Bip39 Word List Numbers. Now, at the following degree we use these obtaining and change crucial bunch to deliver unique non-public keys. Use the above generate private keys and chain code and pass them to the above outlined operate kchild = kpar + hash(Kpar, cpar, i) to produce personal keys. https://bookmarkprobe.com/story19593888/bip39-wallets-https-linktr-ee-bip39-5-simple-statements-about-bip39-mnemonic-explained