-
Bitcoin
$108,522.9936
0.51% -
Ethereum
$2,600.2119
2.25% -
Tether USDt
$1.0001
0.00% -
XRP
$2.3065
1.88% -
BNB
$661.9093
0.34% -
Solana
$150.9961
1.40% -
USDC
$0.9999
0.00% -
TRON
$0.2877
0.21% -
Dogecoin
$0.1708
1.78% -
Cardano
$0.5863
1.70% -
Hyperliquid
$39.0718
4.52% -
Bitcoin Cash
$507.4600
2.09% -
Sui
$2.9070
2.06% -
Chainlink
$13.8666
4.64% -
UNUS SED LEO
$9.1277
0.82% -
Stellar
$0.2624
5.86% -
Avalanche
$18.1961
2.40% -
Shiba Inu
$0.0...01182
1.77% -
Toncoin
$2.8141
2.42% -
Hedera
$0.1611
3.70% -
Litecoin
$87.6537
1.88% -
Monero
$317.0356
0.02% -
Polkadot
$3.4327
2.63% -
Dai
$1.0000
-0.01% -
Ethena USDe
$1.0006
0.05% -
Bitget Token
$4.3043
0.50% -
Uniswap
$7.6006
2.93% -
Aave
$293.0019
4.60% -
Pepe
$0.0...01007
3.08% -
Pi
$0.4658
2.42%
How is an Ethereum wallet address generated from a public key?
An Ethereum wallet address is derived from the public key through Keccak-256 hashing, using the last 20 bytes to form a unique identifier.
Jun 14, 2025 at 11:14 am

Understanding the Relationship Between Ethereum Wallet Addresses and Public Keys
In the world of Ethereum, a wallet address is not directly the public key itself but rather a derived version of it. The public key is generated from a private key using elliptic curve cryptography (specifically, the secp256k1 curve). Once this public key is created, it undergoes further hashing to generate the final wallet address.
The process begins with a randomly generated private key, which is a 256-bit number. From this, the public key is derived using the secp256k1 algorithm. This public key is typically represented as a 64-byte array (or 128 hexadecimal characters) when compressed. It's crucial to understand that while the public key can be shared openly, it must never be altered or exposed in insecure environments.
Hashing the Public Key Using Keccak-256
Once the public key is generated, the next step involves applying a cryptographic hash function. Ethereum uses the Keccak-256 hashing algorithm for this purpose. Unlike SHA-256 used by Bitcoin, Keccak-256 was chosen due to its flexibility and performance characteristics.
- Take the full public key (including the prefix byte if present).
- Apply the Keccak-256 hash function to produce a 32-byte (256-bit) output.
- The resulting hash will be a unique sequence of bytes representing the input public key.
This hashed value serves as the intermediate stage before extracting the actual Ethereum wallet address.
Extracting the Final Ethereum Address
After obtaining the Keccak-256 hash of the public key, only a portion of it is used to form the final Ethereum wallet address. Specifically, the last 20 bytes (160 bits) of the hash are selected for this purpose.
- Take the 32-byte output from the Keccak-256 hash.
- Discard the first 12 bytes.
- Retain the remaining 20 bytes as the Ethereum address.
These 20 bytes are then encoded into a hexadecimal string without the "0x" prefix initially. When displayed in wallets or explorers, the address is usually prefixed with "0x" to indicate it's an Ethereum-compatible hexadecimal format.
Applying Checksum Encoding for Security
To enhance security and reduce the risk of typos, Ethereum introduced EIP-55, which enables mixed-case checksum encoding for addresses. This feature allows users to detect errors when entering Ethereum addresses manually.
- Convert the Ethereum address (without the "0x") into its lowercase form.
- Compute the Keccak-256 hash of this lowercase string.
- For each character in the original address:
- If the corresponding nibble in the hash is greater than or equal to 8, capitalize the character.
- Otherwise, leave it lowercase.
This results in an Ethereum wallet address that appears like 0xAbCdef1234567890aBcDef1234567890aBcDef12
, where capitalization serves as a visual checksum.
Verifying the Correctness of the Generated Address
Before using any Ethereum wallet address, it's essential to verify its correctness through tools or libraries designed for this purpose. Many developers use libraries such as ethers.js or web3.js to ensure their implementation aligns with Ethereum standards.
- Use a trusted library to regenerate the address from the same public key.
- Compare the output with the manually computed one.
- Ensure that both checksum-encoded and lowercase versions match expected values.
Additionally, test transactions with small amounts should be performed before deploying on mainnet to confirm that the address behaves as intended.
Frequently Asked Questions
Q: Can two different public keys result in the same Ethereum address?
While theoretically possible due to the finite size of the Ethereum address space (2^160), the probability is astronomically low. However, collisions are not considered a practical threat due to the vast number of possible combinations.
Q: Is it safe to share my Ethereum wallet address publicly?
Yes, sharing your Ethereum wallet address is safe since it does not expose your private key or public key directly. However, avoid sharing transaction details or metadata that could compromise privacy.
Q: Why does Ethereum use only 20 bytes from the Keccak-256 hash instead of the full 32 bytes?
Using 20 bytes strikes a balance between security and gas efficiency. A shorter address reduces storage and computation costs on the blockchain while maintaining sufficient entropy to prevent collisions.
Q: What happens if I send ETH to a malformed Ethereum address?
Sending funds to a non-existent or malformed Ethereum address may result in permanent loss of assets. Always validate addresses using checksum encoding or verification tools before initiating transfers.
Disclaimer:info@kdj.com
The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!
If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.
- No Rs 50 Coin? Public Prefers Lightweight Notes, Says the Government
- 2025-07-09 20:30:13
- Encryption Engine Ignites: Themes and Trends to Watch in the Second Half of 2025
- 2025-07-09 20:30:13
- Infineon's ID Key S USB: Bolstering USB Security in a Cyber-Threatened World
- 2025-07-09 18:50:12
- Nickel Discovery at Atlantic Intersection: A Game Changer for the EV Supply Chain
- 2025-07-09 18:50:12
- Veteran-Owned Aloha Mini Golf: A Nationwide Expansion of Island Fun
- 2025-07-09 18:55:12
- AI Cancer Detection: RadNet Tech & Healthcare Partnerships Improving Breast Cancer Screening
- 2025-07-09 18:55:12
Related knowledge

