I'd like to be able to better define the security of a BIP-39 algorithm where I just consider the process of giving me a "seed phrase".
Imagining a scenario where a hacker would try to gain access to existing crypto wallets using the seed phrase as a basis to go through the PK algorithm and obtain the hash of access to the targets' wallets, where the targets could be any user on the network with a balance (it's only this is what a hacker would want, as I see many calculating against a target, forgetting that the target can be more than one, and yes, at least thousands).
So, trying to think about the attacker's view, we can notice that the BIP-39 of Bitcoin or Ethereum for example, both use a dictionary of 2048 words (2048¹² possible combinations), following the algorithm that receives 128 bits of input (let's assume only the case minimalist way to get a string of 12 valid words) generates its hash [... a few more procedures] and then returns the indices of a valid seed phrase, but most likely not related to any wallet with balance. But then, in this case I could just think of the brute force I would have to do with the dictionary to suddenly causally access someone's wallet, but is it really that impractical?
I imagine this equation:
T = estimated seconds to access a user's first card --> What we
really want to know.
x = amount of blockchain user whose target cryptocurrency.
a = estimated difference between (2048^12) combinations and valid
combinations generated by BIP-39.
b = attempts per second with seed phrases generated from BIP-39 (by
sequentially inserting multiple bits by 32, totaling 128 for the
BIP-39 function, remembering 2^128 possible combinations)
T = ((2048^12) - x - a) / b
I would like to know if this equation really follows the logic to calculate the viability of an attack of such complexity.
I'm no expert in mathematics, thinking that the problem is essentially mathematics, but I would like to get insights into the correct calculation and some examples of specific machines, how long it would take to access the wallet of any user among all of a network in front of hardware with a capacity of attempts per second.
Thanks.