This is a list of terms you might encounter when using the Kaikas interface.
The interface / client / wrapper / holder that you use to manage your account(s).
A public & private key pair that "holds" your funds.
Your funds are actually stored on the blockchain, not in the wallet or account.
You use this to send funds to an account.
Often referred to as the "public key" in Ethereum. However, in Klaytn, the address is not always derived from the public key.
A string made up of 0x + 40 hexadecimal characters.
In Klaytn, the address begins with 0x.
In cryptography, you have a key-pair: the public and private key.
You can derive a public key from a private key, but cannot derive a private key
from a public key.
The address "acts" like the public key, but it's not actually
the public key.
The public key (128 hex characters) is derived from the private key.
You then take the "SHA3" (Keccak-256) hash of the public key (64 characters), and
take the last 40 characters. Finally, prefix it with 0x. This will give you
the 42-character address.
(Advanced) In Klaytn, you can use decoupled key pairs from addresses. For more
information refer to Accounts.
You use this to send funds from an account.
The secret half of your Address / public key.
A string of 64 hexadecimal characters.
If you hand-type a private key differently today than yesterday, you will access
a different wallet. Never hand type your private key.
This is the string you need to send transactions from your account. Without it
you cannot access your funds. Although, you don't need to save this raw, unencrypted
private key in this format. You can use the fancy versions of it (e.g. the Keystore
File/ Mnemonic Phrase).
Klaytn wallet key format is provided to easily handle a private key along with
the corresponding address. Please refer to Klaytn Wallet Key Format
(Advanced) In Klaytn, you can use multiple key pairs and keys that have
different roles. Please refer to Multiple Key Pairs and Role-Based Keys.
Encrypted version of your private key in JSON format
A fancy version of your private key that is protected by a password of your choosing.
When combined with the password, it has the private key.
Safer than a private key because you need the password.
Another fancy version of your private key, that is actually used to derive
multiple private keys.
A (typically) 12 or 24 word phrase that allows you to access infinite number
Originates from BIP 39 Spec.
The accounts you can access with this phrase are determined by the "path".
Example: brain surround have swap horror body response double fire dumb bring hazard
The input given to derive a private key. This should always be generated in a
truly random way, not something you make up with your measly human brain.
If you chose the seed, it is known as a brain wallet
An account generated from a seed or password or passphrase of your choosing.
Humans are not capable of generating enough entropy and therefore the wallets
derived from these phrases are insecure.
Brain wallets can be brute forced by super fast computers.
Brain wallet are insecure.
Don't use brain wallets.
Also known as "randomness".
The more random something is, the more entropy it has, and the more secure it is.
To derive something is to obtain it from an original source.
For example, if we were to derive a Keystore from a private key and a password,
this means that the Keystore is made from these two sources.
The Keystore is a product of the two, thus it is derived from them.
Encryption is the act of taking a string of letters/numbers, like your private
key, and turning them into another string of letters/numbers through a method
of private translation.
There are various different encryption methods.
Encryption offers protection against those trying to steal your information!
An unencrypted private key is 64 characters long, and it is used to unlock or
An encrypted key is also 64 letters long and is a regular private key that has
gone through the process of encryption, as defined above.
For example, if the world ‘Apple’ was your shortened private key, then it was
encrypted three letters down the alphabet, your new shortened encrypted key
would be ‘Dssoh’. Since you know the way to encrypt this key, you could derive
the original private key from it by reversing the method of encryption.
Usually encrypted private keys are kept within the extension or device they are
encrypted by, and they remain out of sight from the user. This is meant to add
another layer of security to keep a user’s wallet information safe.
The process of transferring authority of a single entity (ex. Government or
large corporation) to multiple smaller entities.
Blockchain is trustless in a way that distributed trustless parties can make
a consensus. Klaytn blockchain ensures that rules and agreements between all
parties are executed when all conditions are met. Since everyone has a copy
of the ledger of all transactions ever executed, there is no need for a trusted
third-party. You can verify the transactions yourself.
A piece of code (or program) that is stored on the blockchain network.
Conditions of the contract are predefined by the users, if all conditions are met
certain actions are executed by the contract (program).
A decentralized publicly accessible ledger.