Bitcoin Forum
May 26, 2024, 08:40:40 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 [3] 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 »
41  Bitcoin / Development & Technical Discussion / Re: Bitcoin Core wallet.dat file containing 3.5 BTC + Password Hint on: May 18, 2022, 11:58:58 AM
This possible scam wallet.dat  That file, is works but struck with a password, right?

Why owner file did not try to crack the password themself?
42  Bitcoin / Development & Technical Discussion / Re: first bitcoin collision? on: May 18, 2022, 11:55:02 AM
any explain what and why it is work? , and any attack?

What collision did you mean?

43  Bitcoin / Development & Technical Discussion / Re: Half of any bitcoin (crypto) public key - (public key half) on: May 15, 2022, 07:53:32 AM
How can we can fine half like this?


2**120
1329227995784915872903807060280344576

private key = 1329227995784915872903807060280344576

1329227995784915872903807060280344576 hex = 1000000000000000000000000000000

binary = 1000000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000000000000000000000000000000

Half binary first (60) = 100000000000000000000000000000000000000000000000000000000000

(hex) 800000000000000  = (dec) 576460752303423488

half of 1329227995784915872903807060280344576 is 576460752303423488

44  Bitcoin / Development & Technical Discussion / Re: 2^96 same bitcoin address on: May 15, 2022, 07:45:56 AM
2^96 same bitcoin address

What is OP mean?

Did I understand correctly?

private key 2**256  (256 bit) will behave  2**96 address duplicate address
 order = 115792089237316195423570985008687907852837564279074904382605163141518161494337

but address = can have 2**160 = 1461501637330902918203684832716283019655932542976
some private key will get the same address?
45  Bitcoin / Development & Technical Discussion / Re: Half of any bitcoin (crypto) public key - (public key half) on: May 15, 2022, 03:15:00 AM

What meaning is Half of any bitcoin?
Do you mean half of the public key right?
or
Did you mean half of the scalar to the private key right? or what?
46  Bitcoin / Project Development / Re: Keyhunt - development requests - bug reports on: May 15, 2022, 02:24:40 AM
Thank you albert0bsd
I will try to read and make understand

Did BSGS have code in python so I can read the code and run a test it to make understand?
47  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: May 14, 2022, 11:38:41 AM
Why do all programs/tools about bitcoin all-time download chrome browser warning to download and recommend deleting a file?
What algorithms or some code makes the browser check it and think can be harm the computer.
it happens with tools download from Github and open source code, bitcrack, kangaroo all get warning all-time download it.
48  Bitcoin / Project Development / Re: Keyhunt - development requests - bug reports on: May 13, 2022, 01:14:01 PM
Please guys stay on keyhunt topic, avoid any comment of those fake wifs

Hi, albert0bsd

I would like to understand BSGS, Can you help to explain some methods? (I can study in detail more)
I understand kangaroos (a little some part) and understand some entropy or scalar for the Elliptic curve convert private key to public key
a lot of bitcoin and cryptography I do not yet understand clear
49  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: May 11, 2022, 08:06:25 AM
@fxsniper
Hello
You won't notice much speed difference on this case.
Only thing pubkey bruteforce fastest is BSGS, because it's come after only 1 step(value*G). no need double SHA2,RIPEMD160,BASE8
address or RIPEMD160 won't make much noticeable difference in bruteforce.


OK, I just think simple maybe calculate SHA-256 and RIPEMD160 it is maybe fast that Elliptic curve point calculate
I think with 1 step(value*G). it is calculated 256 times (loop) for each bit  maybe make full key brute-force slow
50  Bitcoin / Development & Technical Discussion / Re: How to get in Python, result same in cpp ? on: May 11, 2022, 07:54:20 AM
I think modmath.c it is not a division number by simple math
but modmath.c it is division by use function Elliptic curve  point division


Code:
		case '/':
mpz_invert(inversemultiplier,B,EC.n);
mpz_mul(C,A,inversemultiplier);
mpz_mod(C,C,EC.n);

Code:
def ECdiv(Qx,Qy,Scalar): # EC point division
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py

try to use Elliptic curve  point division function on python
I am not sure I am correct, wait programmer/expert coder to help confirm
51  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: May 11, 2022, 07:38:06 AM

There are already 2 Tools out there which can do exactly the same.

