Not Hacker News Logo

Not

Hacker

News!

Home
Hiring
Products
Companies
Discussion
Q&A
Users
Not Hacker News Logo

Not

Hacker

News!

AI-observed conversations & context

Daily AI-observed summaries, trends, and audience signals pulled from Hacker News so you can see the conversation before it hits your feed.

LiveBeta

Explore

  • Home
  • Hiring
  • Products
  • Companies
  • Discussion
  • Q&A

Resources

  • Visit Hacker News
  • HN API
  • Modal cronjobs
  • Meta Llama

Briefings

Inbox recaps on the loudest debates & under-the-radar launches.

Connect

© 2025 Not Hacker News! — independent Hacker News companion.

Not affiliated with Hacker News or Y Combinator. We simply enrich the public API with analytics.

Not Hacker News Logo

Not

Hacker

News!

Home
Hiring
Products
Companies
Discussion
Q&A
Users
  1. Home
  2. /Discussion
  3. /Show HN: A New Mnemonic Scheme – Seedless, Passphrase-Sealed, Builtin Multichain
  1. Home
  2. /Discussion
  3. /Show HN: A New Mnemonic Scheme – Seedless, Passphrase-Sealed, Builtin Multichain
Last activity 9h agoPosted Nov 26, 2025 at 11:46 AM EST

A New Mnemonic Scheme – Seedless, Passphrase-Sealed, Builtin Multichain

mscikdf
1 points
0 comments

Mood

informative

Sentiment

positive

Category

startup_launch

Key topics

Cryptography
Blockchain
Security
Cryptocurrency
TL;DR: Today’s mnemonics are bare keys with no cryptographic protection. MSCIKDF adds passphrase-sealing, seedless operation, and multi-curve support in a single derivation scheme. The user's exposure to compromise/leakage risk can be periodically reset, marking a significant advancement in cryptographic security.

In the first half of 2025, more than $1.7B in crypto assets were stolen, and roughly 70% of those incidents involved mnemonic-compromise pathways. The core problem is structural: today’s mnemonics are bare assets—whoever sees them immediately owns everything, and there is no cryptographic-level protection, no rotation model, and no way to safely evolve toward PQC.

I built MSCIKDF to directly solve this.

MSCIKDF is a cryptographic primitive that introduces passphrase-sealed mnemonics, curve-isolated derivation, and rotatable secrets at the KDF layer. It ensures that: - The seed is never stored on disk, and never kept in memory—it only exists for ~20 microseconds during signing or verification. - A mnemonic and its passphrase can be rotated unlimited times without changing any addresses and without migrating assets. - One mnemonic supports all major elliptic-curve families (Ed25519, Secp256k1, sr25519, P-256, etc.), covering essentially all chains. - The algorithm is pluggable, allowing smooth PQC upgrades in the future while keeping the same mnemonic and the same addresses. - Bonus: it supports UNICODE (Chinese / Japanese / Korean / Arabic / Emoji) as passphrases.

Why these properties are possible?

Under the hood, MSCIKDF was designed around: - Single-root → multi-context isolation (each chain, wallet, device, agent, or application gets a mathematically isolated stream). - Zero-persistence secret handling (the derived seed is never kept in long-term memory or disk). - Rotatable passphrase sealing, allowing unlimited secret rotation with stable public identities. - Curve-agnostic, multi-algorithm derivation, supporting both signatures and encryption (Ed25519, X25519, Secp256k1, sr25519, ECDSA, etc.). - PQC compatibility, meaning post-quantum KDF modules can be plugged in without breaking identities or requiring wallet migrations. In short: MSCIKDF turns mnemonics from “bare private keys” into cryptographically protected, renewable, multi-curve identity roots.

Paper (arXiv): https://arxiv.org/abs/2511.20505 Playground: https://github.com/mscikdf/mscikdf-playground

Seedless: A new mnemonic scheme that's seedless, passphrase-sealed, and builtin multichain

Snapshot generated from the HN discussion

Discussion Activity

Light discussion

First comment

8m

Peak period

1

Hour 1

Avg / period

1

Key moments

  1. 01Story posted

    Nov 26, 2025 at 11:46 AM EST

    9h ago

    Step 01
  2. 02First comment

    Nov 26, 2025 at 11:54 AM EST

    8m after posting

    Step 02
  3. 03Peak activity

    1 comments in Hour 1

    Hottest window of the conversation

    Step 03
  4. 04Latest activity

    Nov 26, 2025 at 11:54 AM EST

    9h ago

    Step 04

Generating AI Summary...

Analyzing up to 500 comments to identify key contributors and discussion patterns

Discussion (0 comments)

Discussion hasn't started yet.

ID: 46059394Type: storyLast synced: 11/26/2025, 4:48:09 PM

Want the full context?

Jump to the original sources

Read the primary article or dive into the live Hacker News thread when you're ready.

Read ArticleView on HN
Not Hacker News Logo

Not

Hacker

News!

AI-observed conversations & context

Daily AI-observed summaries, trends, and audience signals pulled from Hacker News so you can see the conversation before it hits your feed.

LiveBeta

Explore

  • Home
  • Hiring
  • Products
  • Companies
  • Discussion
  • Q&A

Resources

  • Visit Hacker News
  • HN API
  • Modal cronjobs
  • Meta Llama

Briefings

Inbox recaps on the loudest debates & under-the-radar launches.

Connect

© 2025 Not Hacker News! — independent Hacker News companion.

Not affiliated with Hacker News or Y Combinator. We simply enrich the public API with analytics.