How to connect Trezor to Rabby wallet
Jul 09,2025 at 05:49am
What Is Trezor and Rabby Wallet?Trezor is a hardware wallet developed by SatoshiLabs that allows users to securely store their cryptocurrency assets o...

What happens if I forget my Trezor passphrase
Jul 09,2025 at 03:15am
Understanding the Role of a Trezor PassphraseIf you use a Trezor hardware wallet, you may have set up a passphrase as an extra layer of security beyon...

Can I reset a used or second-hand Trezor
Jul 09,2025 at 11:49am
Understanding the Reset Process for a Used or Second-Hand TrezorIf you have acquired a used or second-hand Trezor wallet, one of the first things you ...

How to safely store a Trezor recovery seed
Jul 09,2025 at 11:22am
Understanding the Importance of a Trezor Recovery SeedA Trezor recovery seed is a sequence of 12 or 24 words generated during the initial setup of you...

What to do if my Trezor screen is broken
Jul 09,2025 at 10:36am
Understanding the Impact of a Broken Trezor ScreenIf your Trezor screen is broken, it can significantly affect how you interact with your cryptocurren...

Why use a hardware wallet like Trezor
Jul 09,2025 at 11:00am
What Is a Hardware Wallet and Why It MattersA hardware wallet is a physical device designed to securely store the private keys of cryptocurrencies off...

How to connect Trezor to Rabby wallet
Jul 09,2025 at 05:49am
What Is Trezor and Rabby Wallet?Trezor is a hardware wallet developed by SatoshiLabs that allows users to securely store their cryptocurrency assets o...

What happens if I forget my Trezor passphrase
Jul 09,2025 at 03:15am
Understanding the Role of a Trezor PassphraseIf you use a Trezor hardware wallet, you may have set up a passphrase as an extra layer of security beyon...

Can I reset a used or second-hand Trezor
Jul 09,2025 at 11:49am
Understanding the Reset Process for a Used or Second-Hand TrezorIf you have acquired a used or second-hand Trezor wallet, one of the first things you ...

How to safely store a Trezor recovery seed
Jul 09,2025 at 11:22am
Understanding the Importance of a Trezor Recovery SeedA Trezor recovery seed is a sequence of 12 or 24 words generated during the initial setup of you...

What to do if my Trezor screen is broken
Jul 09,2025 at 10:36am
Understanding the Impact of a Broken Trezor ScreenIf your Trezor screen is broken, it can significantly affect how you interact with your cryptocurren...

Why use a hardware wallet like Trezor
Jul 09,2025 at 11:00am
What Is a Hardware Wallet and Why It MattersA hardware wallet is a physical device designed to securely store the private keys of cryptocurrencies off...
See all articles
