Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Derivation Path

A derivation path is a standardized formula that specifies how a Hierarchical Deterministic (HD) wallet generates a tree of cryptographic keys from a single master seed.
Chainscore © 2026
definition
CRYPTOGRAPHY

What is a Derivation Path?

A derivation path is a standardized notation that specifies how a hierarchical deterministic (HD) wallet generates a sequence of cryptographic keys from a single master seed.

In cryptocurrency wallets, a derivation path is a blueprint that dictates the exact location of a private key and its corresponding public address within a vast, tree-like structure of keys. It is expressed as a string like m/44'/0'/0'/0/0, where each segment, separated by slashes, represents a step in the hierarchical derivation process. This system, defined by the BIP-32 and BIP-44 standards, allows a single master seed—often represented as a 12 or 24-word mnemonic phrase—to deterministically generate an entire portfolio of keys for multiple blockchains and accounts without ever needing to back up individual keys again.

The structure of a standard BIP-44 path, m / purpose' / coin_type' / account' / change / address_index, has specific semantic meaning. The purpose' (44') is fixed for BIP-44. The coin_type' differentiates blockchains (0 for Bitcoin, 60 for Ethereum). The account' level allows for separate business or personal accounts. The change field is typically 0 for receiving addresses and 1 for change addresses. Finally, the address_index is a sequential number generating individual addresses. The apostrophe (') denotes a hardened derivation, which enhances security by preventing a compromised child key from revealing its parent.

Using a consistent derivation path is crucial for wallet interoperability. When you import your seed phrase into a different wallet application, it uses the same path to regenerate the exact same keys and find your funds. However, not all wallets use the same standard; some legacy or custom wallets may use different paths (like m/44'/60'/0'/0 for Ethereum in some cases), which is why funds can sometimes appear "missing" if the wrong path is scanned. Developers must ensure their applications adhere to widely accepted standards to guarantee user asset portability.

For advanced users and developers, understanding derivation paths is essential for tasks like auditing, multi-signature wallet setup, and integrating with hardware wallets. Tools like iancoleman.io's BIP39 tool allow users to visualize the key generation for a given seed and path. Furthermore, newer standards like BIP-84 (for native SegWit addresses with path m/84'/0'/0'/0/0) and BIP-86 (for Taproot) introduce optimized paths for different address types, showcasing how the system evolves to support new cryptographic features while maintaining the core hierarchical deterministic framework.

how-it-works
CRYPTOGRAPHY

How a Derivation Path Works

A technical breakdown of the deterministic process that generates cryptographic keys from a single seed.

A derivation path is a standardized notation that specifies the exact sequence of operations a Hierarchical Deterministic (HD) wallet uses to generate a specific cryptographic key pair from a master seed. It functions as a "map" or formula, telling the wallet's algorithm which branches and indices to traverse within a vast, deterministic tree of potential keys. This path is typically represented as a string like m/44'/0'/0'/0/0, where each segment instructs the derivation function. The primary purpose is to enable the generation of an unlimited number of keys from one backup, ensuring keys are reproducible across different wallet software that adheres to the same standard.

The structure of a derivation path follows a specific syntax. The letter m denotes the master or root key. Each subsequent number, separated by slashes, represents a child key derivation step. A hardened derivation (indicated by an apostrophe, e.g., 44') uses the parent private key in the calculation, enhancing security for keys high in the hierarchy. A normal derivation (no apostrophe) uses only the parent public key, allowing for the creation of watch-only addresses. The numbers themselves are indexes, with the first few (like 44' for BIP44) often being purpose and coin type identifiers defined by standards, followed by account, change, and address indices.

Different blockchain networks and standards employ specific derivation path templates. For example, the widely adopted BIP44 standard defines the path m/44'/coin_type'/account'/change/address_index. Here, coin_type' (e.g., 0' for Bitcoin, 60' for Ethereum) isolates keys per cryptocurrency. The account' level allows for separate business or personal accounts, while the change index (0 for receiving addresses, 1 for change addresses) and the final address_index generate the individual key pairs used for transactions. Other standards like BIP84 (native SegWit) or BIP32 (the foundational HD wallet standard) use different purpose numbers but follow the same hierarchical logic.