1. https://github.com/albertobsd/keyhunt in the pub2rmd mode. This is for CPU.
Code:
./keyhunt -m pub2rmd

2. https://github.com/kanhavishva/PubHunt This is for GPU

thank iceland2k14
I will try keyhunt
52  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: May 11, 2022, 07:36:48 AM

The problem is that in this way it is impossible to set the range for generation. It's like pointing your finger at the sky to find the one star you need out of billions.

thank you sssergy2705

right, it is very hard to find with 256-bit number

53  Bitcoin / Project Development / Re: Keyhunt - development requests - bug reports on: May 11, 2022, 06:35:45 AM
I think all tools should be open-source code for transparent
it is dangerous to use tools not show code may use GPU for calculating some hidden when using it

for user
use all tools should block internet access on that tools before using or unplug wifi and use it offline


54  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: May 11, 2022, 02:59:27 AM

You want a program to randomly create a public key and then search for it's corresponding H160?

Yes, please
maybe puzzle 64-100 without pubkey can be useful to solve

free stye to code as you want or easy to code (with GPU)

problem with full calculate like bitcrack it is calculated puzzle#64 from first bit to bit 64  (or any bit 356) it uses to may loop over 200 to calculate double and add multiply, made it slow to brute-forcing

maybe someone can use this too found it (dot point trillion one percent possible)

my idea try to calculate sort can possible
1. random X
2. calculate Y from X
3. hash SHA-256
4. hash RIPEMD-160
5. check the match search

I am not sure I write step correct or not

With GPU calculate How many pubkey scans can do per minute?

option may be up to you code begins with easy first for open testing and then modify to option later
option
1. absolute random
2. random in the range
3. run number X (+1 next like bitcrack)

for check match RIPEMD-160 search
1. full match with "3EE4133D991F52FDF6A25C9834E0745AC74248A4"
2. vanity math like  "3EE4133D991F5"   (from 3EE4133D991F52FDF6A25C9834E0745AC74248A4)


55  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: May 10, 2022, 03:01:11 PM
Can any body help to create tools brute-forcing by using GPU NVidia from random Public ECDSA Key to RIPEMD-160 Hash and vanity search
RIPEMD-160 Hash
just test random idea to brute-forcing puzzle 64 and use kangaroo solve it ( I know it is not work, but would be test to know it sure to not work)


56  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: May 08, 2022, 04:11:46 PM

Someone try making sach scrypt ? Share code pls ?

Br

What is sach scrypt ?

Did you mean search script or  scrypt hash algorithms ?
57  Bitcoin / Development & Technical Discussion / Re: lattice-attack || how to run without error on: April 26, 2022, 01:11:49 PM

@fxsniper
lattice attacks script leak 6 bit when use gen_data.py but you can use 4 bit too its minimum and 100 r,s,z, leak data need else this attack will not work.
Still, there is no way to leak or know 4 bit even for generated or original signed R.


Thank you I try 4 bit already, I use by command
python gen_data.py -f data1.json -m "HelloYou" -c SECP256R1 -b 4 -t MSB -n 50
python gen_data.py -f data1.json -m "HelloYou" -c SECP256R1 -b 4 -t LSB -n 50

I found some key lattice-attack can not be found the key. lattice-attack can not be found 100%

I think lattice-attack is not worked for solve puzzle

We are just users of lattice, just users use it
if lattice-attack it works I think many mathematics use it for

however, if using lattice-attack should be doing like use Kangaroo solve ECDSA need developer code and apply it a new one

I believe all methods on the internet that publish still can not use for solve puzzle #120
A better method is used generate a key to sample and create new one algorithm that can find key

58  Bitcoin / Development & Technical Discussion / Re: lattice-attack || how to run without error on: April 25, 2022, 03:11:51 AM
I try to test with private key 120-bit script can fine 120-bit key (just modify the script random number from curve 256bit to random 120 bit)

if like to test with puzzle 120 how to implement to hash (z)

in the sample, file generate data.json have only R and S  and 8bit leak nonce
What is the data message at the end file on data.json

it is just for testing (possible not works)
59  Bitcoin / Development & Technical Discussion / Re: lattice-attack || how to run without error on: April 23, 2022, 09:10:52 AM

this script it is the same of lattice-attack or not
https://asecuritysite.com/signatures/ecd
I see it is using LLL and reduction same
from sample how can expand the matrix to very large enough can search number
sorry I do not yet understand clear in math of lattice algorithms
60  Bitcoin / Development & Technical Discussion / Re: lattice-attack || how to run without error on: April 23, 2022, 05:43:53 AM

I try to learn and understand math
Did I understand correctly?
this script method use leak nonce that generates to recover private key right?
script it not use way collect data from all data from signature with?
this lattice-attack use only one signature with leak 8-bit leak nonce to calculate correctly?
just loop search from 1000 signature until found one can calculate
Pages: « 1 2 [3] 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!