Title: Secp256k1 PRO project for the search for private key collisions Post by: Secp256k1PRO on December 16, 2019, 08:20:04 AM The Secp256k1 PRO project was created as a search for private key collisions using the Pollard's kangaroo algorithm.
In early December, at a thematic forum: https://bitcointalk.org/index.php?topic=5166284.msg52318676#msg52318676 (https://bitcointalk.org/index.php?topic=5166284.msg52318676#msg52318676) https://bitcointalk.org/index.php?topic=5173445.msg52473992#msg52473992 (https://bitcointalk.org/index.php?topic=5173445.msg52473992#msg52473992) It was proposed to give users a new puzzle and a new opportunity to get BTC coins by searching for private keys from a large list of compressed public keys. https://drive.google.com/uc?id=1UpHRrhSll_OCp4GIvvk-bj3sTJwx6MtO&export=download (https://drive.google.com/uc?id=1UpHRrhSll_OCp4GIvvk-bj3sTJwx6MtO&export=download) https://drive.google.com/uc?id=1_S9o5tFs4Nr37FkAx3HkbuVXqS8HqIAX&export=download (https://drive.google.com/uc?id=1_S9o5tFs4Nr37FkAx3HkbuVXqS8HqIAX&export=download) The amount is: 144 million public keys. The most effective private key search tool is the Pollard's kangaroo algorithm. Open source: https://github.com/Telariust/vs-kangaroo (https://github.com/Telariust/vs-kangaroo) https://github.com/Telariust/pollard-kangaroo (https://github.com/Telariust/pollard-kangaroo) https://github.com/Telariust/pollard-kangaroo-c99 (https://github.com/Telariust/pollard-kangaroo-c99) Reward: For one private key found, you get one BTC coin. 1 PRIVKEY = 1 BTC // of 144,000,000 PUBKEY Contact with the sender of coins: secp256k1pro@protonmail.com Official website: https://secp256k1.pro (https://secp256k1.pro) Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: gmaxwell on December 16, 2019, 10:55:29 AM This is almost certainly yet another set of malware links.
Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: MrFreeDragon on December 16, 2019, 11:43:53 AM This is almost certainly yet another set of malware links. These links could be malware, but should not. I guess this post is like scam to use the computer power. Let'sargue with logic and understand, why some anonymous person wants to pay 1BTC for the found private key? Nothing said about this. The author just said that there are 144 million public keys provided by him, and he pays 1BTC for any found private key. But why? He did not say about this... What is the source of the payment? Give the address with the signed message by the private key of that source address. I beleive that the author used elliptic curve additions for the rich BTC address, and received 144 million public keys. All these 144 million public keys belong to zero balance addresses, however knowing any one private key to one of these 144 million public keys allow the author to access the target address. If k is the private key from the target address, so its public key is Q = k*G. ithout knowing the k value, auhor created 144 million public keys adding some value to the public key, let's say m value. Hence, the calcaulted public key is P = Q + m*G, which is P = k*G + m*G = (k+m)*G = x*G, where x = k+m. The m value is known only by the author of this 144 million public key list. Private key for P public key not known as well as for target Q public key, but the author published 144 million values of P public keys. The followers of this "hidden scam" project will find the private key for P, and as they found it and provide it, the author could calculate the private key from the target address as k = x - m. Proobably the target address has thousand of BTC, so the payment in the ammount of 1BTC will be easy. This is "hidden scam", because actually the followers will crack the target address, not knowing what they are doing. Just thik for a while, what is the reason to pay 1BTC for the private key from the public key with the 0 balance? PS. There are already some examples of the same "hidden" scam topics: https://bitcointalk.org/index.php?topic=5060735.0 https://bitcointalk.org/index.php?topic=1306983.msg53030914#msg53030914 https://bitcointalk.org/index.php?topic=5166284.msg53065525#msg53065525 Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: BiThemis on December 18, 2019, 07:04:21 AM The Secp256k1 PRO project was created as a search for private key collisions using the Pollard's kangaroo algorithm. In early December, at a thematic forum: https://bitcointalk.org/index.php?topic=5166284.msg52318676#msg52318676 (https://bitcointalk.org/index.php?topic=5166284.msg52318676#msg52318676) https://bitcointalk.org/index.php?topic=5173445.msg52473992#msg52473992 (https://bitcointalk.org/index.php?topic=5173445.msg52473992#msg52473992) It was proposed to give users a new puzzle and a new opportunity to get BTC coins by searching for private keys from a large list of compressed public keys. https://drive.google.com/uc?id=1UpHRrhSll_OCp4GIvvk-bj3sTJwx6MtO&export=download (https://drive.google.com/uc?id=1UpHRrhSll_OCp4GIvvk-bj3sTJwx6MtO&export=download) https://drive.google.com/uc?id=1_S9o5tFs4Nr37FkAx3HkbuVXqS8HqIAX&export=download (https://drive.google.com/uc?id=1_S9o5tFs4Nr37FkAx3HkbuVXqS8HqIAX&export=download) The amount is: 144 million public keys. The most effective private key search tool is the Pollard's kangaroo algorithm. Open source: https://github.com/Telariust/vs-kangaroo (https://github.com/Telariust/vs-kangaroo) https://github.com/Telariust/pollard-kangaroo (https://github.com/Telariust/pollard-kangaroo) https://github.com/Telariust/pollard-kangaroo-c99 (https://github.com/Telariust/pollard-kangaroo-c99) Reward: For one private key found, you get one BTC coin. 1 PRIVKEY = 1 BTC // of 144,000,000 PUBKEY Contact with the sender of coins: secp256k1pro@protonmail.com Official website: https://secp256k1.pro (https://secp256k1.pro) GPU is suitable for this project. CUDA Software!!! The Slav brothers are already completely eager for battle https://www.freelancer.com.ru/projects/python/Project-for-Nikola-21352048/details Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: BiThemis on December 19, 2019, 06:25:40 AM Roughly there are 2^256 possible private key and 2^160 bitcoin address (excluding address with prefix 3 and bc1), so of course private key is possible. P.S. please prove why Pollard's kangaroo algorithm is the most effective private key search tool Pollard's kangaroo algorithm is a mathematical calculation. Brute Force is not very effectiveWith the help of enumeration, much less keys are checked. When busting, you waste time and computer power. And in mathematical calculation, you are ahead of time. All this is described in detail in the documents: How pollard-kangaroo works, the Tame and Wild kangaroos, is a simple explanation. Suppose there is pubkeyX, unknow privkeyX, but privkeyX is in range w=[L..U]. The keys have a property - if we increase pubkey by S, then its privkey will also increase by S. We start step-by-step to increase pubkeyX by S(i), keeping sumX(S(i)). This is a Wild kangaroo. We select a random privkeyT from range [L..U], compute pubkeyT. We start step-by-step to increment pubkeyT by S(i) while maintaining sumT(S(i)). This is a Tame kangaroo. The size of the jump S(i) is determined by the x coordinate of the current point, so if a Wild or Tame kangaroo lands on one point, their paths will merge. (we are concerned with pseudo random walks whose next step is determined by the current position) Thanks to the Birthday Paradox (Kruskal's card trick), their paths will one day meet. Knowing each traveled path (sumX and sumT), privkeyX is calculated. The number of jumps is approximately 2w1/2 group operations, which is much less than a full search w. Kangaroos, Monopoly and Discrete Logarithms --> https://web.northeastern.edu/seigen/11Magic/KruskalsCount/PollardKangarooMonopoly.pdf Using Pollard's kangaroo algorithm, you can’t crack all the addresses, but you can partially determine the desired private key from a huge list of public keys. Theoretical is possible! Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: gmaxwell on December 20, 2019, 10:30:40 AM Let'sargue with logic and understand, why some anonymous person wants to pay 1BTC for the found private key? Nothing said about this. The author just said that there are 144 million public keys provided by him, and he pays 1BTC for any found private key. But why? He did not say about this... What is the source of the payment? Give the address with the signed message by the private key of that source address. I beleive that the author used elliptic curve additions for the rich BTC address, and received 144 million public keys. All these 144 million public keys belong to zero balance addresses, however knowing any one private key to one of these 144 million public keys allow the author to access the target address. What you're describing works out algebraically but not logically. I