Bitcoin Forum

Bitcoin => Development & Technical Discussion => Topic started by: COBRAS on October 25, 2021, 02:21:57 PM



Title: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 02:21:57 PM
Send a bitcoin transaction message, R,S, nonce and I will try find a privkey.

Probability of success 90 %

???

Good Luck !!


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 02:39:28 PM
Where do you find r,s and nonce to test cobra?


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 03:08:41 PM
Where do you find r,s and nonce to test cobra?


you can try this scrypt for get r,s https://github.com/CryptoXploit/bitcoin-key-compression/blob/main/RawTX_RSZ.py and you need find a scrypt to get nonce and message

Info about "message" https://github.com/opsxcq/blog/blob/master/content/post/bitcoin-transaction-nonce-reuse.md

Nonce you need fond additionaly how to get.


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 03:29:33 PM
Provide nonce and you can easily calculate the rest. That's why you can't find the nonce in the transactions! But COBRAS can not determine the nonce, so that why he is asking for it.

Typical bullshit by COBRAS


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 03:38:01 PM
:)

Hi, can you tell how to calculate nonce  ? I know, you know how do it. )))


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 03:38:54 PM
Provide nonce and you can easily calculate the rest. That's why you can't find the nonce in the transactions! But COBRAS can not determine the nonce, so that why he is asking for it.

Typical bullshit by COBRAS

Dont cry my baby, all bi good, you will see ;)


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 03:42:36 PM
Yeah sure. Just want to make sure, that others don't think that you have some magic. Despite the fact that you have just shit.


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 03:46:32 PM
Yeah sure. Just want to make sure, that others don't think that you have some magic. Despite the fact that you have just shit.

Provide me test example and I will show you proof.

You can use scrypts of this https://bitcointalk.org/index.php?topic=5367241.40 thread and add printing nonce and message, and you get needed data. Please do not use long messages, for example use simple mesage like 123 etc without spaces


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 03:57:21 PM
And chech someone please, my calculation of r,s valid or not :

Message. - 1

Nonce - 1050579349868621761136446930980763481

Privkey -
792377483100611830733857591710555576

I get R
 95781203938134771654748299032707231792956540686382340872008587989453366815619

S - 80727512625679490130821917141198584466211136904971132112411065595033151255463


???


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 03:57:52 PM
z1= 93353623931523941635526917940569876188709719184622088095834273362296933478063
r1= 54099705214063944154172109159627208034887017282112188579050138041728027265926
s1= 26763745325720539257071403157380124505041548042099759944747544880564577232582

z2= 81702127792026333443711124635882168993009585129832730963580425549330191178012
r2= 6593809137196890155102218837098005628033072782489317008898011795934712537245
s2= 24044687403636915116203873017076684267174007171738263679679279954029740183829


what is privkey Cobras?


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 04:01:57 PM
z1= 93353623931523941635526917940569876188709719184622088095834273362296933478063
r1= 54099705214063944154172109159627208034887017282112188579050138041728027265926
s1= 26763745325720539257071403157380124505041548042099759944747544880564577232582

z2= 81702127792026333443711124635882168993009585129832730963580425549330191178012
r2= 6593809137196890155102218837098005628033072782489317008898011795934712537245
s2= 24044687403636915116203873017076684267174007171738263679679279954029740183829


what is privkey Cobras?


There is message and nonce ?

You not provide...

Message is something like this "$m$ is the message to be signed, in this scenario, is the value that OP_CHECKSIG will verify...." or message and nonce from your scrypt what you use to generate r,s,z...


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 04:06:47 PM
Nonce is secret like in real work Bitcoin transaction. Nonce is secret like privatekey.

Here, you get nonce and privatekey to check your script scrypt.

Quote
tra1= 1
priv1= 588090302866226151392183098597432839
pub1x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub1y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P1 = E.point( (pub1x, pub1y) )
nonce1= 1274456102238835156039403826343590735
z1= 73929703904352475058350820864275902291915805320151624518368899385246760558408
r1= 63714509482263402336656178492951601584073849868841425660138259859054452140558
s1= 53013736228078474636525944637211296477744965436216305227866576670996804630587

tra2= 2
priv2= 588090302866226151392183098597432839
pub2x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub2y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P2 = E.point( (pub2x, pub2y) )
nonce2= 292906967559569298363932189050644194
z2= 108233478877051903823798940619719570785332825645692214801721717411801604696277
r2= 45958667074168573121314703100222827549670170823548031334413476035868111870331
s2= 29153695206416919975320878486345533167500310527614745919053983294858554558896

tra3= 3
priv3= 588090302866226151392183098597432839
pub3x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub3y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P3 = E.point( (pub3x, pub3y) )
nonce3= 404896440056411427984473927600751445
z3= 58526326942309078561281133321243293561487515346592241825349289628739605568876
r3= 44839654320067329161661565903962076155392814429483150286532302568870825973990
s3= 46718785299086618576738536689619659023438472390629480121915923124886220881568

tra4= 4
priv4= 588090302866226151392183098597432839
pub4x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub4y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P4 = E.point( (pub4x, pub4y) )
nonce4= 1190727923990078286382802982956654264
z4= 95115561854367644637457153055405143064983804935658192438007255955749043012908
r4= 41505418859976899200533201136935542320288786635800285645064961512359756816269
s4= 52612301981937995162424719563276949532875115632154177799358581397849871741349

tra5= 5
priv5= 588090302866226151392183098597432839
pub5x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub5y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P5 = E.point( (pub5x, pub5y) )
nonce5= 173436577023448162504401176257185779
z5= 58456200635724995131916399308003107639603462137074452160327139818684689937265
r5= 12497866593045343239347469937246069572213000560006591835021277042649837119711
s5= 21102267501322967987885143626763376244818408170147967471669495321796589630824

tra6= 6
priv6= 588090302866226151392183098597432839
pub6x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub6y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P6 = E.point( (pub6x, pub6y) )
nonce6= 729909891012034095908392147240507852
z6= 74180409098169609866062206285174114626864476710118488056611048472495035105619
r6= 1949414567385081611274479246905808765329354909678641104361791152858170303813
s6= 8587758033000592876780259915028177615744682636507279958768129542635706246192

tra7= 7
priv7= 588090302866226151392183098597432839
pub7x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub7y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P7 = E.point( (pub7x, pub7y) )
nonce7= 271099156041083537295027107205054652
z7= 69375698425381989890989394810508191687331379659303471835391045080063422524188
r7= 62064725708948234495983522795729499401764574985673483351984058161262393797478
s7= 17509254757367888306997871645281140293102980847565221635888775953268882196178

tra8= 8
priv8= 588090302866226151392183098597432839
pub8x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub8y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P8 = E.point( (pub8x, pub8y) )
nonce8= 600201037088861656818524370090242983
z8= 75474183732696400326090600926608076082063156972704861396620386889491743253097
r8= 17386091077742234380198518670081881423575125830044585693730522575233384333963
s8= 32969516986369057030821185571944488935050676430682748662563535685325988735066

tra9= 9
priv9= 588090302866226151392183098597432839
pub9x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub9y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P9 = E.point( (pub9x, pub9y) )
nonce9= 1213778629172821037744995415639524735
z9= 61402247294621782741074236330955883844150467736057368427380915256464554514951
r9= 1571196906772103596298687961342709173157220584675394159388202642033834285065
s9= 14926410880183882168223370725667010935071771092099660904891099723824053828923

