This task was abandoned by me a couple of decades in the past. Fundamental security difficulties during the era of private keys have already been introduced to my focus. See: #61Simplifying, to create a set of asymmetric keys a random number is fed right into a math purpose which is not reversible. The result of this function generate each keys.Eth… Read More