Cache Attacks (Global)
High-quality technical overview of Cache Attacks in the context of blockchain security.
Components: 1. Entropy (128-512 bits). 2. Master Private Key. 3. Chain Code. 4. Extended Keys (xprv, xpub). Key Features: Multi-level hierarchy, Deterministic backups, Watch-only wallets. Relationship: Used with BIP-39 (mnemonics) and BIP-44 (multi-currency paths).
graph LR
Center["Cache Attacks (Global)"]:::main
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5 yaşındaki gibi açıkla
Imagine you have a 'Master Key' (the Root) that can magically create many different 'Junior Keys' (the Children). You can give a 'View-only' map (xpub) to your accountant so they can see all the money coming in, but they can't spend a single cent without your Master Key. And since all the Junior Keys are created by the same Master Key, you only ever need to back up that one Master Key to keep everything safe.
🤓 Expert Deep Dive
BIP-32 uses HMAC-SHA512 to derive child keys. The derivation function takes a parent key and a 'Chain Code' (32 bytes of entropy). A critical technical distinction is between 'Soft' (Normal) and 'Hardened' derivation. Normal derivation allows a child public key to be derived from a parent public key + chain code. While useful for watch-only wallets (xpubs), if a child private key is compromised, it can be combined with the parent xpub to calculate the parent's private key. 'Hardened derivation' (using indices 2^31 and above) prevents this 'leaking upwards' by ensuring the child key can only be derived using the parent's private key.