Skip to main content

SLIP-39 Shamir Mnemonics

Project description

python-shamir-mnemonic

> This is a temporary upgrade shim for https://github.com/trezor/python-shamir-mnemonic

> Install shamir_mnemonic via python -m pip install shamir-mnemonic-slip39, > until the upstream https://pypi.org/project/shamir-mnemonic is upgraded to include > recovery of arbitrary SLIP-39 Mnemonic groups.

https://badge.fury.io/py/shamir-mnemonic.svg

Reference implementation of SLIP-0039: Shamir’s Secret-Sharing for Mnemonic Codes

Abstract

This SLIP describes a standard and interoperable implementation of Shamir’s secret sharing (SSS). SSS splits a secret into unique parts which can be distributed among participants, and requires a specified minimum number of parts to be supplied in order to reconstruct the original secret. Knowledge of fewer than the required number of parts does not leak information about the secret.

Specification

See https://github.com/satoshilabs/slips/blob/master/slip-0039.md for full specification.

Security

This implementation is not using any hardening techniques. Secrets are passed in the open, and calculations are most likely trivially vulnerable to side-channel attacks.

The purpose of this code is to verify correctness of other implementations. It should not be used for handling sensitive secrets.

Extendable encrypted master secrets

When you SLIP-39 encode a master secret with a password, you can always recover the original secret with the same password. You of course get a different secret (ie. a different wallet) with a different password; this is by design: you can (for example) have a master password for your true wallet containing your funds, and a “decoy” password for a valid wallet that contains funds to satisfy an attacker. Or, you may simply derive multiple wallets for different purposes with different passwords.

The mnemonics are by default “extendable”, meaning that you can re-encode the same master secret again (with different SLIP-39 group specs), and get the same decrypted secret back with the original password, and the same wallets with your other passwords.

If desired, you can produce –no-extendable encrypted master secrets (which used to be the SLIP-39 standard), which always recover the original secret with the original password – but produce different secrets for all other passwords. This only causes surprises when you want to re-encrypt the same master secret again: you can’t re-obtain the other passwords’ wallets using the newly encoded mnemonics!

To reduce surprises, SLIP-39 now produces –extendable encrypted master secrets by default.

Installation

With pip from PyPI:

$ pip3 install shamir-mnemonic[cli]  # for CLI tool

From local checkout for development:

Install the [Poetry](https://python-poetry.org/) tool, checkout python-shamir-mnemonic from git, and enter the poetry shell:

$ pip3 install poetry
$ git clone https://github.com/trezor/python-shamir-mnemonic
$ cd python-shamir-mnemonic
$ poetry install
$ poetry shell

Alternatively, install [Nix](https://nixos.org/download/), and (assuming you have GNU make available), run:

$ make nix-venv-test

to install a Python environment, create a Python venv, enter it and run the make test target. To enter the venv in an interactive shell, run make nix-venv.

CLI usage

CLI tool is included as a reference and UX testbed.

Warning: this tool makes no attempt to protect sensitive data! Use at your own risk. If you need this to recover your wallet seeds, make sure to do it on an air-gapped computer, preferably running a live system such as Tails.

When the shamir_mnemonic package is installed, you can use the shamir command:

$ shamir create 3of5   # create a 3-of-5 set of shares
$ shamir recover       # interactively recombine shares to get the master secret

You can supply your own master secret as a hexadecimal string:

$ shamir create 3of5 --master-secret=cb21904441dfd01a392701ecdc25d61c

You can specify a custom scheme. For example, to create three groups, with 2-of-3, 2-of-5, and 4-of-5, and require completion of all three groups, use:

$ shamir create custom --group-threshold 3 --group 2 3 --group 2 5 --group 4 5

Use shamir --help or shamir create --help to see all available options.

CLI usage: expand an existing mnemonic group

If you wish to increase the number of mnemonics in an existing multi-mnemonic group, you can now do this. All existing mnemonics remain valid.

