Note these addresses are derived from the BIP32 Extended Key
Path
|
Address
|
Public Key
|
Private Key
|
---|
Read more at the official BIP39 spec
Read more at the Electrum seed phrase documentation
Read more at the official NIP-06 spec
Read more at the official BIP32 spec
Read more at the official BIP44 spec
Read more at the official BIP49 spec
Read more at the official BIP84 spec
Read more at the official BIP86 spec
Read more at the official BIP85 spec
Entropy values should not include the BIP39 checksum. This is automatically added by the tool.
Entropy values must be sourced from a strong source of randomness. This means flipping a fair coin, rolling a fair dice, noise measurements etc. Do NOT use phrases from books, lyrics from songs, your birthday or street address, keyboard mashing, or anything you think is random, because chances are overwhelming it isn't random enough for the needs of this tool.
Do not store entropy.
Storing entropy (such as keeping a deck of cards in a specific shuffled order) is unreliable compared to storing a mnemonic. Instead of storing entropy, store the mnemonic generated from the entropy. Steganography may be beneficial when storing the mnemonic.
The random mnemonic generator on this page uses a cryptographically secure random number generator. The built in random generator can generally be trusted more than your own intuition about randomness. If cryptographic randomness isn't available in your browser, this page will show a warning and the generate button will not work. In that case you might choose to use your own source of entropy.
You are not a good source of entropy.
Card entropy has been implemented assuming cards are replaced, not drawn one after another. A full deck with replacement generates 232 bits of entropy (21 words). A full deck without replacement generates 225 bits of entropy (21 words). Card entropy changed significantly from v0.4.3 to v0.5.0. The old version can be accessed at https://github.com/iancoleman/bip39/releases/tag/0.4.3 or https://web.archive.org/web/20201018232020/https://iancoleman.io/bip39/
What is PBKDF2 (Password Based Key Derivation Function 2) ?
Please refer to this wikipedia article for more detail. Mail about PBKDF2 security here.
Wallet software that implement BIP39 only use 2048 iterations as a norm. Increasing this parameter will increase security against brute force attack, but you will need to store this new parameter. However, as long as you back up your BIP39 seed there will not be risk to lost your fund. To access them with custom PBKDF2 iterations, use this file (or other) to compute your targeted BIP39 seed.
Using less than 2048 PBKDF2 iterations is insecure without strong optional BIP39 Passphrase.
Please refer to the software license for more detail.
The software is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.
This tool is interoperable with any BIP39 wallet.
Some similar tools to this one (ie not consumer wallets) are
bip39-electrum-standalone.html
from GitHub releasesDownload these 3 files from GitHub releases:
bip39-electrum-standalone.html
- The toolbip39-electrum-standalone.html.sha256sum
- Checksum filebip39-electrum-standalone.html.sha256sum.asc
- GPG signatureEnsure the file hasn't been tampered with:
sha256sum -c bip39-electrum-standalone.html.sha256sum
Expected result: bip39-electrum-standalone.html: OK
Confirm the files are authentic:
gpg --verify bip39-electrum-standalone.html.sha256sum.asc bip39-electrum-standalone.html.sha256sum
wget https://raw.githubusercontent.com/levinster82/Bitcoin-BIP39-Electrum-Tool/refs/heads/master/levinster82.asc
gpg --import levinster82.asc
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys E3BCAA9688A7BF6A
gpg --fingerprint E3BCAA9688A7BF6A
Expected fingerprint:
pub brainpoolP512r1 2025-08-16 [SC] [expires: 2050-08-10]
AA9B 693E AC84 DC76 6E68 C4FF E3BC AA96 88A7 BF6A
uid [ unknown] levinster82 (General use.) <[email protected]>
sub brainpoolP512r1 2025-08-16 [E] [expires: 2050-08-10]
bip39-electrum-standalone.html
in your offline browser.
Get the source code from the repository
-
https://github.com/levinster82/Bitcoin-BIP39-Electrum-Tool
(forked from https://github.com/iancoleman/bip39)
BitcoinJS - https://github.com/bitcoinjs/bitcoinjs-lib
BIP39 - https://github.com/bitcoinjs/bip39
BIP32 - https://github.com/bitcoinjs/bip32
ECPair - https://github.com/bitcoinjs/ecpair
BIP38 - https://github.com/bitcoinjs/bip38
BIP85 - https://github.com/AndreasGassmann/bip85
Electrum Mnemonic - https://github.com/bitcoinjs/electrum-mnemonic
SJCL - https://github.com/bitwiseshiftleft/sjcl
BigInteger - https://github.com/silentmatt/javascript-biginteger
Fast Levenshtein - https://github.com/hiddentao/fast-levenshtein
KJUA (QR Code) - https://github.com/lrsjng/kjua
zxcvbn - https://github.com/dropbox/zxcvbn
jQuery - https://jquery.com/
Bootstrap - https://getbootstrap.com/