# Summary

This is an extended question to How are ethereum addresses generated?.

In Ethereum, a private key is 256-bit long, but an address is only 160-bit long. By "Pigeonhole Principle", it guarantees that some unique private keys map to the same address. Theoretically, `2 ** 96`

unique private keys maps to one address on average.

# Question

If 2 private keys map to the same address, do they both gain access to the same address? Can they both used to transfer Ether from that address to another?

# Details

According to @tayvano's answer, a private key is 256-bit long, and any 256-bit string is a valid private key:

Every single string of 64 hex are, hypothetically, an Ethereum private key that will access an account.

Therefore, there are `2 ** 256`

valid private keys (the key space is `2 ** 256`

).

A public key is 512-bit long. However, since each of them is derived from its own private key, there are only `2 ** 256`

valid public key, and thus the key space is `2 ** 256`

.

The public key is then feed as the input of `Keccak-256`

(pre-standard SHA3) hash algorithm. The output of `Keccak-256`

is a 256-bit string, therefore it could be treated as a one-to-one mapping in key space. (The hash space is `2 ** 256`

)

However, an Ethereum address is obtained from the least significant 160-bit of the `Keccak-256`

hash. This cuts the key space to `2 ** 160`

.

As a result, the process of generating an address from a private key is a function of a 256-bit value to a 160-bit value, which guarantees duplicates.

## Best Answer

Your calculations are right, except there aren't exactly 2^256 private keys -- there are "FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE BAAEDCE6 AF48A03B BFD25E8C D0364141" (this number is named

`N`

in the ETH source code, and is the order of the generator of the elliptic curve secp256k1, from which Ethereum key pairs are generated).In answer to your question, yes, private keys mapping to the same address will both be able to spend the money in that address on a first come first served basis. They will create the same public key, which the ECDSA verification algorithm is performed against, and so signatures generated by either private key will verify against the same address!

In go-ethereum/accounts/key.go, we have a private key generated from S256 which is secp256k1's curve, meaning they will be less than

`N`

be default.go-ethereum/crypto/secp256k1/secp256 also generates the key pairs in accordance with secp2656k1 albeit in a slightly different way :)

## Cool illustrative explanation for what

`N`

really is and why 2 keys will be able to spend money from the same accountImagine private keys are miles driven in your car, and public keys are number of miles on your car's odometer. If the odometer rolls over from 999,999 to 000,000, a person with miles driven = 1,000,001 will have the same 'public key', and hence the same address, as a person with miles driven = 1.

EC group arithmetic is surprisingly similar to this, but rather than 999,999, we have the seemingly arbitrary number given above! Due to this property, even with your different 'private keys', you will be able to create signatures that verify against the same public key, and hence spend ETH from the same address!!

## Boring math explanation

Private keys are 256 bit numbers, and to calculate the public key from a private key you multiply by the generator,

`g`

, of the elliptic curve group. The generator in use is defined in the parameters of the secp256k1 libraries being used in ETH. It itself is also an elliptic curve point, and as elliptic curves are cyclic, there exists an`n`

such that`n.g = 1`

(this is called the generator order).With this equation we can see that if we had a private key

`k`

with`k>n`

, we would have`k.g = (k-n).g = k'.g`

, for a`k'`

that is possibly someone else's private key! So we have keys generated at random modulo`n`

, rather than 2^256.