A note for Aeternity keystore file format


#1

{"public_key": "ak_aBqTCwdTqg25fk81LzNW9gwqCxFbPMtd6aVHQgBofC5YJTmQW", "crypto": {"secret_type": "ed25519", "symmetric_alg": "xsalsa20-poly1305", "ciphertext": "dee3bfb0f48c93dbaf9a3c415cf928912e74c855336e8b9f0bdd9199134332def219a31971d97885ccda446c12a1ee0b436051a4c9fd1b8ac598b6955c29bf4b362dffa3f71b330932c98eb09e6aea48", "cipher_params": {"nonce": "952bde011c481670e77194afcb3dd7f3a2b0396d851e32c1"}, * "kdf": "argon2id", "kdf_params": {"memlimit_kib": 262144, "opslimit": 3, "salt": "36e52ddfc9c21a5ef2f187080bc4d2d3", "parallelism": 1}}, "id": "678cdc37-e0c0-4b9d-95f5-8762ccdab3ac", "name": "", "version": 1}

The private key can be decrypted(xsalsa20-poly1305) with nonce 952bde011c481670e77194afcb3dd7f3a2b0396d851e32c1 and password(666) hash. The passwrod hash can be generated(argon2id) with {"memlimit_kib": 262144, "opslimit": 3, "salt": "36e52ddfc9c21a5ef2f187080bc4d2d3", "parallelism": 1} and the password which was set by user.

decrypted signed_key: dc5ec6447930153337bc9cef48afabf52aedbebefb746b03c936adf3b0726f574b5acf6b45652ee28cbe6cf2747b7971f3c00e9867d15e5b98155811ad66d4ea

private key: dc5ec6447930153337bc9cef48afabf52aedbebefb746b03c936adf3b0726f57

publich key: 4b5acf6b45652ee28cbe6cf2747b7971f3c00e9867d15e5b98155811ad66d4ea

base58check_encode(“4b5acf6b45652ee28cbe6cf2747b7971f3c00e9867d15e5b98155811ad66d4ea”)=ak_aBqTCwdTqg25fk81LzNW9gwqCxFbPMtd6aVHQgBofC5YJTmQW


Current AE Circulating Supply, Max Supply, Consensus Mechanism(s), and Hashing Algorithm
#2

What is the exact question @Liu?


#3

Just a note for memo:grin:

Thanks very much!