Bitcoin Forum
May 04, 2024, 03:48:28 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1] 2 »
1  Bitcoin / Development & Technical Discussion / Re: Faster computations on secp160k1 than lambda and beta, because of gcd(p-1,n-1) on: April 28, 2024, 12:07:31 PM
When we have secp256k1, then gcd between "p-1" and "n-1" is equal to 6. It means, that using lambda and beta is all we can do, because other factors are different, so it is hard to map private and public keys. However, when it comes to secp160k1, it seems to be different:
Code:
p=0xfffffffffffffffffffffffffffffffeffffac73
n=0x0100000000000000000001b8fa16dfab9aca16b6b3
print(factor(p-1))
print(factor(n-1))
print(gcd(p-1,n-1))
This is the output:
Code:
2 * 3 * 5 * 7 * 113 * 61588775277324185343602394973294691093621473
2 * 3 * 5 * 8837 * 42918291593381467397 * 128449012680369359431471
30
Which means, that if the greatest common divisor is equal to 30, instead of 6, then it should be possible to get a better speedup, than by using lambda and beta alone. If so, then how this "efficiently computable endomorphism" looks like for secp160k1? Because using lambda and beta from secp256k1, and changing constants into secp160k1 will obviously give some results, but if the divisor is 30 instead, then I guess those equations are different, and it is possible to create a faster implementation. Am I right? Do you know, how to get those equations, where gcd is bigger than 6?

That's a great find.  How does working with secp160k1 help secp256k1? Is there a way to map one to the other?

Below are the endomorphism values for P and N; I am trying to figure out how to get the equations.
p=0xfffffffffffffffffffffffffffffffeffffac73
[1, 116413238536967823204912062004448726737640720821, 1192671444047713143517039375510234845319976240753, 320568492332623811159581411922637138849485810267, 170033768725603827466154123598115574507330393474, 888563150828732192317477979643480826024658399499, 459808123412383666504375194171595673260619233000, 506013106973151716048837162345055484894245883380, 756739066376840291689464290814729327749587999038, 914082931336101346080276401800062193637040619652, 888563150828732192317477979643480826024658399498, 343394884875415843299463132167146946522978512179, 774843300256341490735482619551103659225907196918, 436170574044216480529882878892092188900102188771, 744049162610497518614122278201946619129710226178, 1461501637330902918203684832716283019651637554290, 1345088398793935094998772770711834292913996833470, 268830193283189774686645457206048174331661313538, 1140933144998279107044103420793645880802151744024, 1291467868605299090737530709118167445144307160817, 572938486502170725886206853072802193626979154792, 1001693513918519251699309638544687346391018321291, 955488530357751202154847670371227534757391670911, 704762570954062626514220541901553691902049555253, 547418705994801572123408430916220826014596934639, 572938486502170725886206853072802193626979154793, 1118106752455487074904221700549136073128659042112, 686658337074561427468202213165179360425730357373, 1025331063286686437673801953824190830751535365520, 717452474720405399589562554514336400521927328113]


0x0100000000000000000001b8fa16dfab9aca16b6b3
[1, 1408470634914903571732066888580417336645162873119, 708713767398721337809629107989760271137717787930, 1151796019543683584915212041505571206301361534252, 41278637720562416563498774273562198366106105008, 69796346552658733766475001267285041190029755381, 459366475837133574597979692431231491490457423387, 719990520318696333937754171078776164365241746857, 595911485914207747779051672558094670244251938235, 780348846544327904014579629185545903813779011634, 69796346552658733766475001267285041190029755380, 512397478253132921069599719021683880242453713839, 11276752919974996128125063089015893227523958927, 905617103701427081067526546223393189340049567554, 739070208823765487451080854911983705447672906626, 1461501637330902918203686915170869725397159163570, 53031002415999346471620026590452388751996290452, 752787869932181580394057807181109454259441375641, 309705617787219333288474873665298519095797629319, 1420222999610340501640188140897307527031053058563, 1391705290778244184437211913903584684207129408190, 1002135161493769343605707222739638233906701740184, 741511117012206584265932744092093561031917416714, 865590151416695170424635242612775055152907225336, 681152790786575014189107285985323821583380151937, 1391705290778244184437211913903584684207129408191, 949104159077769997134087196149185845154705449732, 1450224884410927922075561852081853832169635204644, 555884533629475837136160368947476536057109596017, 722431428507137430752606060258886019949486256945]



2  Bitcoin / Development & Technical Discussion / Re: Can someone provide 3 examples of r,s,z and nonce data ? on: April 26, 2024, 11:31:54 PM
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)

can you please provide the link to the code you used to get this ?
3  Bitcoin / Development & Technical Discussion / Re: Private key recovery with 120 bit nonce leakage possible? on: April 26, 2024, 10:19:14 PM
Hello
You can calculate with simple python
int(1.03 * 4 / 3 * 256 / 120)
Result is 2 min need.

