Bitcoin Forum
May 23, 2024, 03:39:26 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 [19] 20 21 22 23 24 25 »
361  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: March 19, 2021, 04:46:35 AM

I am interesting to run this code

someone know about code python language

please help to fix it

I try to fix it but not yet success

code old 2 year, now library keras is update to new version some function call it not working


https://bitcointalk.org/index.php?topic=5075651.0

https://github.com/btc-room101/bitcoin-rnn

362  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 19, 2021, 02:29:04 AM

option -d
distinguished point (DP) method
That mean DP method is long size between 2 leg right
on image
https://raw.githubusercontent.com/JeanLucPons/Kangaroo/master/DOC/paths.jpg
I am understand correct?
if use high distinguished point how long kangaroo jump to collision hit
how can make it work with low resource, I try full range it use a lot of storage save work may be make it slow
now I think may be not save work for can possible help work too fast than

363  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 19, 2021, 02:20:28 AM

I testing kangaroo with full address and start kespace point from private key 1099511627776 (meddle) very fast to found in 1 minute or 2

now I try to split scan for fast, last time use full range is very log and not see any update

may be try split each 2099511627776

I try to made small simple utilities to remember my random save on text file
random start point and make each 2099511627776 and scan

I think kangaroo jump by next and next side not jump dynamic move to around all

int(2**120/2*40) = 26584559915698317458076141205606891520 (slot) time to scan (OMG.)

random count slot first and multiply to start point and remember number used

hope random found by fast

what possibility between use large range  800000000000000000000000000000...ffffffffffffffffffffffffffffff
and split range

if choose split what rage size that performance

2**120 = 1329227995784915872903807060280344576

1329227995784915872903807060280344576/10000 time = size 132922799578491593660272018980864  (2*107)
or
1329227995784915872903807060280344576/1000000000000000 = size 1329227995784915976192  (2**70)
364  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 18, 2021, 03:10:46 AM

Code:
#120 ( 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT )
800000000000000000000000000000
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
02CEB6CBBCDBDF5EF7150682150F4CE2C6F4807B349827DCDBDD1F2EFA885A2630
 

puzzle # 120
very long time

yesterday from now 1 night 2 kangaroo write save work file to 1GB and 4GB
now I close for works
365  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 18, 2021, 03:06:48 AM
Quick someone give me sample start and end range with public keys, I think my 256-bit extension mod is done but I need to test it.

for testing right
40 bit far from private key very fast to found easy


40bit
23D4A09295BE678B21A5F1DCEAE1F634A69C1B41775F680EBF8164266471401B
23D4A09295BE678B21A5F1DCEAE1F634A69C1B41775F680EBF8166266471401B
03CA5606A1E820E7A2F6BB3AB090E8ADE7B04A7E0B5909A68DDA2744AE3B8ECBFA

40bit
B09C765FA3DC6AD138A8D0DA17CD94306FBC32ACB3D67BC093936761CCC48769
B09C765FA3DC6AD138A8D0DA17CD94306FBC32ACB3D67BC093936961CCC48769
0294FF933DA0498859959225ED6A50D709A4D9C678705D72E9202A4852C8084D85

40bit
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77D4C2A2ED0C99C1232
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77D4C2A30D0C99C1232
03E87E83F871DF1439B7873B4AE449D15306CAFC53E03A06FFFB534B3BF25B58D8


64bit
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77E4C2A2FD0C99C1232
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77C4C2A2FD0C99C1232
03E87E83F871DF1439B7873B4AE449D15306CAFC53E03A06FFFB534B3BF25B58D8

Those three 40-bit inputs found the private key successfully.

The 64-bit input took too much time I need to run it on my GPU rig to see if it's functioning.

Can you post a link here to the list of puzzle transactions for easy reference? I remember it was pasted in some other thread but it's easier for me to check it here on this one.

Specifically I want to test this with #125 and #160 to make sure my 256-bit handling is working. (My hashtable index tweak is working great!  Smiley)


Code:
Key# 0 [1S]Pub:  0x03E87E83F871DF1439B7873B4AE449D15306CAFC53E03A06FFFB534B3BF25B58D8 
       Priv: 0x6B29781E725708AE4D94E13730A2718EE3383EA5D911E77D4C2A2FD0C99C1232

64 bit is found in 2 minite

sorry for use wrong number

for testing  (fast found)

private key is  =  48470744558466837119591892246032931505798916835461120051988009871155176149554
and I start before
64 bit mean 2**64 = 18446744073709551616

start = 48470744558466837119591892246032931505798916835461120051988009871155176149554-18446744073709551616
end = 48470744558466837119591892246032931505798916835461120051988009871155176149554+18446744073709551616

6B29781E725708AE4D94E13730A2718EE3383EA5D911E77E4C2A2FD0C99C1232
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77C4C2A2FD0C99C1232

just for fast testing  (found on two minute)

