In the first half of 2025, more than $1.7B in crypto assets were stolen, and roughly 70% of those incidents involved mnemonic-compromise pathways. The core problem is structural. I built MSCIKDF to directly solve this. Here is the playground: https://github.com/mscikdf/mscikdf-playground
MSCIKDF is a core lib that introduces passphrase-sealed mnemonics, built-in multichain, and rotatable secrets at the cryptographic layer. It ensures that:
- The seed is never stored on disk, and never kept in memory (apps/browser extensions)—it only exists for ~20 microseconds during signing or verification.
- A mnemonic and its passphrase can be rotated unlimited times without changing any addresses and without migrating assets.
- One mnemonic supports essentially all chains at cryptographic level.
- The algorithm is pluggable, allowing smooth PQC upgrades in the future while keeping the same mnemonic and the same addresses.
- it supports UNICODE (Chinese / Japanese / Korean / Arabic / Emoji) as passphrases.
Why these properties are possible?
Under the hood, MSCIKDF was designed around:
- Single-root → multi-context isolation (each chain, wallet, device, agent, or application gets a mathematically isolated stream).
- Zero-persistence secret handling (the derived seed is never kept in long-term memory or disk).
- Rotatable passphrase sealing, allowing unlimited secret rotation with stable public identities.
- Curve-agnostic, multi-algorithm derivation, supporting both signatures and encryption (Ed25519, X25519, Secp256k1, sr25519, ECDSA, etc.).
- PQC compatibility, meaning post-quantum KDF modules can be plugged in without breaking identities or requiring wallet migrations.
In short: MSCIKDF turns mnemonics from “bare private keys” into cryptographically protected, renewable, multi-curve cryptographic identity roots.
mscikdf•1h ago
Just to clarify: this is not a wallet or an app. It's a low-level cryptographic library that changes how mnemonics work at the KDF layer.