Implementasi Seed Phrase Dalam Keamanan Dompet Kripto Pada Metamask

  • Fernanda Kalvin STMIK Wicida Samarinda, Indonesia
  • Muhammad Ibnu Sa'ad STMIK Widya Cipta Dharma, Indonesia
  • Ahmad Fahrijal Pukeng * Mail STMIK Widya Cipta Dharma, Indonesia
Keywords: Seed Phrase, MetaMask, Keamanan Kripto, Dompet Digital, Kriptografi

Abstract

Seed phrases are a crucial element in the security system of non-custodial crypto wallets like MetaMask. These phrases allow users to recover their wallets and serve as the primary key to access digital assets. This research aims to analyze and implement seed phrase-based security in crypto wallets, using MetaMask as a case study. Through literature review and technical simulation, this study explains how seed phrases function, the potential risks if compromised, and possible mitigation strategies. The results show that while seed phrases are vital for maintaining user asset security and integrity, they can be a vulnerability if not properly protected.

References

S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.

M. Swan, Blockchain: Blueprint for a new economy. “ O’Reilly Media, Inc.,” 2015.

J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Sok: Research perspectives and challenges for bitcoin and cryptocurrencies,” in 2015 IEEE symposium on security and privacy, IEEE, 2015, pp. 104–121.

C. F. Torres, F. Willi, and S. Shinde, “Is your wallet snitching on you? an analysis on the privacy implications of web3,” in 32nd USENIX Security Symposium (USENIX Security 23), 2023, pp. 769–786.

A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.

A. Dalskov, D. Lain, E. Ulqinaku, K. Kostiainen, and S. Capkun, “2fe: Two-factor encryption for cloud storage,” arXiv preprint arXiv:2010.14417, 2020.

Z. Zhou, T. Sharma, L. Emano, S. Das, and Y. Wang, “Iterative design of an accessible crypto wallet for blind users,” in Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 2023, pp. 381–398.

G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014.

F. Eleshin, Q. Sun, M. Ye, S. Das, and J. I. Hong, “Of Secrets and Seedphrases: Conceptual Misunderstandings and Security Challenges for Seed Phrase Management among Cryptocurrency Users,” in Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, 2025, pp. 1–19.

T. T. Huynh, T. D. Nguyen, and H. Tan, “A survey on security and privacy issues of blockchain technology,” in 2019 international conference on system science and engineering (ICSSE), IEEE, 2019, pp. 362–367.

N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on ethereum smart contracts (sok),” in International conference on principles of security and trust, Springer, 2017, pp. 164–186.

“scholar”.

M. Vaneeta, V. Sangeetha, A. Mamatha, and A. Kanavalli, “Trends and Prospectus of Blockchain Technology,” in Blockchain for IoT Systems, Chapman and Hall/CRC, pp. 78–93.

Д. А. Яруллина and Г. Ф. Валиева, “English for Information Security,” 2015.

A. Y. Semenoh, M. B. Perekrestov, D. M. Dmytrishyn, and M. M. Bohachenko, “Economic Consequences of Crypto-Asset Fraud in the Context of Digital Transformation: Analysis of Costs and the Potential of Preventive Technologies,” 2025.

M. Wang, M. Duan, and J. Zhu, “Research on the security criteria of hash functions in the blockchain,” in Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018, pp. 47–55.

L. Caviglione et al., “Tight arms race: Overview of current malware threats and trends in their detection,” IEEE Access, vol. 9, pp. 5371–5396, 2020.

H. Wen, J. Fang, J. Wu, and Z. Zheng, “Hide and seek: An adversarial hiding approach against phishing detection on ethereum,” IEEE Trans Comput Soc Syst, vol. 10, no. 6, pp. 3512–3523, 2022.

B. D. Analytics, C. Water, and N. Computing, “Disruptive Technologies for Sustainable Development”.

I. H. Sarker, M. H. Furhad, and R. Nowrozy, “Ai-driven cybersecurity: an overview, security intelligence modeling and research directions,” SN Comput Sci, vol. 2, no. 3, p. 173, 2021.

Dimensions Badge
Published
2025-06-17
How to Cite
Kalvin, F., Sa’ad, M. I., & Pukeng, A. F. (2025). Implementasi Seed Phrase Dalam Keamanan Dompet Kripto Pada Metamask. Bulletin of Information Technology (BIT), 6(2), 136 - 147. https://doi.org/10.47065/bit.v6i2.2026
Section
Articles