Understanding derivation paths is crucial for wallet recovery and interoperability. When you restore a wallet using a seed phrase, the software uses the associated derivation path to regenerate the exact same sequence of private keys and addresses. If two wallets use different paths for the same seed, they will generate completely different sets of addresses, making funds appear lost. This is why specifying the correct derivation path is essential when importing a seed into a new wallet or using advanced tools. Developers must ensure their applications use consistent, standard-compliant paths to guarantee a seamless user experience across the ecosystem.

key-features
HIERARCHICAL DETERMINISTIC WALLETS

Key Features of Derivation Paths

Derivation paths define the hierarchical structure for generating cryptographic keys from a single seed, enabling organized key management across multiple accounts, blockchains, and security levels.

01

Hierarchical Structure

A derivation path is a string that specifies a key's location in a tree structure derived from a master seed. The standard format is m/purpose'/coin_type'/account'/change/address_index. Each level (separated by /) represents a branch in the hierarchy, allowing for logical separation of funds by purpose, blockchain, account, and transaction type.

02

BIP 32 & 44 Standards

Derivation paths are standardized by BIP 32 (Hierarchical Deterministic Wallets) and BIP 44 (Multi-Account Hierarchy). BIP 32 defines the mathematical framework for deriving child keys. BIP 44 builds upon this with a specific path structure (m/44'/coin_type'/account'/change/address_index) that has become the de facto standard for multi-currency wallets, ensuring interoperability.

03

Hardened vs. Non-Hardened Derivation

Derivation uses two methods indicated by an apostrophe ('):

  • Hardened Derivation (purpose', coin_type', account'): Child private keys cannot be derived from a parent public key alone, providing enhanced security for high-level branches.
  • Non-Hardened (Normal) Derivation (change, address_index): Allows derivation of child public keys from a parent public key, enabling watch-only wallets without exposing private keys.
04

Multi-Chain & Multi-Account Support

The coin_type field (e.g., 0' for Bitcoin, 60' for Ethereum) allows a single seed to generate keys for different blockchains. The account field enables creating separate, isolated accounts (e.g., 0' for savings, 1' for checking) within the same wallet software, all derived from the same master seed.

05

Change & Address Index

The final levels of the path manage transaction outputs and address generation:

  • Change (0 or 1): 0 is for receiving addresses, 1 is for change addresses (UTXO-based chains).
  • Address Index: A sequential number (starting at 0) that generates individual public/private key pairs for addresses. Incrementing this index creates new addresses, enhancing privacy.
06

Seed Phrase Recovery

The entire hierarchy of keys is deterministically generated from the master seed (represented as a 12-24 word mnemonic). Knowing the seed phrase and the derivation path standard (e.g., BIP 44) allows full recovery of all derived keys, accounts, and funds across compatible wallets, which is the core value proposition of HD wallets.

common-standards
KEY SPECIFICATIONS

Common Derivation Path Standards

A derivation path is a standardized format for generating a hierarchy of cryptographic keys from a single seed. These standards ensure wallet interoperability and define the structure for different blockchain accounts.

HIERARCHICAL DETERMINISTIC (HD) WALLETS

Comparison of Major Derivation Path Standards

A technical comparison of the dominant derivation path standards used to generate cryptographic keys for different blockchain networks and wallet applications.

Feature / SpecificationBIP 32/44 (Legacy)BIP 84 (Native SegWit)BIP 86 (Taproot)

Primary Use Case

Legacy Bitcoin (P2PKH, P2SH)

Native SegWit (P2WPKH)

Taproot (P2TR)

Path Format

m/44'/0'/0'

m/84'/0'/0'

m/86'/0'/0'

Address Prefix

1... (P2PKH) or 3... (P2SH)

bc1q...

bc1p...

