private-key-management
개인 키 관리는 블록체인에서 디지털 자산에 대한 액세스를 제어하는 암호화 키의 안전한 생성, 저장 및 사용을 포함합니다.
개인 키 관리는 개인 키의 수명 주기에 초점을 맞춘 블록체인 보안의 중요한 측면입니다. 여기에는 키의 안전한 생성, 무단 액세스를 방지하는 방식으로의 저장, 거래 서명을 위한 제어된 사용이 포함됩니다. 효과적인 관리는 자금 손실 또는 디지털 신원 제어와 같은 키 손상 위험을 최소화합니다. 여기에는 하드웨어 보안 모듈(HSM), 안전한 키 생성 및 정기적인 백업과 같은 관행이 포함됩니다.
graph LR
Center["private-key-management"]:::main
Pre_private_keys["private-keys"]:::pre --> Center
click Pre_private_keys "/terms/private-keys"
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Pre_hashing["hashing"]:::pre --> Center
click Pre_hashing "/terms/hashing"
Center --> Child_seed_phrases["seed-phrases"]:::child
click Child_seed_phrases "/terms/seed-phrases"
Center --> Child_multi_sig["multi-sig"]:::child
click Child_multi_sig "/terms/multi-sig"
Center --> Child_hardware_wallets["hardware-wallets"]:::child
click Child_hardware_wallets "/terms/hardware-wallets"
Rel_wallet_security["wallet-security"]:::related -.-> Center
click Rel_wallet_security "/terms/wallet-security"
Rel_public_keys["public-keys"]:::related -.-> Center
click Rel_public_keys "/terms/public-keys"
Rel_custodial_wallet["custodial-wallet"]:::related -.-> Center
click Rel_custodial_wallet "/terms/custodial-wallet"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧠 지식 테스트
🧒 5살도 이해할 수 있게 설명
Think of your [private key](/ko/terms/private-key) like the master key to your super-secure digital vault where you keep your valuable digital coins. Managing it means keeping that master key incredibly safe, never letting anyone else see it, and knowing exactly where it is at all times.
🤓 Expert Deep Dive
## Technical Deep Dive: Lifecycle Security
### 1. Generation
Keys must be generated using a source of high entropy. On-chip hardware random number generators (TRNGs) are preferred over software pseudo-random ones to prevent predictable key patterns.
### 2. Storage & Isolation
- Software Wallets: Keys are stored in an encrypted database on disk. Accessible, but vulnerable to malware.
- Hardware Wallets: Keys never leave a 'Secure Element' chip. Signing happens on-device.
- MPC (Multi-Party Computation): The key is never 'whole' in one place; instead, distributed shares are used to compute a signature without reconstructing the key.
### 3. Usage Policies
Governance for large funds usually involves Allowlisting (only sending to known addresses) and Velocity Limits (capping the amount sent per 24 hours).