Market Cap: $2.8588T -5.21%
Volume(24h): $157.21B 50.24%
Fear & Greed Index:

38 - Fear

  • Market Cap: $2.8588T -5.21%
  • Volume(24h): $157.21B 50.24%
  • Fear & Greed Index:
  • Market Cap: $2.8588T -5.21%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top Cryptospedia

Select Language

Select Language

Select Currency

Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos

How to use a BIP-39 passphrase? (25th Word Security)

A BIP-39 passphrase—optional, user-defined, and never stored—is a critical 25th secret that, combined with your mnemonic via HMAC-SHA512, generates entirely separate wallets.

Jan 05, 2026 at 02:59 am

Understanding BIP-39 Passphrases

1. A BIP-39 passphrase is an optional extra word—often called the 25th word—that adds a layer of security to a standard 12- or 24-word mnemonic seed.

2. Unlike the mnemonic itself, the passphrase is not stored or backed up by hardware wallets or software clients; it must be memorized or secured separately.

3. When entered during wallet restoration, the passphrase combines with the mnemonic to derive a completely different set of cryptographic keys and addresses.

4. The same mnemonic with two different passphrases produces two entirely disjointed wallets—neither can access the other’s funds.

5. This mechanism relies on HMAC-SHA512 hashing: the mnemonic and passphrase are concatenated and fed into the function to generate a new seed.

Setting Up a Passphrase in Practice

1. Most modern hardware wallets—such as Ledger and Trezor—support passphrase entry during setup or restore workflows.

2. On Trezor devices, enabling “Passphrase protection” activates a prompt where users type a custom string using the device’s physical interface.

3. Ledger devices require users to enable passphrase support via the Settings menu before initiating a restore with a custom phrase.

4. Software wallets like Electrum and MyEtherWallet allow manual passphrase input when importing a mnemonic, though this introduces greater risk if the environment is compromised.

5. Users must ensure that the passphrase is entered exactly—including case, spacing, and special characters—as even a single typo results in total loss of access.

Risks of Misusing the Passphrase

1. Entering the wrong passphrase—even once—can lock users out of their funds permanently, since no recovery path exists beyond correct re-entry.

2. Storing the passphrase alongside the mnemonic defeats its purpose; doing so on paper, cloud notes, or unencrypted files exposes both layers simultaneously.

3. Using predictable phrases such as “password123”, birthdays, or dictionary words makes brute-force attacks feasible against low-entropy inputs.

4. Some firmware versions or wallet implementations handle Unicode or whitespace inconsistently, leading to silent derivation mismatches across platforms.

5. Recovery tools that do not explicitly support BIP-39 passphrases will fail to locate balances, even if the mnemonic is valid.

Testing and Verifying Passphrase Integrity

1. Before sending real assets, users should transfer a small amount to an address derived with the passphrase and confirm receipt.

2. Generate a test wallet offline using open-source tools like Ian Coleman’s BIP-39 tool—input the mnemonic and passphrase, then verify resulting addresses match those shown on the hardware device.

3. Confirm that restoring the same mnemonic without the passphrase yields a different set of addresses than the protected version.

4. Use checksum validation: although the passphrase itself has no built-in checksum, incorrect entry always results in invalid key paths or zero balance detection.

5. Re-enter the full mnemonic and passphrase on a second device to validate deterministic consistency across independent implementations.

Frequently Asked Questions

Q: Can I change my BIP-39 passphrase after setting it?Yes—you can use any new passphrase at any time. Each passphrase creates a new wallet; there is no “update” operation. You must manually transfer funds from the old passphrase-protected wallet to the new one.

Q: Does the passphrase protect against physical theft of the hardware wallet?No. If someone gains physical access to your device and knows or guesses your passphrase, they can extract all private keys. The passphrase only prevents unauthorized access without the additional secret.

Q: Is there a maximum length for a BIP-39 passphrase?No official limit exists in BIP-39, but some wallets impose practical constraints—for example, Trezor Model T accepts up to 50 characters, while Ledger Nano S+ supports up to 100 UTF-8 bytes.

Q: What happens if I forget my passphrase but remember my mnemonic?You lose permanent access to all assets secured under that passphrase. No third party, developer, or recovery service can reconstruct it. The mnemonic alone derives only the base wallet—not the passphrase-derived one.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Related knowledge

See all articles

User not found or password invalid

Your input is correct