To expand an existing group 3 to include 10 mnemonics, use:

$ shamir expand --change 3 10

Enter mnemonics sufficient to recover the master secret, including all of the group(s) you desire to --change. However, you may elect to replace a missing group with a new single-Share group (if you don’t specify --strict).

Use shamir --help or shamir expand --help to see all available options.

If you want to run the CLI from a local checkout without installing, use the following command:

$ python3 -m shamir_mnemonic.cli

Test vectors

The test vectors in vectors.json are given as a list of quadruples: * The first member is a description of the test vector. * The second member is a list of mnemonics. * The third member is the master secret which results from combining the mnemonics. * The fourth member is the BIP32 master extended private key derived from the master secret.

The master secret is encoded as a string containing two hexadecimal digits for each byte. If the string is empty, then attempting to combine the given set of mnemonics should result in error. The passphrase “TREZOR” is used for all valid sets of mnemonics.

Changelog

All notable changes to this project will be documented in this file.

The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.

0.3.1 - Unreleased

(no changes yet)

0.3.0 - 2024-05-15

Incompatible

  • The shamir command no longer works out of the box. It is necessary to install the cli extra while installing the package. See README for instructions.

Added

  • Added BIP32 master extended private key to test vectors.

  • Added support for extendable backup flag.

Changed

  • The shamir_mnemonic package now has zero extra dependencies on Python 3.7 and up, making it more suitable as a dependency of other projects.

  • The shamir CLI still requires click. A new extra cli was introduced to handle this dependency. Use the command pip install shamir-mnemonic[cli] to install the CLI dependencies along with the package.

Removed

  • Removed dependency on attrs.

0.2.2 - 2021-12-07

Changed

  • Relaxed Click constraint so that Click 8.x is allowed

  • Applied black and flake8 code style

0.2.1 - 2021-02-03

Fixed

  • Re-released on the correct commit

0.2.0 - 2021-02-03

Added

  • Introduce split_ems and recover_ems to separate password-based encryption from the Shamir Secret recovery

  • Introduce classes representing a share and group-common parameters

  • Introduce RecoveryState class that allows reusing the logic of the shamir recover command

Changed

  • Use secrets module instead of os.urandom

  • Refactor and restructure code into separate modules

0.1.0 - 2019-07-19

Added

  • Initial implementation

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

shamir_mnemonic_slip39-0.4.3.tar.gz (29.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

shamir_mnemonic_slip39-0.4.3-py3-none-any.whl (30.4 kB view details)

Uploaded Python 3

File details

Details for the file shamir_mnemonic_slip39-0.4.3.tar.gz.

File metadata

  • Download URL: shamir_mnemonic_slip39-0.4.3.tar.gz
  • Upload date:
  • Size: 29.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for shamir_mnemonic_slip39-0.4.3.tar.gz
Algorithm Hash digest
SHA256 4d3fc60e8e62563630e59aa0c3e0529bef58dcdeb87e91ccdcf211485cb9835c
MD5 e4aee3cfe770adaa68b460b3a8ce4421
BLAKE2b-256 351c2f87e19e75f0971286d6ef12a5731afec65251d492aa2c3505db4d939396

See more details on using hashes here.

Provenance

The following attestation bundles were made for shamir_mnemonic_slip39-0.4.3.tar.gz:

Publisher: release.yml on pjkundert/python-shamir-mnemonic

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file shamir_mnemonic_slip39-0.4.3-py3-none-any.whl.

File metadata

File hashes

Hashes for shamir_mnemonic_slip39-0.4.3-py3-none-any.whl
Algorithm Hash digest
SHA256 fe453225560188230cfd953447559f08a4cc2947dfe5254a98c8f0de1e87efc6
MD5 9f04bbcf69f2d8834d16503575f75ffa
BLAKE2b-256 a91dc946121596513a46c1c7bec8f4ae26c5b8dc18d920b58d2fe455b526550e

See more details on using hashes here.

Provenance

The following attestation bundles were made for shamir_mnemonic_slip39-0.4.3-py3-none-any.whl:

Publisher: release.yml on pjkundert/python-shamir-mnemonic

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page