Electromagnetic Analysis (Global)

High-quality technical overview of Electromagnetic Analysis in the context of blockchain security.

번역 대기 중인 콘텐츠입니다. 영어 버전을 표시하고 있습니다.

Categories: 1. Software (Mobile, Desktop, Browser Extension). 2. Hardware (Ledger, Trezor). 3. Paper (QR codes). Security: Seed Phrases (12-24 words), 2FA, Biometrics. Common Tools: MetaMask, Phantom, Trust Wallet, Ledger Live.

        graph LR
  Center["Electromagnetic Analysis (Global)"]:::main
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 5살도 이해할 수 있게 설명

Think of a [crypto [wallet](/ko/terms/wallet)](/ko/terms/crypto-wallet) like a 'Remote Control' for a safe that lives in a public bank. The safe ([blockchain](/ko/terms/blockchain)) is where your money is. The remote control (wallet) holds the secret code ([private key](/ko/terms/private-key)) that opens your safe. If you lose the remote, you can't open the safe. If someone steals your code, they can open your safe. 'Custodial' is like leaving your code with the bank manager; '[Non-custodial](/ko/terms/non-custodial)' is like keeping it in your own brain.

🤓 Expert Deep Dive

Technically, a wallet uses 'Elliptic Curve Cryptography' (like Secp256k1 for Bitcoin) to generate a Public Key from a Private Key. The Public Key is then hashed to create your 'Wallet Address'. When you send a transaction, the wallet 'signs' the data with your Private Key, creating a 'Digital Signature' that the network can verify without ever seeing your key. Modern security focuses on 'MPC' (Multi-Party Computation), where the key is split into fragments so no single device ever holds the whole thing, and 'Account Abstraction' (ERC-4337), which turns wallets into smart contracts, allowing for features like social recovery and gasless transactions. Understanding 'Derivation Paths' (like m/44'/60'/0'/0) is critical for developers when recovering funds across different wallet software.

📚 출처