Result is tested and can be verify with https://github.com/bitlogik/lattice-attack your self too.

Regards,


Thank you. Yes, I have seen this, and based on the calculation, I need three signatures for the lattice attack.
For the lattice attack to work, I don't need to know the nonce; as long as the bits (120 in this case) are the same for three signatures, it works.

However, in my scenario, I know the 120 bits of nonce.
Eg.
If my nonce is
E036153289470F858562CC4DAA5359381246C709F6193B68367727D39D999F8F, I know that nonce starts with E036153289470F858562CC4DAA5359?HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

The question is, is it possible to get a private key for this?
How do you calculate E036153289470F858562CC4DAA5359 from E036153289470F858562CC4DAA5359381246C709F6193B68367727D39D999F8F .what method you are using to calculate this value?
E036153289470F858562CC4DAA5359381246C709F6193B68367727D39D999F8F
E036153289470F858562CC4DAA5359?HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh





not possible to calculate it from the x value ie r.. I have generated r myself and hence I know the actual nonce.
4  Bitcoin / Development & Technical Discussion / Re: Private key recovery with 120 bit nonce leakage possible? on: April 26, 2024, 07:28:51 PM
Thank you. Yes, I have seen this, and based on the calculation, I need three signatures for the lattice attack.
For the lattice attack to work, I don't need to know the nonce; as long as the bits (120 in this case) are the same for three signatures, it works.

However, in my scenario, I know the 120 bits of nonce.
Eg.
If my nonce is
E036153289470F858562CC4DAA5359381246C709F6193B68367727D39D999F8F, I know that nonce starts with E036153289470F858562CC4DAA5359?HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

The question is, is it possible to get a private key for this?

If you have only one signatures
I think the same difficulty as Puzzle #136 but with public key had known



I should have been clearer. Yes, I have the signature and associated public key used to sign the message.
5  Bitcoin / Development & Technical Discussion / Re: Private key recovery with 120 bit nonce leakage possible? on: April 26, 2024, 12:46:44 PM
Hello
You can calculate with simple python
int(1.03 * 4 / 3 * 256 / 120)
Result is 2 min need.

Result is tested and can be verify with https://github.com/bitlogik/lattice-attack your self too.

Regards,


Thank you. Yes, I have seen this, and based on the calculation, I need three signatures for the lattice attack.
For the lattice attack to work, I don't need to know the nonce; as long as the bits (120 in this case) are the same for three signatures, it works.

However, in my scenario, I know the 120 bits of nonce.
Eg.
If my nonce is
E036153289470F858562CC4DAA5359381246C709F6193B68367727D39D999F8F, I know that nonce starts with E036153289470F858562CC4DAA5359?HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

The question is, is it possible to get a private key for this?
6  Bitcoin / Development & Technical Discussion / Private key recovery with 120 bit nonce leakage possible? on: April 26, 2024, 12:59:33 AM
Hi,

I have a hypothetical scenario where I know precisely 120 bits (out of 256) of the nonce used to create the signature for a transaction.

There is only one transaction available.


Is it possible to recover the recover the private key for this?

I assume that a lattice attack is not possible as we need more than one signature; what other possible attacks are available in this scenario?
7  Bitcoin / Development & Technical Discussion / Re: Searching for K nonce on: April 24, 2024, 01:49:35 PM
noob question.

how do you calculate stride?

is there a script for it or more explanation on how it can be calculated?

looks like stride is the r signature. 
8  Bitcoin / Development & Technical Discussion / Re: Searching for K nonce on: April 24, 2024, 01:43:05 PM
noob question.

how do you calculate stride?

is there a script for it or more explanation on how it can be calculated?
9  Bitcoin / Development & Technical Discussion / Re: ECDSA 1/k on: April 18, 2024, 02:12:02 PM
Added new information
d1=(k1*s1-z1)/r1
k1=(d1*r1+z1)/s1
r1=(k1*s1-z1)/d1
s1=(d1*r1+z1)/k1
z1=k1*s1-d1*r1

Any ideas if we have a signature another signature

d2=k1^(n-2)-1
k2=k1^(n-2)
r2=(k2*s2-z2)/d2
s2=(d2*r2+z2)/k2
z2=k2*s2-d2*r2


I don't understand the question here.

