SLIP-39 Shamir Mnemonics
Project description
python-shamir-mnemonic
> This is a temporary upgrade shim for https://github.com/trezor/python-shamir-mnemonic
> Install shamir_mnemonic via python -m pip install shamir-mnemonic-slip39, > until the upstream https://pypi.org/project/shamir-mnemonic is upgraded to include > recovery of arbitrary SLIP-39 Mnemonic groups.
Reference implementation of SLIP-0039: Shamir’s Secret-Sharing for Mnemonic Codes
Abstract
This SLIP describes a standard and interoperable implementation of Shamir’s secret sharing (SSS). SSS splits a secret into unique parts which can be distributed among participants, and requires a specified minimum number of parts to be supplied in order to reconstruct the original secret. Knowledge of fewer than the required number of parts does not leak information about the secret.
Specification
See https://github.com/satoshilabs/slips/blob/master/slip-0039.md for full specification.
Security
This implementation is not using any hardening techniques. Secrets are passed in the open, and calculations are most likely trivially vulnerable to side-channel attacks.
The purpose of this code is to verify correctness of other implementations. It should not be used for handling sensitive secrets.
Extendable encrypted master secrets
When you SLIP-39 encode a master secret with a password, you can always recover the original secret with the same password. You of course get a different secret (ie. a different wallet) with a different password; this is by design: you can (for example) have a master password for your true wallet containing your funds, and a “decoy” password for a valid wallet that contains funds to satisfy an attacker. Or, you may simply derive multiple wallets for different purposes with different passwords.
The mnemonics are by default “extendable”, meaning that you can re-encode the same master secret again (with different SLIP-39 group specs), and get the same decrypted secret back with the original password, and the same wallets with your other passwords.
If desired, you can produce –no-extendable encrypted master secrets (which used to be the SLIP-39 standard), which always recover the original secret with the original password – but produce different secrets for all other passwords. This only causes surprises when you want to re-encrypt the same master secret again: you can’t re-obtain the other passwords’ wallets using the newly encoded mnemonics!
To reduce surprises, SLIP-39 now produces –extendable encrypted master secrets by default.
Installation
With pip from PyPI:
$ pip3 install shamir-mnemonic[cli] # for CLI tool
From local checkout for development:
Install the [Poetry](https://python-poetry.org/) tool, checkout python-shamir-mnemonic from git, and enter the poetry shell:
$ pip3 install poetry
$ git clone https://github.com/trezor/python-shamir-mnemonic
$ cd python-shamir-mnemonic
$ poetry install
$ poetry shell
Alternatively, install [Nix](https://nixos.org/download/), and (assuming you have GNU make available), run:
$ make nix-venv-test
to install a Python environment, create a Python venv, enter it and run the make test target. To enter the venv in an interactive shell, run make nix-venv.
CLI usage
CLI tool is included as a reference and UX testbed.
Warning: this tool makes no attempt to protect sensitive data! Use at your own risk. If you need this to recover your wallet seeds, make sure to do it on an air-gapped computer, preferably running a live system such as Tails.
When the shamir_mnemonic package is installed, you can use the shamir
command:
$ shamir create 3of5 # create a 3-of-5 set of shares
$ shamir recover # interactively recombine shares to get the master secret
You can supply your own master secret as a hexadecimal string:
$ shamir create 3of5 --master-secret=cb21904441dfd01a392701ecdc25d61c
You can specify a custom scheme. For example, to create three groups, with 2-of-3, 2-of-5, and 4-of-5, and require completion of all three groups, use:
$ shamir create custom --group-threshold 3 --group 2 3 --group 2 5 --group 4 5
Use shamir --help or shamir create --help to see all available options.
CLI usage: expand an existing mnemonic group
If you wish to increase the number of mnemonics in an existing multi-mnemonic group, you can now do this. All existing mnemonics remain valid.
To expand an existing group 3 to include 10 mnemonics, use:
$ shamir expand --change 3 10
Enter mnemonics sufficient to recover the master secret, including all of the group(s) you desire to
--change. However, you may elect to replace a missing group with a new single-Share group
(if you don’t specify --strict).
Use shamir --help or shamir expand --help to see all available options.
If you want to run the CLI from a local checkout without installing, use the following command:
$ python3 -m shamir_mnemonic.cli
Test vectors
The test vectors in vectors.json are given as a list of quadruples: * The first member is a description of the test vector. * The second member is a list of mnemonics. * The third member is the master secret which results from combining the mnemonics. * The fourth member is the BIP32 master extended private key derived from the master secret.
