connected entries beyond the alphabetical index.

All terms and definitions may update as the Cryptionary improves.