can, indeed, take some valuable key P, and some other key with a private key I know Q to it and get a new key R = P + Q where if you find a xG = R and tell me, then I can compute xG = P and steal P's coins. I even offered a bounty (https://bitcointalk.org/index.php?topic=421842.msg4809012#msg4809012) based on doing this to challenge one of the first of these bullshit fake crackers. The problem is that finding _any_ discrete log of an arbitrary point in the secp256k1 group is intractably difficult-- so this scheme doesn't have a pay-off even if you get a LOT of suckers grinding for you. What does have a pay-off though is making people think you're doing that so they're willing to help out just for the 1BTC you've promised... and meanwhile you slip them some malware. Probably the best way scammers have found to rip people off is to pretend to be doing something illegal and highly profitable to get people to go along with their scheme-- e.g. how pirate40 spread rumors that he was laundering drug money. We've seen key attacking tools posted to BCT which certainly had malware and were used to rob people. But it takes a ton of effort to go actually find a subtle backdoor, so when someone posts some tool that doesn't make logical sense it's usually a good guess that it's just a trojan horse. Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: MrFreeDragon on December 21, 2019, 10:46:55 PM -snip- We've seen key attacking tools posted to BCT which certainly had malware and were used to rob people. But it takes a ton of effort to go actually find a subtle backdoor, so when someone posts some tool that doesn't make logical sense it's usually a good guess that it's just a trojan horse. If somebody posts a tool without a logical sense, you are right that is a good plac for malware. However particullary in this case, the author posted the archives with txt files, where the public keys are located. For example, these are the 30 first keys from the file Pubkey(100).txt of the second link Pubkey2.rar: Code: 02000029ae90c20c20e5848b3418e6458376d2cebe5cf866d62f85ff4e3f9fbac6 These keys are sordet by name. So in order to understand the connection between the public keys all of them should be downloaded and checked for connection. I suppose that the easiest 1G step between pubkeys could be used (but not necesssary). But it also could be 10*G, 1000*G, 2^100*G or any other number. I still beleive that all the 144 million public keys packed in 2 rar archieves are connected with some very rich address (or may be with different addresses). Check just these extracted 30 public keys - all of them related to 0 balance wallets. And there is no reason to author to pay 1BTC for the private key from 0 balance address (i guess he can generate a bulk of such 0 balance addresses). That's why the author has the hidden interest - to receive the private key from the rich address. And I do not recommend to participate in this activity. Title: Re: Secp256k1 PRO project for the search for private key collisions Post by: gmaxwell on December 22, 2019, 02:20:23 PM I don't think you understood my point.
The idea you imagine cannot work because the keys cannot be cracked even with the computing power of every computer on earth for the rest of his life. The attacker just wastes his own time constructing and posting the 'hidden list'. Instead, if the attacker pretends his motivation is cracking some hidden list, some people might participate (because why would they care if someone elses coins are stolen, so long as they get paid)--- and then he can give them malware either in the original software or in some later 'speedup'. *That* is a good reason well worth the attacker's time. It works even better if someone shows up warning about hidden lists: that gives a cover motivation for the attacker which isn't a danger to the participants. Just like people who were suggesting pirate40 was really laundering drug money ultimately ended up encouraging people to pay into his ponzi scheme, before they heard the laundering claim they thought it was a scam (which it was). Maybe your thought is right and the poster is just exceptionally stupid and does not realize that no key will ever be cracked this way. ... but it is safer to assume the poster is not stupid and has a motivation which actually makes sense like malware especially because we have several times seen users post 'key crackers' that were malware in the past. |