I found some time use time long 1 hour or not found

Can possible make kangaroo print out found private key in case use output file 
because when use output file is no show found key
some time test and kangaroo finish not tell anything but output found key is on file by command success
366  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 04:08:47 PM
I don't know in deep kangaroo calculate detail

Can possible to modify kangaroo to check other pubkey on same time

just idea may be bad idea

example idea

this puzzle no pubkey

puzzle #64  16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN  

range 8000000000000000...ffffffffffffffff    

I generate new key at half rank ==>  13835058055282163712 ==> 1WVexgJWbaLrofcfiqmXV7cnFPe4d48HM

private key =  13835058055282163712
private key =  c000000000000000

address = 1WVexgJWbaLrofcfiqmXV7cnFPe4d48HM

public point = Point(x=76895494048501386530536845738594915998342512697431860874178479107741250519061, y=28002895446557343371230027632087293194112828313723400109596985663614324113519)

publick key = 03aa014eaad936de6f681fac61a05b6aa64673f853eedc99cc39a37e63ec288015
uncompressed = 04aa014eaad936de6f681fac61a05b6aa64673f853eedc99cc39a37e63ec2880153de913c04636b e9ac3f2a7e43f7b0f63ef4b9b0743cecad9df814e6646c1006f

1. check address function
use pubkey search by kangaroo method and same time convert index point to address and check to 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN

note: add more function more calculate may be make kangaroo slow than normal work 50%

How kangaroo control random private key to move scope to close up private key target?
just random all and check is on range in formula need or kangaroo have formula use for multiply for calculate cover on range want to random
367  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 03:16:25 PM

I had all of that outlined in BSGS...I've already ran over 20k ranges. But to answer your question, whatever you are willing to wait on. If you need your computer to do other tasks every hour or two or three, then pick a range that your CPU/GPU can run under that time frame or else you will have to stop the process when and restart it if you need your PC before the range is checked.

I would like to use time 1 hour each round, when not use laptop work or max 5 hour open all night 
I not have laptop or PC for running all days 24 x 7 just use on free time of works
368  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 09:43:24 AM

address/public key ==> brainless ==>  private key

Don't say like that

it is no right no wrong

this is challenge not any brainless

Reverse I think is great to make people think hard and fine the way smarter

many smart people still do same  but they not say loud until success
PhD, Hacker, Research, Bug Bounty Program, Security, AI. research, Quantum, and more , fake satohi

still can possible because can calculate how long time need to solve success million years, world still nonstop running may be future bitcoin may be a toy for kiddy garden for calculate in future you next life million year

human do a lot crazy thing every days

while pandemic is not brainless
369  Bitcoin / Bitcoin Technical Support / Re: How to retrieve uncompressed public key? on: March 17, 2021, 07:41:08 AM
Hello Everyone,
I am trying to recover my old wallet from my desktop (wallet.dat), i will be trying few tools (keyhunt and Kangaraoo), such tools require uncompressed public key. i can retrieve mkey and other ckeys but not Uncompuressed Public key? is there a way or tool to do it?

Thanks.

if you have wallet.dat

use pywallet

https://bitcointalk.org/index.php?topic=34028.0

https://github.com/jackjack-jj/pywallet
370  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 06:57:35 AM

Can possible brute force public key hash to public key?
Its is double hashed (sha256 and ripemd160), so that is impossible in practice, even if an algorithm for finding collisions in one of the hashes will be invented.

Thank

I think for address not show public key (full) use bitcrack brute force directly may be easy than

address => bitcrack ==> private key

public key ==> Pollard-kangaroo ==>  private key

public key hash ==> public key ==> Pollard-kangaroo ==>  private key

problem bitcrack don't know scope of keyspace
if can possible get public key hash to public key may be can use kangaroo other option fine more use bitcrack

random public key => ripemd160 => public key
371  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 05:45:33 AM

In this case:

Code:
Index
1
Details
Unspent
Address
1GmKKaFEP4omAA9uKh1zoRCAb7caJB863k
Value
0.40001014 BTC
Pkscript
OP_DUP
OP_HASH160
aceb7b66651b4ba5d371223582efdc39968402c5
OP_EQUALVERIFY
OP_CHECKSIG

In this case your public key is aceb7b66651b4ba5d371223582efdc39968402c5.

Can possible brute force public key hash to public key?
372  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 05:12:38 AM
my scan yesterday

SaveWork: save.work..............................done [300.4 MB] [05s] Wed Mar 17 09:03:32 2021
[0.14 MK/s][GPU 0.13 MK/s][Count 2^29.30][Dead 8862934][26:01 (Avg 00s)][270.7/346.2MB]

What mean Dead 8862934 ?
Without seeing your start command I would guess you were searching a very small small range with a very low dp where a key did not exist.
The signals are the very low GOU speed, the low count, and the high dead kangaroos.  The dead kangaroos mean that either tames were colliding with tames, wilds colliding with wilds, or probably both.