Transaction Size

Largest (~225 bytes)

~40% smaller than Legacy

Smallest (~58 vbytes witness)

Signature Type

ECDSA

Schnorr (SegWit v0)

Schnorr (SegWit v1)

Key Derivation

Public key from private key

Public key from private key

Public key from x-only pubkey

Default Script Type

P2PKH or P2SH-P2WPKH

P2WPKH

P2TR

Privacy Level

Lowest (public key visible)

Medium

Highest (signature aggregation)

visual-explainer
CRYPTOGRAPHIC HIERARCHY

Visualizing the Derivation Tree

A conceptual guide to understanding the hierarchical structure of keys in deterministic wallets, from a master seed to individual addresses.

A derivation tree is a hierarchical, tree-like data structure that visually represents how a single master seed generates an entire hierarchy of cryptographic keys and addresses in a deterministic wallet. Each node in the tree corresponds to a key pair, with the root being the master private key. Branches extend from parent keys to child keys following a defined derivation path, such as m/44'/0'/0'/0/0. This structure allows for the organized, reproducible generation of millions of keys from one secret, enabling features like account separation and backup simplicity.

The tree is typically segmented into logical branches defined by BIP standards. For example, the path segment 44' denotes the use of BIP44, which establishes a convention for multi-currency hierarchies. Subsequent levels often represent the coin type (e.g., 0' for Bitcoin), account number, change chain (external vs. internal addresses), and finally the address index. Visualizing this helps developers and users understand the relationship between accounts—like savings and checking—and how individual receiving addresses are mathematically linked but cryptographically distinct.

Understanding the derivation tree is crucial for advanced wallet operations. It explains how hardened derivation (indicated by an apostrophe) creates a firewall between parent and child keys, preventing a compromised child key from endangering the master seed or sibling branches. In contrast, normal derivation allows for the creation of watch-only wallets for public branches. This visualization makes abstract concepts tangible, clarifying how a single backup of the 12 or 24-word mnemonic phrase can restore the entire, complex tree of keys across multiple devices and applications.

ecosystem-usage
DERIVATION PATH

Ecosystem Usage and Examples

Derivation paths are not just a technical specification; they are the blueprint for wallet interoperability, key management, and cross-chain asset discovery. Here are the primary ways they are used across the ecosystem.

03

EVM Chain Variations (BIP-44 vs. Legacy)

Not all Ethereum wallets use the same path, leading to potential fund discovery issues.

  • Standard (BIP-44): m/44'/60'/0'/0/{index} (Used by MetaMask, Ledger Live).
  • Legacy (MEW/m/44'/60'/0'/{index}): Older MyEtherWallet and Jaxx used m/44'/60'/0'/{index}, omitting the change level.
  • Ledger Live Ethereum (m/44'/60'/{account}'/0/0): Uses a distinct structure for its internal account management. Users must ensure the wallet software uses the correct path to 'find' their existing funds.
05

Account Discovery in Wallet Software

When you import a seed phrase, wallet software performs account discovery by iterating through derivation path indices. It will typically:

  1. Derive addresses for paths like m/44'/60'/0'/0/0 through m/44'/60'/0'/0/20.
  2. Query the blockchain to see if any of these addresses have a transaction history or balance.
  3. Stop searching after a consecutive number of empty addresses (e.g., 5-20). This process automatically finds your 'used' accounts without manual path input.
06

Custom Paths for Advanced Scenarios

Advanced users and institutions employ custom derivation paths for specific security and organizational needs.

  • Multi-Sig Vaults: A 2-of-3 multi-signature setup might use a dedicated path like m/48'/0'/0'/2' (per BIP-48) to separate these secure funds from daily-use keys.
  • Institutional Custody: Custodians generate unique paths per client (m/44'/60'/{client_id}'/0/0) to logically isolate assets on-chain while using a single HD seed.
  • Testing/Development: Developers use non-standard paths (e.g., m/44'/1'/0'/0/0 for Bitcoin testnet) to avoid mixing with mainnet funds.
security-considerations
DERIVATION PATH

Security Considerations

While a deterministic hierarchy for key generation, the derivation path itself introduces critical security considerations for key management and access control.

