Implementasi Seed Phrase Dalam Keamanan Dompet Kripto Pada Metamask
Abstract
Seed phrases are a crucial element in the security system of non-custodial crypto wallets like MetaMask. These phrases allow users to recover their wallets and serve as the primary key to access digital assets. This research aims to analyze and implement seed phrase-based security in crypto wallets, using MetaMask as a case study. Through literature review and technical simulation, this study explains how seed phrases function, the potential risks if compromised, and possible mitigation strategies. The results show that while seed phrases are vital for maintaining user asset security and integrity, they can be a vulnerability if not properly protected.
References
S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
M. Swan, Blockchain: Blueprint for a new economy. “ O’Reilly Media, Inc.,” 2015.
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Sok: Research perspectives and challenges for bitcoin and cryptocurrencies,” in 2015 IEEE symposium on security and privacy, IEEE, 2015, pp. 104–121.
C. F. Torres, F. Willi, and S. Shinde, “Is your wallet snitching on you? an analysis on the privacy implications of web3,” in 32nd USENIX Security Symposium (USENIX Security 23), 2023, pp. 769–786.
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
A. Dalskov, D. Lain, E. Ulqinaku, K. Kostiainen, and S. Capkun, “2fe: Two-factor encryption for cloud storage,” arXiv preprint arXiv:2010.14417, 2020.
Z. Zhou, T. Sharma, L. Emano, S. Das, and Y. Wang, “Iterative design of an accessible crypto wallet for blind users,” in Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 2023, pp. 381–398.
G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014.
F. Eleshin, Q. Sun, M. Ye, S. Das, and J. I. Hong, “Of Secrets and Seedphrases: Conceptual Misunderstandings and Security Challenges for Seed Phrase Management among Cryptocurrency Users,” in Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, 2025, pp. 1–19.
T. T. Huynh, T. D. Nguyen, and H. Tan, “A survey on security and privacy issues of blockchain technology,” in 2019 international conference on system science and engineering (ICSSE), IEEE, 2019, pp. 362–367.
N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on ethereum smart contracts (sok),” in International conference on principles of security and trust, Springer, 2017, pp. 164–186.
“scholar”.
M. Vaneeta, V. Sangeetha, A. Mamatha, and A. Kanavalli, “Trends and Prospectus of Blockchain Technology,” in Blockchain for IoT Systems, Chapman and Hall/CRC, pp. 78–93.
Д. А. Яруллина and Г. Ф. Валиева, “English for Information Security,” 2015.
A. Y. Semenoh, M. B. Perekrestov, D. M. Dmytrishyn, and M. M. Bohachenko, “Economic Consequences of Crypto-Asset Fraud in the Context of Digital Transformation: Analysis of Costs and the Potential of Preventive Technologies,” 2025.
M. Wang, M. Duan, and J. Zhu, “Research on the security criteria of hash functions in the blockchain,” in Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018, pp. 47–55.
L. Caviglione et al., “Tight arms race: Overview of current malware threats and trends in their detection,” IEEE Access, vol. 9, pp. 5371–5396, 2020.
H. Wen, J. Fang, J. Wu, and Z. Zheng, “Hide and seek: An adversarial hiding approach against phishing detection on ethereum,” IEEE Trans Comput Soc Syst, vol. 10, no. 6, pp. 3512–3523, 2022.
B. D. Analytics, C. Water, and N. Computing, “Disruptive Technologies for Sustainable Development”.
I. H. Sarker, M. H. Furhad, and R. Nowrozy, “Ai-driven cybersecurity: an overview, security intelligence modeling and research directions,” SN Comput Sci, vol. 2, no. 3, p. 173, 2021.
Copyright (c) 2025 Fernanda Kalvin, Muhammad Ibnu Sa'ad, Ahmad Fahrijal Pukeng

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


.png)
.png)