tra10= 10
priv10= 588090302866226151392183098597432839
pub10x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub10y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P10 = E.point( (pub10x, pub10y) )
nonce10= 766919105220360968239258432545781899
z10= 60657315648052347295728066561520822984177110063362405955877487754578861007655
r10= 65565325349415964479771990254987537906936671883459886391883794408867410660704
s10= 1665071787100277432433737680883499140991501051140230564853358195415007692904

tra11= 11
priv11= 588090302866226151392183098597432839
pub11x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub11y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P11 = E.point( (pub11x, pub11y) )
nonce11= 361774537759506523754951150749384028
z11= 58813658307872022533566962562642246393162733450520274589344640111457360689936
r11= 71749832366941218041483614344927908305286090824216896229256644685112181596833
s11= 30138406688334377272985508181126740752770547851780040235686487281636454803660

tra12= 12
priv12= 588090302866226151392183098597432839
pub12x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub12y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P12 = E.point( (pub12x, pub12y) )
nonce12= 797865129035644023918228490651121767
z12= 74074443107041749107028034165525383096384092599709431303013899078039224734825
r12= 41786332817613551721485718953235796878323333737260153800161391572427229131095
s12= 36953523142900115134380960311700429085848195016227559531003347518962774118775

tra13= 13
priv13= 588090302866226151392183098597432839
pub13x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub13y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P13 = E.point( (pub13x, pub13y) )
nonce13= 125421011708984214584550854782389751
z13= 102649001081058397658989696916891670599626052640270320849018823207081716624180
r13= 110741461346443936072678121577059212148213203389653105831131674515134059375321
s13= 32679776470242090463653638589153592110721951760331615664714693618344050994420

tra14= 14
priv14= 588090302866226151392183098597432839
pub14x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub14y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P14 = E.point( (pub14x, pub14y) )
nonce14= 738674773956379675922527871744580463
z14= 74887379061750949248557874089789535563209195187929890127382463656334067852493
r14= 70299169799083306181437671762754718711940518284671185624601110483327540698496
s14= 13435344501237159610461418866632937463404857372841563711192446758326828651576

tra15= 15
priv15= 588090302866226151392183098597432839
pub15x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub15y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P15 = E.point( (pub15x, pub15y) )
nonce15= 99602647795812247818859724843091494
z15= 67545964161464250291937164495960033891854714364234053486863202822263372559618
r15= 46188961143719531799561863574532269577235248867359540129471422531582252803273
s15= 23048193710430991612223429973919584319583142684899579047442788480062920516020

tra16= 16
priv16= 588090302866226151392183098597432839
pub16x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub16y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P16 = E.point( (pub16x, pub16y) )
nonce16= 271652820180139789982791050661509535
z16= 111216711192296839849306317177760506839459437806441007023037310443366891626158
r16= 67984758008671339216734540590062271433913116408652472599035382233479473005439
s16= 14370502590082180334600698546778188258711194922282023502577881328954547918880

tra17= 17
priv17= 588090302866226151392183098597432839
pub17x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub17y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P17 = E.point( (pub17x, pub17y) )
nonce17= 1017376869826360597789454352276658581
z17= 104038590779082264995673850191243632302133773841022346211357951415137726451398
r17= 5791979966903691468353816276409761504064101080801726302162185352614101018927
s17= 27941469517220524765048316497408296858787587964420420093918000214249042319829

tra18= 18
priv18= 588090302866226151392183098597432839
pub18x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub18y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P18 = E.point( (pub18x, pub18y) )
nonce18= 792954096873420259223560340850761691
z18= 106780641784666692780497486495410805309979867337841102174993764730090111889440
r18= 23982815602848643962465317234732388825586250737108112381600557776701596529851
s18= 37537311801186181443498573228164837653065544918336598065330247543367634448797

tra19= 19
priv19= 588090302866226151392183098597432839
pub19x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub19y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P19 = E.point( (pub19x, pub19y) )
nonce19= 814901432645663590621833876657284281
z19= 90859206207916125760026019897536504608249906085731482047007551304175361806147
r19= 4144055761236894308433054354973116383353535095522729140109106375468032852624
s19= 54941919278788852571336768893886526465969561912794593417234735196495285084722

tra20= 20
priv20= 588090302866226151392183098597432839
pub20x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub20y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P20 = E.point( (pub20x, pub20y) )
nonce20= 44735537560708844705041713505219382
z20= 64959417256411902591577606152863722457914080709211427169313840582829863875130
r20= 35611974072023575386288896899679523853212841681133114414574758573149749160637
s20= 35950050595185386962555151169200980524144117465076255078716021302396886515298

tra21= 21
priv21= 588090302866226151392183098597432839
pub21x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub21y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P21 = E.point( (pub21x, pub21y) )
nonce21= 805013880492499364504882755956063716
z21= 79047973190601942441106582439869055389595076817818424557854650798733804525384
r21= 48196310670701934762096335455279808938171530869100094755122747781023743899438
s21= 10975795214448733112385597857644660594695108503656017328558246751937765325468



Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 04:17:11 PM
He has a script scrypt where he provides r, s, z and nonce and gets the privatekey. So he is doing some basic arithmetics to calculate private key. That's why he begs you to explain how you found the nonce in your script. That's why he asks for the nonce, despite the fact it is just simple math when you know all variables despite the privatekey in the sign formula.

Probably tomorrow he wants to sell his script like you wanted. But in fact it does nothing out of the ordinary.


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 04:18:31 PM
@a.a

Do you know about what Cobras is talking?
My inteligence has been broken by him.:)

This is getting confusing now interiawp? does this script work or has cobras (god help us) got the solution. Let’s work together and fix this


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 04:29:58 PM
@Lostrelic

No, COBRAS has nothing useful. Interiawp is just confused by the sheer uselessness of COBRAS scrypt.


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 04:40:10 PM
@Lostrelic

No, COBRAS has nothing useful. Interiawp is just confused by the sheer uselessness of COBRAS scrypt.

Lol ok thought as much. So is this script working or is useful?


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 04:43:32 PM
It is useless.


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 04:59:39 PM
@a.a

Do you know about what Cobras is talking?
My inteligence has been broken by him.:)

I thought you had a working script can you DM it so I can try?


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 05:36:17 PM
Nonce is secret like in real work Bitcoin transaction. Nonce is secret like privatekey.

Here, you get nonce and privatekey to check your script scrypt.

Quote
tra1= 1
priv1= 588090302866226151392183098597432839
pub1x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub1y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P1 = E.point( (pub1x, pub1y) )
nonce1= 1274456102238835156039403826343590735
z1= 73929703904352475058350820864275902291915805320151624518368899385246760558408
r1= 63714509482263402336656178492951601584073849868841425660138259859054452140558
s1= 53013736228078474636525944637211296477744965436216305227866576670996804630587

tra2= 2
priv2= 588090302866226151392183098597432839
pub2x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub2y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P2 = E.point( (pub2x, pub2y) )
nonce2= 292906967559569298363932189050644194
z2= 108233478877051903823798940619719570785332825645692214801721717411801604696277
r2= 45958667074168573121314703100222827549670170823548031334413476035868111870331
s2= 29153695206416919975320878486345533167500310527614745919053983294858554558896

tra3= 3
priv3= 588090302866226151392183098597432839
pub3x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub3y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P3 = E.point( (pub3x, pub3y) )
nonce3= 404896440056411427984473927600751445
z3= 58526326942309078561281133321243293561487515346592241825349289628739605568876
r3= 44839654320067329161661565903962076155392814429483150286532302568870825973990
s3= 46718785299086618576738536689619659023438472390629480121915923124886220881568

