Private Key
A cryptographic key used to sign blockchain transactions and derive public keys; ultimate proof of control over funds.
- Also known as
- secret keycryptographic key
A private key is a fundamental element of public-key cryptography used in blockchain technology. It's essentially a randomly generated, extremely large number that serves as the root of your cryptocurrency ownership. Private keys serve two critical functions: they generate public keys through one-way cryptographic functions, and they sign transactions to prove ownership without revealing the key itself. When you "own cryptocurrency," you actually own the private key that controls a blockchain address containing those assets.
Technically, a private key in most cryptocurrencies is a 256-bit number, often displayed as a 64-character hexadecimal string. This provides 2^256 possible combinations, making properly generated private keys computationally impossible to guess. From this private key, a public key is derived using the Elliptic Curve Digital Signature Algorithm (ECDSA) or similar methods. The public key is then hashed and encoded to create the address that receives funds.
Private keys can be encoded and presented in various formats to improve usability while maintaining their cryptographic properties. Common formats include:
- Raw hexadecimal format (64 characters)
- Wallet Import Format (WIF) - a base58-encoded format with checksum
- Mnemonic seed phrases (12 to 24 common words) that can regenerate private keys
- Hardware wallet secured keys that never leave the device
- Multi-signature setups requiring multiple private keys
The security of cryptocurrency assets ultimately depends on the secrecy and proper storage of private keys. If a private key is lost, the funds associated with it become permanently inaccessible—there is no "forgot password" option in decentralized systems. Conversely, if a private key is compromised, an attacker can transfer all funds without the possibility of reversal.
Best practices for private key security include:
- Using hardware wallets for significant holdings
- Creating secure, offline backups of keys or seed phrases
- Never sharing private keys or seed phrases with anyone
- Using multisignature wallets for additional security layers
- Considering inheritance planning for your keys
- Being wary of phishing attempts targeting your private keys
- Testing recovery procedures before storing large amounts
Modern cryptocurrency wallets typically use Hierarchical Deterministic (HD) key generation, following the BIP32/BIP44 standards. This allows a single seed phrase to generate an entire tree of private keys and corresponding addresses. HD wallets provide better privacy by creating a new address for each transaction while still allowing the user to back up just one seed phrase.
Related terms
6 linkedExplore connected entries beyond the alphabetical index.
Public Key
→A cryptographic identifier derived from a private key; used to verify signatures and derive addresses.
Key pair
→A matched private key and public key used to prove control, verify signatures, and derive cryptocurrency addresses.
Mnemonic
→A sequence of words used to generate and recover a private key, typically 12 or 24 words long.
Keystore
→An encrypted wallet file that stores private keys or seed material, usually protected by a user password.
Hardware wallet
→A physical signing device that keeps private keys isolated while approving cryptocurrency transactions.
Wallet
→Software or hardware that manages crypto keys, creates addresses, signs transactions, and shows blockchain activity.
All terms and definitions may update as the Cryptionary improves.