Thank you

I try to split large keyspace to small size and scan and random keyspace 

may be key space too small 100,000,000,000

now I use 2**56 = 72057594037927936

What recommend minimum for 2**120 =1329227995784915872903807060280344576 ?

2**32 = 4294967296
2**36 = 68719476736
2**40 = 1099511627776
2**50 = 1125899906842624
2**56 = 72057594037927936
2**64 = 18446744073709551616
2**72 = 4722366482869645213696
2**80 = 1208925819614629174706176
2**120 =1329227995784915872903807060280344576

2**120 and 2**160 is too high
373  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 02:17:31 AM
Quick someone give me sample start and end range with public keys, I think my 256-bit extension mod is done but I need to test it.

for testing right
40 bit far from private key very fast to found easy


40bit
23D4A09295BE678B21A5F1DCEAE1F634A69C1B41775F680EBF8164266471401B
23D4A09295BE678B21A5F1DCEAE1F634A69C1B41775F680EBF8166266471401B
03CA5606A1E820E7A2F6BB3AB090E8ADE7B04A7E0B5909A68DDA2744AE3B8ECBFA

40bit
B09C765FA3DC6AD138A8D0DA17CD94306FBC32ACB3D67BC093936761CCC48769
B09C765FA3DC6AD138A8D0DA17CD94306FBC32ACB3D67BC093936961CCC48769
0294FF933DA0498859959225ED6A50D709A4D9C678705D72E9202A4852C8084D85

40bit
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77D4C2A2ED0C99C1232
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77D4C2A30D0C99C1232
03E87E83F871DF1439B7873B4AE449D15306CAFC53E03A06FFFB534B3BF25B58D8


64bit
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77E4C2A2FD0C99C1232
6B29781E725708AE4D94E13730A2718EE3383EA5D911E77C4C2A2FD0C99C1232
03E87E83F871DF1439B7873B4AE449D15306CAFC53E03A06FFFB534B3BF25B58D8

374  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 02:05:25 AM
my scan yesterday

SaveWork: save.work..............................done [300.4 MB] [05s] Wed Mar 17 09:03:32 2021
[0.14 MK/s][GPU 0.13 MK/s][Count 2^29.30][Dead 8862934][26:01 (Avg 00s)][270.7/346.2MB]

What mean Dead 8862934 ?
375  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: March 17, 2021, 01:12:35 AM
I know the specific range, but I don't know my public key, as no money was sent from my wallet address. Therefore, I cannot use the kangaroo software. If possible, my request from you; I want you to add the RIPEMD-160 focused option. You may be short on time or you may wish not to. I would like to know if this is possible. So can I run the software focused on RIPEMD-160?

If any transaction has been made to the address then it's public key will be exposed on the blockchain and you can inspect it's value inside the public script using a block explorer.

If not, which is the case here, then it means that you're trying to solve an address with no bitcoins inside (a purely academic problem) and you need to use BitCrack instead, which does work with RIPEMD160.

I have a coin in my address. No coins were sent to anyone from this address. My public key was not published by the blockchain because it was not sent.

My public address was not published by the blockchain because no coins were sent to another address.

For example ; https://www.blockchain.com/btc/address/1GmKKaFEP4omAA9uKh1zoRCAb7caJB863k

I am sorry for my English.

what do you want to do?

if you want to testing this software with you own bitcoin no transaction
yes, you can do it if you know private key , you own bitcoin you have private key and check you pub key like this website

https://learnmeabitcoin.com/technical/public-key
put you privatekey will show public key


how to show public key
A. have  private key

A.1
bitcoin core use command
listaddressgroupings or  validateaddress

A.2
Electrum
click right show DETAIL  (show public key)

A.3 online tools more
https://learnmeabitcoin.com/technical/public-key
https://brainwalletx.github.io/
https://iancoleman.io/bitcoin-key-compression/
(search google)

A.4
other wallet client have option show public key on you own

B. no privatekey
check in transaction search
https://www.blockchain.com/explorer?utm_campaign=expnav_explorer


example case

1. bitcoin address you generate and have privatekey  blank bitcoin address
just use private key check publickey
can use this software test scan
try
https://www.bitaddress.org/

2. you own bitcoin have money , you have private key
can use this software test scan

3. you own bitcoin have transaction send money someone and still have balance  (public key explode)
other people can scan you bitcoin
can use this software test scan

4. Some bitcoin on found address have balance have money on bitcoin but not have transaction public key not yet show
you can not use this software because no pubkey to search no pubkey to reference this case you need to use bitcrack to scan it
can not use
check bitcrack