01

Path Standardization & Wallet Compatibility

Using a non-standard derivation path can lead to wallet incompatibility, where keys and funds become inaccessible in wallets that expect a different path. For example, the common Bitcoin path m/44'/0'/0' differs from Ethereum's m/44'/60'/0'/0. Always verify the standard path for the specific blockchain network you are using to prevent loss of access.

02

Public Key Leakage & Privacy

Because derivation paths are deterministic, exposing a single public key and its path can allow an observer to derive all subsequent public addresses in that hierarchy. This compromises transaction privacy by linking all accounts derived from the same seed. For enhanced privacy, use separate seeds or wallets for unrelated activities.

03

The Role of Hardened Derivation

Hardened derivation (using an apostrophe, e.g., m/44'/0') prevents a compromised child private key from being used to derive its parent or sibling keys. This is a critical security feature for the account level in BIP44. Without it, a leak could compromise the entire wallet hierarchy. Always ensure key generation libraries use hardened derivation for the purpose and coin_type levels.

04

Seed Phrase as the Root of Trust

The entire derivation path hierarchy stems from a single seed phrase (mnemonic). This makes the seed the ultimate root of trust. If compromised, all derived keys across all paths are compromised. Conversely, losing the seed means losing access to all derived assets, regardless of the path. Secure, offline storage of the seed is the paramount security requirement.

05

Path Enumeration & Brute-Force Attacks

If an attacker knows a wallet's public master key (xpub) but not the derivation path, they may attempt path enumeration—trying known standard paths to discover used addresses. While they cannot steal funds without private keys, this violates privacy. Using a custom, non-standard path can obscure the hierarchy but increases the risk of self-inflicted incompatibility issues.

06

Multi-Signature & Institutional Security

In multi-signature (multisig) setups, derivation paths must be meticulously coordinated between all parties. Different signing devices or software may implement paths slightly differently (e.g., m/48'/0'/0'/2' for multisig). A mismatch in the expected path will render the wallet unusable. Institutional custody solutions rely on rigorously defined and tested path schemas to prevent such failures.

DERIVATION PATH

Common Misconceptions

Derivation paths are a fundamental concept in hierarchical deterministic (HD) wallets, but their function and security implications are often misunderstood. This section clarifies the most frequent points of confusion.

A derivation path is a standardized notation, like m/44'/60'/0'/0/0, that specifies the exact location of a cryptographic key pair within a Hierarchical Deterministic (HD) wallet's tree-like structure. It works by using a single master seed to generate a vast hierarchy of private keys and addresses in a reproducible manner. Each segment of the path instructs the wallet's derivation algorithm to perform a specific Cryptographic Hash Function operation, moving down the tree from the master key to child keys, grandchild keys, and so on. This allows users to back up an entire wallet with just the initial seed phrase, while still being able to generate countless unique addresses for different accounts, chains, or purposes.

DERIVATION PATH

Frequently Asked Questions (FAQ)

A derivation path is a critical component of hierarchical deterministic (HD) wallets, specifying how to generate a sequence of cryptographic keys from a single seed. These questions address its purpose, structure, and common standards.

A derivation path is a standardized notation that specifies the exact location of a cryptographic key within a Hierarchical Deterministic (HD) wallet's tree-like structure. It defines the sequence of steps used to derive a specific private and public key pair from a single master seed. The path is expressed as a series of numbers separated by slashes (e.g., m/44'/0'/0'/0/0), where each number represents a child key derivation operation. This system allows a single backup seed phrase to generate an entire portfolio of addresses across multiple blockchains and accounts in a predictable, recoverable manner.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Derivation Path: Definition & Use in Crypto Wallets | ChainScore Glossary