Skip to main content

What is Inery Wallet

Inery Wallet is a secure tool designed for managing and safeguarding cryptographic keys within the Inery DLS ecosystem. It allows users to securely store, access, and control multiple keypairs, providing a secure environment for interacting with decentralized database.

Wallet Graphic

info

Inery Wallet utilizes advanced encryption techniques to protect private keys, giving users full control while ensuring that the keys remain secure. API integrations are protected by strong authentication protocols, ensuring that only authorized services can interact with the wallet.

Wallet Password

The Inery wallet is protected by a password used to unlock the wallet. Without this password, the stored keypairs are inaccessible and unusable. It is crucial to securely save your Inery wallet password, as it safeguards all the keypairs and private keys you own.

info

When a wallet is created, you will be given a password, which will be used later to unlock and access the wallet's APIs. This password acts as an additional layer of security, ensuring that only authorized users can interact with the wallet's functionalities through the API.

Wallet password example

PW5JFzZxZ9v2S1RBoFcidqKGrF2TwUDuE9LfT19UFPgwDjfqzNWSX

Password start with PW5 prefix and has fixed lenght of 53 charachters

The Role of Keypairs in Inery

In Inery, keypairs play a fundamental role in securing operations and ensuring trust across the decentralized network. A keypair consists of two linked cryptographic keys: a private key and a public key.

Analogy

Think of it like a lock and key system: the public key is like the lock, shared openly and used by others to send encrypted information, while the private key is the unique key that only the owner holds, used to unlock and access that information securely.

Keypair Graphic

INE7zfZvTbALFbrHuPRFRi7jy3nuujJdzukkx8MptjG1XosMRvmAZ

5KbLZFmH1mU4okTNjJcCnK1pMFCqAJgj3VBLMqCp3T2QpWWpA5M

Inery generates these keypairs using advanced asymmetric encryption, a method where data encrypted with the public key can only be decrypted by the corresponding private key. This ensures that only the rightful owner with the private key can access or authorize specific actions on the network. The generation process involves complex mathematical algorithms to create secure, unique keypairs that cannot be easily replicated or guessed. By utilizing this keypair system, Inery ensures that every interaction and transaction within its ecosystem is protected, maintaining security and privacy for its users.

Public Key

The public key serves as the owner's database address or simply their address. This key can be shared and displayed freely.

info

A public key is mathematically derived from the private key using a cryptographic algorithm, often through a process known as hashing or elliptic curve multiplication. While the public key is essentially a "hash" of the private key, it’s important to understand that this relationship is one-way. If you have the private key, generating the public key is straightforward because the cryptographic function allows it. However, the reverse is virtually impossible—knowing the public key does not allow someone to compute the private key due to the complex and irreversible nature of the cryptographic algorithm. This asymmetry ensures that while a public key can be shared openly for verifying signatures or encrypting data, the private key remains securely hidden and is required to decrypt or sign data. This one-way relationship is what secures operations in decentralized systems like Inery.

Usage Example

When a database is created on a ledger, it is linked to a public key to identify ownership and access rights. The transaction that creates the database must be signed with the creator’s private key to verify authenticity and ensure that only the rightful owner initiated the action. This binding of public and private keys secures the creation process and prevents unauthorized access or tampering.

Public Key Example

INE7zfZvTbALFbrHuPRFRi7jy3nuujJdzukkx8MptjG1XosMRvmAZ

Public key must start with INE prefix and has fixed lenght of 53 charachters

Private Key

A private key is the most critical element in a cryptographic system, as it grants access to and control over the decentralized database and the data associated with its corresponding public key. In decentralized systems like Inery, the private key is used to sign transactions, proving ownership and authorization without revealing sensitive information. Since the private key is a long, randomly generated string, it’s virtually impossible to guess or replicate, providing a high level of security.

Private Key Example

5KbLZFmH1mU4okTNjJcCnK1pMFCqAJgj3VBLMqCp3T2QpWWpA5M

Public starts with number 5 prefix and has fixed lenght of 51 charachters
info

Private keys also enable the process of asymmetric encryption. When a transaction or message related to the database is signed with a private key, anyone with the corresponding public key can verify its authenticity. However, the reverse isn’t possible—knowing the public key does not allow anyone to derive the private key. This one-way functionality ensures the security and integrity of all interactions within a decentralized database network.

Keep Private Key safe

It's essential to keep the private key secure because anyone who gains access to it can control the linked decentralized database and its data. Unlike a password, if a private key is lost or compromised, it typically cannot be recovered or reset, leading to a permanent loss of access. This makes private key management a crucial responsibility for users in decentralized environments.