tra4= 4
priv4= 588090302866226151392183098597432839
pub4x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub4y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P4 = E.point( (pub4x, pub4y) )
nonce4= 1190727923990078286382802982956654264
z4= 95115561854367644637457153055405143064983804935658192438007255955749043012908
r4= 41505418859976899200533201136935542320288786635800285645064961512359756816269
s4= 52612301981937995162424719563276949532875115632154177799358581397849871741349

tra5= 5
priv5= 588090302866226151392183098597432839
pub5x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub5y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P5 = E.point( (pub5x, pub5y) )
nonce5= 173436577023448162504401176257185779
z5= 58456200635724995131916399308003107639603462137074452160327139818684689937265
r5= 12497866593045343239347469937246069572213000560006591835021277042649837119711
s5= 21102267501322967987885143626763376244818408170147967471669495321796589630824

tra6= 6
priv6= 588090302866226151392183098597432839
pub6x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub6y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P6 = E.point( (pub6x, pub6y) )
nonce6= 729909891012034095908392147240507852
z6= 74180409098169609866062206285174114626864476710118488056611048472495035105619
r6= 1949414567385081611274479246905808765329354909678641104361791152858170303813
s6= 8587758033000592876780259915028177615744682636507279958768129542635706246192

tra7= 7
priv7= 588090302866226151392183098597432839
pub7x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub7y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P7 = E.point( (pub7x, pub7y) )
nonce7= 271099156041083537295027107205054652
z7= 69375698425381989890989394810508191687331379659303471835391045080063422524188
r7= 62064725708948234495983522795729499401764574985673483351984058161262393797478
s7= 17509254757367888306997871645281140293102980847565221635888775953268882196178

tra8= 8
priv8= 588090302866226151392183098597432839
pub8x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub8y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P8 = E.point( (pub8x, pub8y) )
nonce8= 600201037088861656818524370090242983
z8= 75474183732696400326090600926608076082063156972704861396620386889491743253097
r8= 17386091077742234380198518670081881423575125830044585693730522575233384333963
s8= 32969516986369057030821185571944488935050676430682748662563535685325988735066

tra9= 9
priv9= 588090302866226151392183098597432839
pub9x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub9y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P9 = E.point( (pub9x, pub9y) )
nonce9= 1213778629172821037744995415639524735
z9= 61402247294621782741074236330955883844150467736057368427380915256464554514951
r9= 1571196906772103596298687961342709173157220584675394159388202642033834285065
s9= 14926410880183882168223370725667010935071771092099660904891099723824053828923

tra10= 10
priv10= 588090302866226151392183098597432839
pub10x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub10y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P10 = E.point( (pub10x, pub10y) )
nonce10= 766919105220360968239258432545781899
z10= 60657315648052347295728066561520822984177110063362405955877487754578861007655
r10= 65565325349415964479771990254987537906936671883459886391883794408867410660704
s10= 1665071787100277432433737680883499140991501051140230564853358195415007692904

tra11= 11
priv11= 588090302866226151392183098597432839
pub11x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub11y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P11 = E.point( (pub11x, pub11y) )
nonce11= 361774537759506523754951150749384028
z11= 58813658307872022533566962562642246393162733450520274589344640111457360689936
r11= 71749832366941218041483614344927908305286090824216896229256644685112181596833
s11= 30138406688334377272985508181126740752770547851780040235686487281636454803660

tra12= 12
priv12= 588090302866226151392183098597432839
pub12x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub12y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P12 = E.point( (pub12x, pub12y) )
nonce12= 797865129035644023918228490651121767
z12= 74074443107041749107028034165525383096384092599709431303013899078039224734825
r12= 41786332817613551721485718953235796878323333737260153800161391572427229131095
s12= 36953523142900115134380960311700429085848195016227559531003347518962774118775

tra13= 13
priv13= 588090302866226151392183098597432839
pub13x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub13y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P13 = E.point( (pub13x, pub13y) )
nonce13= 125421011708984214584550854782389751
z13= 102649001081058397658989696916891670599626052640270320849018823207081716624180
r13= 110741461346443936072678121577059212148213203389653105831131674515134059375321
s13= 32679776470242090463653638589153592110721951760331615664714693618344050994420

tra14= 14
priv14= 588090302866226151392183098597432839
pub14x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub14y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P14 = E.point( (pub14x, pub14y) )
nonce14= 738674773956379675922527871744580463
z14= 74887379061750949248557874089789535563209195187929890127382463656334067852493
r14= 70299169799083306181437671762754718711940518284671185624601110483327540698496
s14= 13435344501237159610461418866632937463404857372841563711192446758326828651576

tra15= 15
priv15= 588090302866226151392183098597432839
pub15x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub15y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P15 = E.point( (pub15x, pub15y) )
nonce15= 99602647795812247818859724843091494
z15= 67545964161464250291937164495960033891854714364234053486863202822263372559618
r15= 46188961143719531799561863574532269577235248867359540129471422531582252803273
s15= 23048193710430991612223429973919584319583142684899579047442788480062920516020

tra16= 16
priv16= 588090302866226151392183098597432839
pub16x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub16y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P16 = E.point( (pub16x, pub16y) )
nonce16= 271652820180139789982791050661509535
z16= 111216711192296839849306317177760506839459437806441007023037310443366891626158
r16= 67984758008671339216734540590062271433913116408652472599035382233479473005439
s16= 14370502590082180334600698546778188258711194922282023502577881328954547918880

tra17= 17
priv17= 588090302866226151392183098597432839
pub17x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub17y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P17 = E.point( (pub17x, pub17y) )
nonce17= 1017376869826360597789454352276658581
z17= 104038590779082264995673850191243632302133773841022346211357951415137726451398
r17= 5791979966903691468353816276409761504064101080801726302162185352614101018927
s17= 27941469517220524765048316497408296858787587964420420093918000214249042319829

tra18= 18
priv18= 588090302866226151392183098597432839
pub18x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub18y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P18 = E.point( (pub18x, pub18y) )
nonce18= 792954096873420259223560340850761691
z18= 106780641784666692780497486495410805309979867337841102174993764730090111889440
r18= 23982815602848643962465317234732388825586250737108112381600557776701596529851
s18= 37537311801186181443498573228164837653065544918336598065330247543367634448797

tra19= 19
priv19= 588090302866226151392183098597432839
pub19x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub19y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P19 = E.point( (pub19x, pub19y) )
nonce19= 814901432645663590621833876657284281
z19= 90859206207916125760026019897536504608249906085731482047007551304175361806147
r19= 4144055761236894308433054354973116383353535095522729140109106375468032852624
s19= 54941919278788852571336768893886526465969561912794593417234735196495285084722

tra20= 20
priv20= 588090302866226151392183098597432839
pub20x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub20y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P20 = E.point( (pub20x, pub20y) )
nonce20= 44735537560708844705041713505219382
z20= 64959417256411902591577606152863722457914080709211427169313840582829863875130
r20= 35611974072023575386288896899679523853212841681133114414574758573149749160637
s20= 35950050595185386962555151169200980524144117465076255078716021302396886515298

tra21= 21
priv21= 588090302866226151392183098597432839
pub21x= 17845735651773643982243123331254637206778128605904909384191314659429454665264
pub21y= 38643966743020005741242776935053984389386269398647136717007474683901318293103
P21 = E.point( (pub21x, pub21y) )
nonce21= 805013880492499364504882755956063716
z21= 79047973190601942441106582439869055389595076817818424557854650798733804525384
r21= 48196310670701934762096335455279808938171530869100094755122747781023743899438
s21= 10975795214448733112385597857644660594695108503656017328558246751937765325468


There is a message ? Not understad for you what isa message ? All transactions sogn a messages, you provide detail of transaction, but were is your messages ? And I not need privkeys.You was add print nonce's to your scrypt, add print "message" too ?????


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 05:43:16 PM
Cobras why always 21 transactions?


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 05:45:33 PM
Cobras why always 21 transactions?

I don know about 21, I need only one transaction


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 05:57:32 PM
@a.a

Do you know about what Cobras is talking?
My inteligence has been broken by him.:)

I thought you had a working script can you DM it so I can try?

I do not know what has COBRAS , but be informed he HAS NOT my script.

And all people just only " please give, " , but first please understand -> buy book of algebra , and start from beginning,  leanr yourself, becouse if any who can will give you mathematical magic formula, propably you will not understand why and what to change .
 

Dude I haven’t time to read books I’m good with math can you share the script in DM


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 06:02:18 PM
Signed message -"1"

R,S-

 95781203938134771654748299032707231792956540686382340872008587989453366815619 80727512625679490130821917141198584466211136904971132112411065595033151255463

Nonce - 1050579349868621761136446930980763481

Recovered private key:

792377483100611830733857591710555576

?????????????


Title: Re: Let test my scrypt for find a privkey ?
Post by: _Counselor on October 25, 2021, 06:08:22 PM
yep, for 2 BTC on my address account, if I received, then I will give you. Are we ok?
I'm offering the same script as yours for 1.5 BTC ;D


Title: Re: Let test my scrypt for find a privkey ?
Post by: yoyodapro on October 25, 2021, 06:11:15 PM
I would like to purchase this brilliant scrypt immediately, i need more slaves to feed privets to and this will ensure at least 5 potatoes per privet



Nevermind, I found a better offer. @Counselor please DM me IMMEDIATELY


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 06:14:53 PM
Signed message -"1"

R,S-

 95781203938134771654748299032707231792956540686382340872008587989453366815619 80727512625679490130821917141198584466211136904971132112411065595033151255463

Nonce - 1050579349868621761136446930980763481

Recovered private key:

792377483100611830733857591710555576

?????????????

Stop tradind in this thread ????

Someone can provide example with nonce and message ???

For who provide there good example with nonce and message, I will crack his real example in pm for free. Only not more then 2 person.


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 06:17:05 PM
Counselor
Please answer my PMs!!! Don't sell it to yoyodapro! I pay you immediately.



Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 06:17:11 PM
yep, for 2 BTC on my address account, if I received, then I will give you. Are we ok?

Send a working script and you’ll get a tip but 2 btc? that’s waaaay to much dude 😂


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 06:20:08 PM
I understand now, you thant buy my script, I will think about this .... ;D

There is yours examples ??? I provide for you proof of hack !!!


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 06:21:23 PM
@Cobras
Na... You can keep your shit script for yourself. I want the script from counselor.


Title: Re: Let test my scrypt for find a privkey ?
Post by: _Counselor on October 25, 2021, 06:24:15 PM
Please don't sell to other . I will pay ten time as them , but please not to them! you will ruined me!!!

just PM me now!

@ok we laughed , now time to go sleep now
What are you laughing at?
I have same script as yours - it can recover private from multiple transactions with reduced nonces. And i offer it for 1.5 BTC.


Title: Re: Let test my scrypt for find a privkey ?
Post by: yoyodapro on October 25, 2021, 06:30:51 PM
I will only buy scrypt if guaranteed privets for my server slaves, whoever can guarantee me privets gets 5 shipping containers of potatoes and 1.337 BTC. thats my highest offer



I got the script from Counselor, can someone please provide me a test?


Title: Re: Let test my scrypt for find a privkey ?
Post by: _Counselor on October 25, 2021, 06:35:43 PM
becouse if all nonces from trasactions must be the same "bit", as milions script in google, you know this is not the same.

maybe you are sell this: https://github.com/daedalus/BreakingECDSAwithLLL
You offer script "where nonce and privatekey cannot be more than 240 bit"
My script can recover keys with the same conditions.


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 06:39:47 PM
Here is a challenge for you, yoyodapro

tra1= 1
z1= 106288458063179593712222198918999864257388713037136823178422748780706632826238
r1= 33408902042365984987451038847322594205923736706120695378294680733511094442526
s1= 40235879279648874175028350184807481179851546393730408152572360765904015173744

tra2= 2
z2= 74542036250520122101628631082797986054460647992649410301405543610353584582874
r2= 90474982683142632781755024198101088141049725068703865633163536904516826194931
s2= 4261593714766491599261603396061670169462230565523881393747289259392489750488

tra3= 3
z3= 82506137597089512433585713059043113755481825943350286576269690488205556459929
r3= 55061012436322035957369746341502195224925766337337762521875141452750851385229
s3= 32185410814566453189296921335114965933176803637305878720894812431992330696642

tra4= 4
z4= 113366202975209316618574117507288469103286867562563708771388745274276273327317
r4= 40307619273359990968704385610082519555064446854848752213010360784913070076634
s4= 8869013755199416771438922632611316450375555416356880894694818448239525001985

tra5= 5
z5= 100744224795188828154222144263158767688471282670380072505528761303980558098663
r5= 107510392256243810239461106507293281790817777292726628982951941035577322204940
s5= 5808810814246321940088480775748796507634666874836665148709302077116883497690

tra6= 6
z6= 78871862530463360509484789399671150031213240794904316835298460277660297710392
r6= 35666351779112085793496033725145059574466237291865166066900847470790490531177
s6= 54152646131737601483627855864734754276552039886944543614679032894939930619613

tra7= 7
z7= 61852156823896513348444311902722822264663733311849197723531281479875464155842
r7= 64736182946498808925270095087110525576329199479910467102008128663760091308234
s7= 17788661930671626914900149656499124375490100424543506972136024726882311277073

tra8= 8
z8= 77347191931695325194438902743309121637925409236041479035595596739185146943942
r8= 84516184393310113940336670978279125191652686788651865883276619155760076487860
s8= 54994230425898394004128651710942060049138087545288403818122853157757798875195

tra9= 9
z9= 107757101199858705470790459886962530180763743256223468375789706091080514255896
r9= 18885000308025553648928892892868549659977435805651655748788022411627901349100
s9= 37614339083801813127464099231121651545210507815756210742955693404161681038718

tra10= 10
z10= 114901141250963720789526527669713297768171348939506607402812047565604623805826
r10= 90693858821629123378907616518050111141055283469192355118324772092732639083326
s10= 49281927758371012385011608922932161025500951132405118462787511139664347171904

tra11= 11
z11= 106707797301137802955467179825402606139788667339779710878979194112127338647148
r11= 74655415310274729329777624502379702814718095490353850045637535506241736116679
s11= 10916896223279001643820921465127512063975545949250444149096739432795104319114

tra12= 12
z12= 98410535542578304938120270107473769886182448394972220549832406519494059942344
r12= 4025683086299993064895789060055671174668126580923123848881297666551576517328
s12= 38809812997555367359330784375027440785566427147316008124979836882178320851587

tra13= 13
z13= 97818153454783227426246274031151556616417840081250709985040993804323297029184
r13= 106273227826522337541405271678895077634410087370609165105587934536307430122015
s13= 48640102234404879183639984762008850184017573020005860400420575683830972405223

tra14= 14
z14= 84925455937459150312777485492747694394815218171967411572788118681314015015113
r14= 26500577316285871162533284337802846154067214454381594848949232165650177890795
s14= 33715657707883079451807962423273615367153416204683040089695553052206558355283

tra15= 15
z15= 111783692830672203447054154585386654185884606120065734301852946985480777414901
r15= 73415475542704971810573722979695377168237988176237413522981185496245031667324
s15= 54389973887805475741346387502541397295451457754633008921347861815885030403891

tra16= 16
z16= 88832538451117462300701068734401710417819271851194672863568365802995422719774
r16= 107135774901828918094448208001703177217859876929696537945838325425738793150781
s16= 38089546105401696847382276998576212312564962541980826482807292663032802451090

tra17= 17
z17= 93497933846749502744284331171698967814805635607791522088368289737198240579455
r17= 96136865569810173285194592360338548564757410886996032423879151330012997107357
s17= 38418309682285974076928232326795293948561811927466163334572422767592513907626

tra18= 18
z18= 97450176130132637734960491950490366749975997534440242865075734660135818328817
r18= 82609654650112572560135469013380687346887704939919597283058370534689207998713
s18= 48412029295351053342921734494153963763007135143047368885758735011464042141921

tra19= 19
z19= 64045136013895346084004940406259201614348473359849358051309739648889850716713
r19= 34169578738700194125258600007725306923536832329466150010353374526913224483886
s19= 32318249279416172915907826685461875688275054274005974647936509146543638362104

tra20= 20
z20= 85205785033285727251281297418747739993205389781946342618175328411223243860075
r20= 6654129710426597970301207135656636703213240952679682030191103389095736850788
s20= 54837893280495237877786848567765191371728893421203935165125378553805980661231

tra21= 21
z21= 81250379365445725858749946265066235849286710807418097057400620614259495298662
r21= 83111357487247824535544025311966977202162724682354848059448399017808636155210
s21= 19578574739125835983616802444501972320254858794796379703638395314113879800830


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 06:42:28 PM
Interwiep I can give you 2btc as soon as I get a hit you gotta trust me send the script


Title: Re: Let test my scrypt for find a privkey ?
Post by: yoyodapro on October 25, 2021, 06:42:51 PM
Here is a challenge for you, yoyodapro

tra1= 1
z1= 106288458063179593712222198918999864257388713037136823178422748780706632826238
r1= 33408902042365984987451038847322594205923736706120695378294680733511094442526
s1= 40235879279648874175028350184807481179851546393730408152572360765904015173744

tra2= 2
z2= 74542036250520122101628631082797986054460647992649410301405543610353584582874
r2= 90474982683142632781755024198101088141049725068703865633163536904516826194931
s2= 4261593714766491599261603396061670169462230565523881393747289259392489750488

tra3= 3
z3= 82506137597089512433585713059043113755481825943350286576269690488205556459929
r3= 55061012436322035957369746341502195224925766337337762521875141452750851385229
s3= 32185410814566453189296921335114965933176803637305878720894812431992330696642

tra4= 4
z4= 113366202975209316618574117507288469103286867562563708771388745274276273327317
r4= 40307619273359990968704385610082519555064446854848752213010360784913070076634
s4= 8869013755199416771438922632611316450375555416356880894694818448239525001985

tra5= 5
z5= 100744224795188828154222144263158767688471282670380072505528761303980558098663
r5= 107510392256243810239461106507293281790817777292726628982951941035577322204940
s5= 5808810814246321940088480775748796507634666874836665148709302077116883497690

tra6= 6
z6= 78871862530463360509484789399671150031213240794904316835298460277660297710392
r6= 35666351779112085793496033725145059574466237291865166066900847470790490531177
s6= 54152646131737601483627855864734754276552039886944543614679032894939930619613

tra7= 7
z7= 61852156823896513348444311902722822264663733311849197723531281479875464155842
r7= 64736182946498808925270095087110525576329199479910467102008128663760091308234
s7= 17788661930671626914900149656499124375490100424543506972136024726882311277073

tra8= 8
z8= 77347191931695325194438902743309121637925409236041479035595596739185146943942
r8= 84516184393310113940336670978279125191652686788651865883276619155760076487860
s8= 54994230425898394004128651710942060049138087545288403818122853157757798875195

tra9= 9
z9= 107757101199858705470790459886962530180763743256223468375789706091080514255896
r9= 18885000308025553648928892892868549659977435805651655748788022411627901349100
s9= 37614339083801813127464099231121651545210507815756210742955693404161681038718

tra10= 10
z10= 114901141250963720789526527669713297768171348939506607402812047565604623805826
r10= 90693858821629123378907616518050111141055283469192355118324772092732639083326
s10= 49281927758371012385011608922932161025500951132405118462787511139664347171904

tra11= 11
z11= 106707797301137802955467179825402606139788667339779710878979194112127338647148
r11= 74655415310274729329777624502379702814718095490353850045637535506241736116679
s11= 10916896223279001643820921465127512063975545949250444149096739432795104319114

tra12= 12
z12= 98410535542578304938120270107473769886182448394972220549832406519494059942344
r12= 4025683086299993064895789060055671174668126580923123848881297666551576517328
s12= 38809812997555367359330784375027440785566427147316008124979836882178320851587

tra13= 13
z13= 97818153454783227426246274031151556616417840081250709985040993804323297029184
r13= 106273227826522337541405271678895077634410087370609165105587934536307430122015
s13= 48640102234404879183639984762008850184017573020005860400420575683830972405223

tra14= 14
z14= 84925455937459150312777485492747694394815218171967411572788118681314015015113
r14= 26500577316285871162533284337802846154067214454381594848949232165650177890795
s14= 33715657707883079451807962423273615367153416204683040089695553052206558355283

tra15= 15
z15= 111783692830672203447054154585386654185884606120065734301852946985480777414901
r15= 73415475542704971810573722979695377168237988176237413522981185496245031667324
s15= 54389973887805475741346387502541397295451457754633008921347861815885030403891

tra16= 16
z16= 88832538451117462300701068734401710417819271851194672863568365802995422719774
r16= 107135774901828918094448208001703177217859876929696537945838325425738793150781
s16= 38089546105401696847382276998576212312564962541980826482807292663032802451090

tra17= 17
z17= 93497933846749502744284331171698967814805635607791522088368289737198240579455
r17= 96136865569810173285194592360338548564757410886996032423879151330012997107357
s17= 38418309682285974076928232326795293948561811927466163334572422767592513907626

tra18= 18
z18= 97450176130132637734960491950490366749975997534440242865075734660135818328817
r18= 82609654650112572560135469013380687346887704939919597283058370534689207998713
s18= 48412029295351053342921734494153963763007135143047368885758735011464042141921

tra19= 19
z19= 64045136013895346084004940406259201614348473359849358051309739648889850716713
r19= 34169578738700194125258600007725306923536832329466150010353374526913224483886
s19= 32318249279416172915907826685461875688275054274005974647936509146543638362104

tra20= 20
z20= 85205785033285727251281297418747739993205389781946342618175328411223243860075
r20= 6654129710426597970301207135656636703213240952679682030191103389095736850788
s20= 54837893280495237877786848567765191371728893421203935165125378553805980661231

tra21= 21
z21= 81250379365445725858749946265066235849286710807418097057400620614259495298662
r21= 83111357487247824535544025311966977202162724682354848059448399017808636155210
s21= 19578574739125835983616802444501972320254858794796379703638395314113879800830

is privet  1166921972460950724417640774548057571 ???


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 25, 2021, 06:51:50 PM
Crazy you correctly crack my challenge
How :(


Title: Re: Let test my scrypt for find a privkey ?
Post by: lostrelic on October 25, 2021, 07:00:49 PM
and as you see, no answer...:D

question why? hmm

Teach me the path and you’ll be rewarded with riches my friend


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 07:07:58 PM
and as you see, no answer...:D

question why? hmm


YODA propably bought script which can operate only then we all transactions are the same 2**i bit.

if all nonces are differents -> beetween 2**1 up to 2**240 -> not work?

Again !!! Provide me:

message
R
S
Nonce

I will find privkey. I not need a 10 20 examples, only 1,2



Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 25, 2021, 07:10:22 PM
and as you see, no answer...:D

question why? hmm

Teach me the path and you’ll be rewarded with riches my friend

Hi is not exact understand how it is worked, this is normal sutuation :))))))))))


Title: Re: Let test my scrypt for find a privkey ?
Post by: stilichovandal on October 25, 2021, 08:23:26 PM
so YODA?

any  answer about my taks -> privatekey?

it is 236 bit :)

tra1= 1
pub1x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub1y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P1 = E.point( (pub1x, pub1y) )
z1= 112323818011444308532154156809791512490481409328487377578658798184939273365753
r1= 90937764429714181091518576954784497381123753886576264887848415721161268263325
s1= 32301773972298712856167522581835852952363404020702604124031703051653475276885

tra2= 2
pub2x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub2y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P2 = E.point( (pub2x, pub2y) )
z2= 63411750104378216106268069909600790451706028461203456737824525370631845328318
r2= 86346150910137509609344625691599542535918568842055530411731320679899147085087
s2= 4268945849575439948632718326171397033773861929869244843748630668533369222459

tra3= 3
pub3x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub3y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P3 = E.point( (pub3x, pub3y) )
z3= 79349320560799676563200310034840814874240057254321858269232326144300293024337
r3= 17527396478512552536838095497662531293473312719074902415474332336063038520883
s3= 1671086020812206913314822827788093121970071457555990962314488521750031778348

tra4= 4
pub4x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub4y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P4 = E.point( (pub4x, pub4y) )
z4= 111719407542708627765406496929766523417674769638494346343617935212775064712492
r4= 29924894305911993971700689926582623154606975873466877427514213965666352295789
s4= 21981255311504029252979084394556501113150570806366735255642359545289593453509

tra5= 5
pub5x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub5y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P5 = E.point( (pub5x, pub5y) )
z5= 69076318301948576252908653750751030641098462381295895398198246556556305709667
r5= 35853472164935290410520861945617816820817694765156371040066672386028198756245
s5= 44140947380041473199446770734677178553251520307452000438635125756091954802847

tra6= 6
pub6x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub6y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P6 = E.point( (pub6x, pub6y) )
z6= 87525281104793248555223962753932102474091353245616358894220342137591065648795
r6= 89534910675379598084426240944960884675142967536453203977482074273337524935469
s6= 5350576882548184285107132822746894553839456649519356490152422985208823848543

tra7= 7
pub7x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub7y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P7 = E.point( (pub7x, pub7y) )
z7= 95154703799470404948889839708281614422210985157462320787309126126493711238454
r7= 10775530465875143628733301317249144070875689297140563589176512846977330663836
s7= 1107971449980930012886449289371213158640444298743499432700140060040278154625

tra8= 8
pub8x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub8y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P8 = E.point( (pub8x, pub8y) )
z8= 110297984137336887794534618636891464624414782506677071251915312211039779947200
r8= 102857886285610163920553573747206657882523095308544812605465441040956132906749
s8= 34652899766470849191428673246386046253608995660442342723959267794555071724709

tra9= 9
pub9x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub9y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P9 = E.point( (pub9x, pub9y) )
z9= 101136862093088071135619001641654061024696125299802677020023914291291699874740
r9= 46023516006578146309179116894598082725309041773116316861858192938740182959154
s9= 19891325783813369953760125498837483480602547846597004555509645284209518427843

tra10= 10
pub10x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub10y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P10 = E.point( (pub10x, pub10y) )
z10= 80283304551230692096705107162165636851582354186724160938325034740970194443177
r10= 105686457221516425581405664247289208618482746662391728170105454277713940179807
s10= 47799421689155557861152960464456039875212287576265789366024969637118423238926

tra11= 11
pub11x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub11y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P11 = E.point( (pub11x, pub11y) )
z11= 76140262367232740107525887002986367458233406162495221138952531809352128558978
r11= 45348056768983801149761165185703075512814820550286816087723438606638135265199
s11= 38095791640553240055871336715264903859554980744832998730617923320799279282180

tra12= 12
pub12x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub12y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P12 = E.point( (pub12x, pub12y) )
z12= 60257785799524921311274429022105648366660637649238490144652133000794141844645
r12= 103656988377335599225818665595591545611294317291646647074969142528172991113325
s12= 10525626476774003458944943852994282003423265631210717927939879129516368879782

tra13= 13
pub13x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub13y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P13 = E.point( (pub13x, pub13y) )
z13= 58747953750937722457540535386074118582083718187792382051999147199706267645083
r13= 108563762891357698413857806573341350065561933367103292526880876467583951078221
s13= 777953126996477196917829783802846459733193065817709018291251315733698606670

tra14= 14
pub14x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub14y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P14 = E.point( (pub14x, pub14y) )
z14= 63756554271606490276232988732865881640604490071182994203641010731164236465123
r14= 35412754309711787837106357563296019605036467059184878081814799897633761540746
s14= 17444874267423315657964674752777832930946249718935840056475015046994286231023

tra15= 15
pub15x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub15y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P15 = E.point( (pub15x, pub15y) )
z15= 113624661584996837072531045236663748558335606629088436046554784054141586754165
r15= 78162809131088648799374076511285143187027593517489080668251454937016388028838
s15= 43220564322852749858292804613420793711709437674012790254465429311628515208012

tra16= 16
pub16x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub16y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P16 = E.point( (pub16x, pub16y) )
z16= 109386006454769776063864662037037460004371946202455095215564020072522130152878
r16= 19179491292102179995134524825344517110947416685081306492251802805882050890545
s16= 16719439493629962807287213336882291089819640328067335061156185379217571795163

tra17= 17
pub17x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub17y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P17 = E.point( (pub17x, pub17y) )
z17= 91070825179001828174525622157088306224668730349720431920265232817535187512108
r17= 76433730639038018834830128737808969537623238891870881356776356209041927042512
s17= 6105336249226231674347594641915320835093020836337496757685119957748940354544

tra18= 18
pub18x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub18y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P18 = E.point( (pub18x, pub18y) )
z18= 75755253450858911439222751211157287339974235291969172236999379569161006949422
r18= 76133060109729952153985167080548176544825604633529851409455092529720299251030
s18= 2420254492265318522910249870523612142287763641470314437912963906809420673955

tra19= 19
pub19x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub19y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P19 = E.point( (pub19x, pub19y) )
z19= 72942487766515545431049659873024728592988806404657970872558543560101686934761
r19= 4230009160127237103853402184829164992674977691996442718508498741187537403121
s19= 19756701990927602422191787089714828426196633002602739453061827662943200642981

tra20= 20
pub20x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub20y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P20 = E.point( (pub20x, pub20y) )
z20= 113292041920222707396601933367121838673925519878141449677291973804955653854339
r20= 83714532253348048820318334130415761065486524516862054108229046085289547400313
s20= 21826492645758597883884296843008445677500948799261289333324041943144336807182

tra21= 21
pub21x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub21y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P21 = E.point( (pub21x, pub21y) )
z21= 108484387579126728798913853832786563548436194873079940686190708601623660717214
r21= 53067875014287403230149181012786993834860635760289402736620213913767333654167
s21= 7725847764008568659029968818844964736040544448918001678027635161238194905529

tra22= 22
pub22x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub22y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P22 = E.point( (pub22x, pub22y) )
z22= 80614533734184592814229292370668269317864725988923218554228478216830991980034
r22= 44944229275906746716119169967774680611090983810442473244586848819916268162446
s22= 29326687031461128858219676854906230640622309017213289670253103186261440427722

tra23= 23
pub23x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub23y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P23 = E.point( (pub23x, pub23y) )
z23= 85204499010668241275189171914405140558152901911509187103403110457370568237474
r23= 10108401786393784241009871694432520809686452475290329590541599110891118332950
s23= 25030493248505762691691473402601971394982702380438856813113576966447968187906






why do you tamper with the signature once it's generated?

copy paste of your code.

        if s> half_mod:
            s=curve.n -s
        if s<0:
            s=s%curve.n



Title: Re: Let test my scrypt for find a privkey ?
Post by: ymgve2 on October 26, 2021, 12:11:29 AM
So are you all just using lattices to find private keys like in this paper? https://eprint.iacr.org/2019/023


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 26, 2021, 12:26:35 AM
So are you all just using lattices to find private keys like in this paper? https://eprint.iacr.org/2019/023

https://github.com/bitlogik/lattice-attack

https://github.com/meowmeowxw/lattice-based-attacks

Hi is not know a nonce, if hi will know nonce is not need 100 pubkey examples....


Title: Re: Let test my scrypt for find a privkey ?
Post by: _Counselor on October 26, 2021, 04:58:02 AM
now my is stable up to 252 bit. and yours? Ps. of course you have script, becouse it is math, the problem is with precision , and it depends form kind of algo you will use, sometimes must be somethng changing, but you have not ansered, what kind algo? if you don;t know then you have use one of google scipt.
 my task:)
Did you write something about algorithm in your own script? Why I have to uncover my mathematical poetry?  ;)

But ok, this is not secret - algorithm is well known lattice reduction, as was already mentioned on this forum. It works perfectly with only 4 known bits of nonces (yes, up to 252 bit nonces) and any private key length. I don't know why you also required reduced private keys.

Also I don't understand what a problem you mentioned with different nonce sizes. If all of nonces is beetween 2**1 and 2**240 then it is obviously that we know that at least first 16 bits are zeroes - this is enough for construct the matrices, and other 240 bits do not matter whether there are zeros or not.

https://github.com/bitlogik/lattice-attack

This code is very close to my own.


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 26, 2021, 06:42:06 AM
now my is stable up to 252 bit. and yours? Ps. of course you have script, becouse it is math, the problem is with precision , and it depends form kind of algo you will use, sometimes must be somethng changing, but you have not ansered, what kind algo? if you don;t know then you have use one of google scipt.
 my task:)
Did you write something about algorithm in your own script? Why I have to uncover my mathematical poetry?  ;)

But ok, this is not secret - algorithm is well known lattice reduction, as was already mentioned on this forum. It works perfectly with only 4 known bits of nonces (yes, up to 252 bit nonces) and any private key length. I don't know why you also required reduced private keys.

Also I don't understand what a problem you mentioned with different nonce sizes. If all of nonces is beetween 2**1 and 2**240 then it is obviously that we know that at least first 16 bits are zeroes - this is enough for construct the matrices, and other 240 bits do not matter whether there are zeros or not.

https://github.com/bitlogik/lattice-attack

This code is very close to my own.

Thank you Bro, I already found same codes but not tested(try make simple test in the days). But, I not seen what lattice can find a nonces, I find codes what only for private keys... What is wring in my knolage ?

Thx !



Title: Re: Let test my scrypt for find a privkey ?
Post by: NotATether on October 28, 2021, 04:14:47 PM

Not sure if you thought posting TEX here would actually render it, lol.

But we really need to have some sort of rule in relation to posting large dumps. It becomes very annoying to follow threads when you have to wade through hundreds of lines of points, tx signatures and pubkeys (and all the people mindlessly quoting that stuff does not help).

Like, literally nuking all posts with huge line dumps unless they post it in a pastebin and just post the link to it.


Title: Re: Let test my scrypt for find a privkey ?
Post by: brainless on October 28, 2021, 06:16:49 PM
sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 28, 2021, 08:42:40 PM
sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx
Yes, the show has to go on, show us how you can find some private key for the show to go on? And then many are trying to understand your algorithm, but they did not succeed. Yes, the script selling thread randomly generated several revelations and allowed the show to continue reviving this forum, which spends electricity searching for private keys comparable to the amount of energy spent on mining ...


Title: Re: Let test my scrypt for find a privkey ?
Post by: a.a on October 28, 2021, 09:23:14 PM
Here you give COBRAS just the Parameters  r s z h and nonce and COBRAS gives you Privet.

Its like
a = b + c where he gives you c when you give him a and b. Very hard math.


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 29, 2021, 12:10:32 AM
Here you give COBRAS just the Parameters  r s z h and nonce and COBRAS gives you Privet.

Its like
a = b + c where he gives you c when you give him a and b. Very hard math.

Yeas, if all be good you will be my r,s,z calculator tester Bro )))) and I will pay you 1 privkey for your pubkey for your work. ;D ;D ;D ;D


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on October 29, 2021, 12:17:50 AM
sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx

Show not end, but using shit generated data of r,z,s is a bad idea... Then paste this data to scrypt, only God, can help make scrypt working(I'm serious)...because generated data not on the curve f##k...God is great.


Title: Re: Let test my scrypt for find a privkey ?
Post by: fxsniper on October 29, 2021, 03:17:25 AM

I would like to learning an understand this method  use R S Z value?
What good article document or youtube to can read and learn easy explain about it , please advice?

if I have private key can I calculate R S Z value?
What is formula for calculate R S Z how to calculate none?


Title: Re: Let test my scrypt for find a privkey ?
Post by: brainless on October 30, 2021, 07:13:54 AM

I would like to learning an understand this method  use R S Z value?
What good article document or youtube to can read and learn easy explain about it , please advice?

if I have private key can I calculate R S Z value?
What is formula for calculate R S Z how to calculate none?
study here
https://www.koreascience.or.kr/article/JAKO202011161035971.jsp-kj=SSMHB4&py=2012&vnc=v27n6&sp=588


Title: Re: Let test my scrypt for find a privkey ?
Post by: fxsniper on October 31, 2021, 11:41:58 AM

study here
https://www.koreascience.or.kr/article/JAKO202011161035971.jsp-kj=SSMHB4&py=2012&vnc=v27n6&sp=588

Thank a lot


Title: Re: Let test my scrypt for find a privkey ?
Post by: mausuv on December 21, 2021, 06:30:28 AM
iknow r s1s2  value
i need z1z2 how to calculate
i read this post explain testnet ,i am not understad https://bitcointalk.org/index.php?topic=5327054.msg56686056#msg56686056
https://bitcointalk.org/index.php?topic=977070.msg10669517#msg10669517 #read 1,3page

please explain stepy by step calulate z1z2  from bitcoin mainet or write code #mybadenglish

run this script https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
output : show r s1s2 z1,z2
but i got error what my mistake

https://tbtc.bitaps.com/raw/transaction/ff948290ff332aed8f0e5d767118a02e8671578c6775a333bb4ee4d6ccfcf639
i am enter raw tx i got error https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
Code:
Traceback (most recent call last):
File "RawTX_RSZ.py", line 13, in
s = keyUtils.derSigToHexSig(m[1][:-2])
File "/home/runner/btc-rsz/keyUtils.py", line 32, in derSigToHexSig
x, s = ecdsa.der.remove_integer(s)
File "/usr/local/lib/python2.7/dist-packages/ecdsa/der.py", line 218, in remove_integer
raise UnexpectedDER("Negative integers are not supported")
ecdsa.der.UnexpectedDER: Negative integers are not supported
i know r s1s2
i need z1z2 value please how to get z1z2 #mybadenglish


Title: Re: Let test my scrypt for find a privkey ?
Post by: stanner.austin on December 21, 2021, 08:06:58 AM
@mausuv
Hi
Your raw data for that tx is decoded this ways.
Code:
01000000 //message version
01 //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422 // PROV HASH
01000000 // PROV HASH INDEX
6A4730440220 //SCRIPT LEN 0x6A + SCRIPT DATA 0x47 WITH R,S,X point compressed or full pub key
503434F27F0D5DC23C01A5D2B2B2ABB902E2816987515DAFA619FFDED8FC2EC6 // R
0220
4C30C0B82C9AFD623E140BF2D6BADFA2F02414EF3FFC603E83F2F65A264CE2B8 // S
0121
0355D77643F9BBCCDE7A1F05D8FA72C0B6C53075CDC299753242320EF9C6611233 //PUB KEY X POINT
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 // OUTPUT AMOUNT
1976A914
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000

details of input and output address need for Z
Code:
OUTPUT ADDRESS mxR3WHpKxCjgYvoh5VS72HF2y8HHfhZfKG
6F //TEST NET
B95BFE11C932408AE44DA26872B3C8CD5D61691A //ADDRESS
D05ED3BB //CHECKSUM

INPUT ADDRESS mpPQhMr2CuRn1AQJgCmcMhH8PgrYaKknSa
6F //TEST NET
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //ADDRESS
7A6D71D7 //CHECKSUM

data for Z making for DOUBLE SHA2 (2 time SHA2 used )
Code:
01000000      //message version
01          //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422    // PROV HASH
01000000     // PROV HASH INDEX
1976A914
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //INPUT ADDRESS
88AC
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 //OUTPUT AMOUNT
1976A914 // SCRIPT DATA
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000 //LOCK TIME
01000000 //SHA2

result
C340C9ECE755E54BF99C34386EB8E19BEFD76CB3DDD5B47A4D52BE65FEA05B6D

if you have more then 01 input you have to add more data after first SEQ
if you have more then 01 output you have to add each output in each Z data calculation after first output data.


Title: Re: Let test my scrypt for find a privkey ?
Post by: fxsniper on December 22, 2021, 12:41:55 PM

run this script https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
 

I use same script just copy Bitcoin testnet raw transaction to
I got result

('THE R VALUE is  :', '503434f27f0d5dc23c01a5d2b2b2abb902e2816987515dafa619ffded8fc2ec6')
('THE S VALUE is  :', '4c30c0b82c9afd623e140bf2d6badfa2f02414ef3ffc603e83f2f65a264ce2b8')
('THE Z VALUE is  :', 'c340c9ece755e54bf99c34386eb8e19befd76cb3ddd5b47a4d52be65fea05b6d')
('THE PUBKEY is :', '0355d77643f9bbccde7a1f05d8fa72c0b6c53075cdc299753242320ef9c6611233')


if I know Key how I can calculate and got result same on testnet


Title: Re: Let test my scrypt for find a privkey ?
Post by: mausuv on December 23, 2021, 12:23:11 PM
@all
@stanner.austin
@fxsniper
@Cryptosirr
hi guys ;) solve this math example 9cbdfb599ed0100
problem: how to remove last digit zero,,
i know [:-1] this method use remove the last digit,but i need mathematically steps like + - * /

why i am post this topic  :) mathbehind crack ecdsa ;)

example input:
9cbdfb599ed0100
ce5efdaccf68080
1cbdfb599ed0100
397bf6b33da0200

i need output:
9cbdfb599ed010
ce5efdaccf6808
1cbdfb599ed010
397bf6b33da020
solve the math write here... :Note only last digits remove #mybadandgoodenglish


Title: Re: Let test my scrypt for find a privkey ?
Post by: TheArchaeologist on December 25, 2021, 10:54:00 AM
i know [:-1] this method use remove the last digit,but i need mathematically steps like + - * /

why i am post this topic  :) mathbehind crack ecdsa ;)

example input:
9cbdfb599ed0100
ce5efdaccf68080
1cbdfb599ed0100
397bf6b33da0200

i need output:
9cbdfb599ed010
ce5efdaccf6808
1cbdfb599ed010
397bf6b33da020
solve the math write here... :Note only last digits remove #mybadandgoodenglish
Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.


Title: Re: Let test my scrypt for find a privkey ?
Post by: fxsniper on December 25, 2021, 12:00:09 PM

Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
TheArchaeologist  correct

python
>>> hex(int(0x9cbdfb599ed0100/10))[2:]
'fac99228fe19b0'


mausuv, What is that number?


Title: Re: Let test my scrypt for find a privkey ?
Post by: mausuv on December 26, 2021, 06:16:42 AM

Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
thanks
Code:
mausuv, What is that number?
its reflect hex_number trickee


https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalk.org/index.php?topic=5244940.msg58488513#msg58488513

Code:
Point1 = (x1,y1)
Point2 = (x2,y2)

Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)


i need two point use div Point5 = div(Point1,Point2) #remove Scalar option
i need two point use mul Point6 = mul(Point1,Point2) # remove Scalar option
eny method Point1,Point2 use div and mul get therd point #mybadenglish
read my top 2 link modify please..

its posible remove scalar
Code:
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)


Title: Re: Let test my scrypt for find a privkey ?
Post by: COBRAS on December 26, 2021, 07:43:17 AM

Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
thanks
Code:
mausuv, What is that number?
its reflect hex_number trickee


https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalk.org/index.php?topic=5244940.msg58488513#msg58488513

Code:
Point1 = (x1,y1)
Point2 = (x2,y2)

Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)


i need two point use div Point5 = div(Point1,Point2) #remove Scalar option
i need two point use mul Point6 = mul(Point1,Point2) # remove Scalar option
eny method Point1,Point2 use div and mul get therd point #mybadenglish
read my top 2 link modify please..

its posible remove scalar
Code:
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)

How this communicate with private keys from ooin2 and point 3 ? Try make example with 110 and 90 bit pubkeys and privkeys ?


Title: Re: Let test my scrypt for find a privkey ?
Post by: cixegz on January 04, 2022, 11:58:46 AM
@COBRAS How this communicate with private keys from ooin2 and point 3 ? Try make example with 110 and 90 bit pubkeys and privkeys ?

just my idea please make and modify div(point1,point2),multi(point1point2) python code

https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalk.org/index.php?topic=5244940.msg58488513#msg58488513


Title: Re: Let test my scrypt for find a privkey ?
Post by: brainless on January 07, 2022, 09:44:20 PM
for rsz
maybe helpfull to you
https://github.com/kanhavishva/rsz


Title: Re: Let test my scrypt for find a privkey ?
Post by: walletrecovery on January 18, 2022, 07:32:27 PM
Send a bitcoin transaction message, R,S, nonce and I will try find a privkey.

Probability of success 90 %

???

Good Luck !!

https://youtube.com/watch?v=-UcCMjQab4w
You can't take advantage of the bug. You're 5 or more years late. No program will help you, you will only spend money and get nothing in return.


Title: Re: Let test my scrypt for find a privkey ?
Post by: PrivatePerson on August 26, 2022, 08:47:16 AM
https://github.com/bitlogik/lattice-attack
How do you prepare the list to be loaded into this script?


Title: Re: Let test my scrypt for find a privkey ?
Post by: fxsniper on August 26, 2022, 12:11:32 PM
https://github.com/bitlogik/lattice-attack
How do you prepare the list to be loaded into this script?

gen_data.py is make data for use it

run script  gen_data.py
then you got file data.json
and run  lattice_attack.py

or

run script  gen_data.py -f filename
then you got the file filename.json
and run  lattice_attack.py -f filename

I test already if not have a leak nonce it not works
test with a fake nonce leak (random) it never works