The master secret is encoded as a string containing two hexadecimal digits for each byte. If the string is empty, then attempting to combine the given set of mnemonics should result in error. The passphrase “TREZOR” is used for all valid sets of mnemonics.
Changelog
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
0.3.1 - Unreleased
(no changes yet)
0.3.0 - 2024-05-15
Incompatible
The
shamircommand no longer works out of the box. It is necessary to install thecliextra while installing the package. See README for instructions.
Added
Added BIP32 master extended private key to test vectors.
Added support for extendable backup flag.
Changed
The
shamir_mnemonicpackage now has zero extra dependencies on Python 3.7 and up, making it more suitable as a dependency of other projects.The
shamirCLI still requiresclick. A new extracliwas introduced to handle this dependency. Use the commandpip install shamir-mnemonic[cli]to install the CLI dependencies along with the package.
Removed
Removed dependency on
attrs.
0.2.2 - 2021-12-07
Changed
Relaxed Click constraint so that Click 8.x is allowed
Applied
blackandflake8code style
0.2.1 - 2021-02-03
Fixed
Re-released on the correct commit
0.2.0 - 2021-02-03
Added
Introduce
split_emsandrecover_emsto separate password-based encryption from the Shamir Secret recoveryIntroduce classes representing a share and group-common parameters
Introduce
RecoveryStateclass that allows reusing the logic of theshamir recovercommand
Changed
Use
secretsmodule instead ofos.urandomRefactor and restructure code into separate modules
0.1.0 - 2019-07-19
Added
Initial implementation
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file shamir_mnemonic_slip39-0.4.3.tar.gz.
File metadata
- Download URL: shamir_mnemonic_slip39-0.4.3.tar.gz
- Upload date:
- Size: 29.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4d3fc60e8e62563630e59aa0c3e0529bef58dcdeb87e91ccdcf211485cb9835c
|
|
| MD5 |
e4aee3cfe770adaa68b460b3a8ce4421
|
|
| BLAKE2b-256 |
351c2f87e19e75f0971286d6ef12a5731afec65251d492aa2c3505db4d939396
|
Provenance
The following attestation bundles were made for shamir_mnemonic_slip39-0.4.3.tar.gz:
Publisher:
release.yml on pjkundert/python-shamir-mnemonic
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
shamir_mnemonic_slip39-0.4.3.tar.gz -
Subject digest:
4d3fc60e8e62563630e59aa0c3e0529bef58dcdeb87e91ccdcf211485cb9835c - Sigstore transparency entry: 563691500
- Sigstore integration time:
-
Permalink:
pjkundert/python-shamir-mnemonic@f9ab832c4d398f1c9df6445f4be8622356718878 -
Branch / Tag:
refs/tags/v0.4.3 - Owner: https://github.com/pjkundert
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@f9ab832c4d398f1c9df6445f4be8622356718878 -
Trigger Event:
push
-
Statement type:
File details
Details for the file shamir_mnemonic_slip39-0.4.3-py3-none-any.whl.
File metadata
- Download URL: shamir_mnemonic_slip39-0.4.3-py3-none-any.whl
- Upload date:
- Size: 30.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fe453225560188230cfd953447559f08a4cc2947dfe5254a98c8f0de1e87efc6
|
|
| MD5 |
9f04bbcf69f2d8834d16503575f75ffa
|
|
| BLAKE2b-256 |
a91dc946121596513a46c1c7bec8f4ae26c5b8dc18d920b58d2fe455b526550e
|
Provenance
The following attestation bundles were made for shamir_mnemonic_slip39-0.4.3-py3-none-any.whl:
Publisher:
release.yml on pjkundert/python-shamir-mnemonic
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
shamir_mnemonic_slip39-0.4.3-py3-none-any.whl -
Subject digest:
fe453225560188230cfd953447559f08a4cc2947dfe5254a98c8f0de1e87efc6 - Sigstore transparency entry: 563691507
- Sigstore integration time:
-
Permalink:
pjkundert/python-shamir-mnemonic@f9ab832c4d398f1c9df6445f4be8622356718878 -
Branch / Tag:
refs/tags/v0.4.3 - Owner: https://github.com/pjkundert
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@f9ab832c4d398f1c9df6445f4be8622356718878 -
Trigger Event:
push
-
Statement type: