StrongCoin appears to be an abandoned service as of 2025, but if you have your paper wallet backup, your funds are still recoverable. This guide walks through decrypting your StrongCoin private keys with OpenSSL and importing them into Electrum.

Strongcoin.com was the first hybrid online Bitcoin wallet. One of the nice features of the wallet is that it provides each user with a PDF that can be printed to provide an encrypted paper wallet. In this article, we walk through the process of recovering your funds from that backup.
As of 2025, StrongCoin appears to be an abandoned service. While the website still loads, users report being unable to withdraw funds through the normal interface, customer support is non-responsive, and no development has occurred since approximately 2017.
The good news: if you have your paper wallet backup, your funds are recoverable regardless of whether StrongCoin's service is functional. Your private keys are encrypted on that backup, and with your password, you can decrypt them and import them into any Bitcoin wallet you control.
Here's an example, taken from Strongcoin's website:

In this case, a single user has 6 different private keys. The paper wallet includes a public address, an encrypted version of the private key, and a balance at the time that the paper wallet was generated.
You could enter the public address into a blockchain explorer to get the current balance stored on each private key.
There's a column for "Clue" as well - it isn't clear (today) whether this was intended for users to simply write in a password clue, or whether you could add a clue from within the Strongcoin.com website and have it print on your paper wallet.
No - the Strongcoin wallet format predates the BIP38 protocol, and it uses a different encryption scheme.
Everything that follows assumes that you know the password to your paper wallet. If you don't know the password - and you have tried the most likely candidates - then you probably need professional help.
Crypto Asset Recovery can take your paper wallet and your password guesses, and expand them into hundreds of millions, billions or more password variations. We'll then test each one against your encrypted private key until we find the right password.
If we don't recover funds, you don't owe us any money. (If we do recover funds we take 20% of funds recovered). Interested in more information? Please contact us.
Strongcoin explained how they encrypt the private keys in their paper wallet back in October of 2011.
Strongcoin uses the highly-regarded open source encryption software called OpenSSL to encrypt private keys in the paper wallet. You can decrypt your private keys using the same software.
OpenSSL offers support for more than 100 different cryptographic algorithms, or ciphers.
A cipher is used to transform data, making it unreadable and secure from unauthorized access. It involves a series of well-defined steps that involve substitution, transposition, or both to convert plain text into encrypted text (ciphertext) and vice versa.
Strongcoin used a cipher called AES-256-CBC. The Advanced Encryption Standard (AES) is a widely-used symmetric encryption algorithm. AES-256-CBC, in particular, refers to a 256-bit key size and the Cipher Block Chaining (CBC) mode of operation. The 256-bit key size offers a high level of security, while the CBC mode ensures that even identical plaintext blocks are encrypted differently, providing an additional layer of security against pattern recognition attacks.
Let's imagine for a second, that you have a Strongcoin.com wallet, and that your unencrypted private key is: 5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
You would like to encrypt that private key with the password: OpenSesame
Once you installed the OpenSSL libraries on your computer, you could create an encrypted private key with the following command:
echo "5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF" | openssl enc -e -aes-256-cbc -a -k OpenSesame
U2FsdGVkX1+m4PKpcBfkuRmmklQ5nA2WFq17zKEfJndwrvSb6Hb5ACsVgkw4J+wc
vaiFfwQ9AaQaFTa6dUx51gMuCv+Rtz2iycvZWYP0Rrw=
The two lines beginning with "U2Fs" and "vaiF" represent your encrypted private key.
For fun, execute that same command a second time, and notice how the encrypted private key has changed! That's the magic of CBC mode:
echo "5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF" | openssl enc -e -aes-256-cbc -a -k OpenSesame
U2FsdGVkX18D+Cljo/dm2es1MeBMUR4BStRbYsciKLBCObM4xR9tzeIUsLHwIF6d
CxircUKMIAUMSKZXXRtIWyEMQsea/uglA6c1Y37gM14=
I'm going to ignore that second encrypted private key away now - the point was just to show CBC in action.
For full compatibility with the Strongcoin paper wallet, you'd need to break that two-line private key into four lines after character 31 on each line:
U2FsdGVkX1+m4PKpcBfkuRmmklQ5nA2
WFq17zKEfJndwrvSb6Hb5ACsVgkw4J+wc
vaiFfwQ9AaQaFTa6dUx51gMuCv+Rtz2
iycvZWYP0Rrw=
Let's store that encrypted private key in a text file called: key.txt
Now, using this sample data, let's decrypt it and make sure that we get the unencrypted private key that we started with:
openssl enc -d -aes-256-cbc -in key.txt -a -k OpenSesame
5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
Perfect! We have now encrypted and decrypted a private key using the methodology that Strongcoin uses.
It's worth mentioning that anyone that has your unencrypted private key can take all of your funds. So, you should take some basic precautions:
There is some risk to this approach - there will be a time when the private key is exposed while your computer is connected to the internet. Theoretically, this could get stolen - but, the risk is fairly small. However, do not leave your funds in Electrum. Immediately move all the funds to another wallet that you control.
If you have any questions, feel free to contact CryptoAssetRecovery.com.