5. many bitcoin on internet have both balance  and transaction still have money  (public key explode)
can use this software test scan

6. used bitcoin on internet have transaction and zero balance (public key explode)
yes, you can use it
can use this software test scan
376  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: March 17, 2021, 12:42:59 AM
Can anyone help to fix about random function can not using large number
problem  random.Next not work with 9223372036854775808 to 18446744073709551616

random.Next(9223372036854775808, 18446744073709551616)

Code:
UInt64 Base = 0x7FFFFFFFFFFFFFFF;
           
var random = new Random();

UInt64 high32Rnd = (UInt64)random.Next();
UInt64 low32Rnd = (UInt64)random.Next();

UInt64 rnd64 = (high32Rnd << 32) | low32Rnd;
rnd64 >>= 1;
rnd64 += Base;

Console.WriteLine(rnd64);

Thank you A-Bolt

I will try use this code

and if for puzzle #120
664613997892457936451903530140172287             
1329227995784915872903807060280344575           

and puzzle #160
730750818665451459101842416358141509827966271232
1461501637330902918203684832716283019655932542464

how to apply use same code?
377  Bitcoin / Wallet software / Re: Baby steps please i need help on: March 16, 2021, 10:51:52 AM
I use electrum, I don't know how to use multibit 

try export private key from multibit  and import it to electrum and sync on electrum

sync is read history of you bitcoin transaction and save in new client

no need to waiting on multibit , just move and use at electrum
378  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: March 16, 2021, 07:47:04 AM
I try create small utility myself using C# copy sample code to

Can anyone help to fix about random function can not using large number
problem  random.Next not work with 9223372036854775808 to 18446744073709551616

random.Next(9223372036854775808, 18446744073709551616)

I would like to keep it to use and modify to use with kangaroo by re-write in.txt file automatic before run next kangaroo and modify for BSGS too

Console App (.NETFramework)

Program.cs
Code:
using System;
using System.Diagnostics;
using System.ComponentModel;
using System.IO;

namespace MyProcessSample
{
    class MyProcess
    {
        public static void Main()
        {
            try
            {
                using (Process myProcess = new Process())
                {
                    for (int i = 1; i <= 10000000; i++)
                    {
                        //myProcess.StartInfo.UseShellExecute = false;
                        myProcess.StartInfo.UseShellExecute = true;
                        string filepath = '"' + Directory.GetCurrentDirectory() + "\\clBitCrack.exe" + '"';
                        Console.WriteLine("The current directory is {0}", filepath);
                        myProcess.StartInfo.FileName = filepath;

                        var random = new Random();
                        int start = random.Next(92368, 18446370);
                        //int stop = random.Next(9223372036854775808, 18446744073709551616)
                        //long start = random.Next(9223372036854775808, 18446744073709551616);
                        //int step = 10000000;
                        //int stop = start + step;
                        myProcess.StartInfo.Arguments = " -c -u -o out.txt --keyspace " + start + ":+10000000 -i in.txt";
                        myProcess.StartInfo.CreateNoWindow = true;
                        Console.WriteLine(DateTime.Now.ToString("yyyy-MM-ddTHH:mm:ss.ffffffK"));
                        myProcess.Start();
                        myProcess.WaitForExit();
                        if (i == 10000000)
                            {
                                break;
                            }

                     }
                        Console.WriteLine("Press any key to exit.");
                        Console.ReadLine();
                        //Console.ReadKey();
                }
            }
            catch (Exception e)
            {
                Console.WriteLine(e.Message);
            }
        }
    }
}
379  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: March 16, 2021, 07:36:08 AM

Already exists...I'll go look for it for you
Works just like pool, but you can run it on your own PC/network. Works great
https://github.com/Etayson/BC_server-client

If that is not what you are looking for, look in thread, I posted a python script or look at the BSGS thread and use that script as example
 

Thank you WanderingPhilospher

I will try BC_server-client
380  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: March 16, 2021, 05:26:52 AM
help, can anybody help to code powershell script for random and run clBitCrack.exe

batch file work fine but limited about random command
powershell script may be work better, I try code but still error


batch file script
Code:
@echo on
:loop
echo  %date%-%time%
clBitCrack.exe -c -u -o out256-000.txt --keyspace %random%%random%%random%%random%:+10000000 -i in256-000.txt
echo  %date%-%time%
goto loop



powershell script (error)
Code:
Get-Date
DO{
"Starting Loop $a"
$a
$a++
$x = Get-Random -Minimum 20000000000000 -Maximum 1999999999999999
Start-Process "C:\bitcoin\clBitCrack.exe -c -u -o out.txt --keyspace $x:+10000000 -i in.txt"
} Until ($a -le 5)
Get-Date


actually I would like to create small utility but I can not code C++
may be look like ttdclient.exe from pool 64 bit
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 [19] 20 21 22 23 24 25 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!