Are you saying  k1 ie x coordinate and k2 x coordinate are inverse to each other ? or the actual nonce is inverse?
10  Bitcoin / Development & Technical Discussion / Re: Calculating K nonce on: April 09, 2024, 09:14:09 PM
Running this on GPU will be mush faster,. Let me see if i can write a CUDA program for this.












wow. Thank you. Please do. I still feel 6 weeks is too long though. I just got lucky.


Can you please explain the logic behind this? GPU can probably reduce it to few days. you can PM me if needed.
11  Bitcoin / Development & Technical Discussion / Re: Calculating K nonce on: April 08, 2024, 03:47:17 PM
Running this on GPU will be mush faster,. Let me see if i can write a CUDA program for this.











12  Bitcoin / Development & Technical Discussion / Re: Nonce k k+1 on: March 23, 2024, 07:34:11 PM
I don't actually have any range. It looked small to me.
So do you know a way to understand the relationship between two nonces?

If there were an easy way to find the relationship between 2 nonces, it would break the ECDSA.
13  Bitcoin / Development & Technical Discussion / Re: Nonce k k+1 on: March 23, 2024, 05:49:01 PM
Let's see it with an example,

R = k * G  mod N

Where k is the random number, G is the Gen point, and N is the order of the curve.

If I take  k randomly = 633cbe3ec02b9401c5effa144c5b4d22f87940259634858fc7e59b1c09937852

k* G = 02e9d4436e5e57ac598594faf9a04b8edc69a04096863ef4bd5a27dfcdc8c89fed (compressed)

k+1 * G = 0313e264d56097d32b38e23c6218b951ed02a684dccee5036388df1e6b94b5417a

The difference between them is enormous.  I don't know numbers that generate consecutive public keys with slight differences.

When you say slight difference, how small is it? Do you have a range?
14  Bitcoin / Development & Technical Discussion / Re: Nonce k k+1 on: March 22, 2024, 06:31:28 PM
If R1 and R2 are close to each other, it does not mean k and K+1 are used.
15  Bitcoin / Development & Technical Discussion / Re: VanitySearch (Yet another address prefix finder) on: February 19, 2024, 12:58:34 AM
Thank you. Still way too slow for Puzzle 66. I know this is probably not the best program to solve the puzzle, but I was trying different programs to find the fastest ones.
16  Bitcoin / Development & Technical Discussion / Re: VanitySearch (Yet another address prefix finder) on: February 17, 2024, 11:07:41 PM
I tried running it on 4090 and below is my speed. Is it a good speed?


.\VanitySearch.exe -stop -gpu 1Testx232f
VanitySearch v1.19
Difficulty: 173346595075428800
Search: 1Testx232f [Compressed]
Start Sat Feb 17 17:40:57 2024
Base Key: DA5A15FF6EE38ABBC1D0F21D881998D19D0009F88479FBF0D83000D59697C316
Number of CPU thread: 31
GPU: GPU #0 NVIDIA GeForce RTX 4090 (128x0 cores) Grid(1024x128)
[8645.60 Mkey/s][GPU 8554.04 Mkey/s][Total 2^37.74][Prob 0.0%][50% in 160.9d][Found 0]
17  Bitcoin / Development & Technical Discussion / Re: Only MATH is the way of Private Key on: February 14, 2024, 03:35:47 AM
No special reason when the topic goes in the way

Come on, genius, let's have a laugh together. Human invention is highly desirable, but we often confuse what we know with what we would like. Perhaps the Pascal's triangle would be a better suggestion?

Maybe itīs better to stop it, cold feet never, but some here in the board think they own the knowledge !
And i have figure out, when you find some "thing", maybe better to "be quiet", like my fan !

Last from me, all is about sections, nothing more.
And every section has his regular and his contra, if you know the distance between the sections, you can calculate with "simple math" the corresponding value.
The whole PK Universe is not 2^256 itīs way more smaller, but has different variants, that you can find in the individual sectors, if you know how (thatīs why dividing is for some impossible).

And now, letīs laugh together.

I see what you mean here, I thought it was difficult to find distance between individual sectors and also I could not find a way to differentiate sectors.
18  Bitcoin / Development & Technical Discussion / Re: y coordinate calculation (PUBLIC KEY BITCOIN) on: October 26, 2021, 10:37:20 PM
sorry for the basic question.

how did you get 28948022309329048855892746252171976963317496166410141009864396001977208667916 ?



sorry for the basic question.

how did you get 28948022309329048855892746252171976963317496166410141009864396001977208667916 ?

I get it, its P/4 ..
19  Bitcoin / Development & Technical Discussion / Re: Let test my scrypt for find a privkey ? on: October 25, 2021, 08:23:26 PM
so YODA?

any  answer about my taks -> privatekey?

it is 236 bit Smiley

tra1= 1
pub1x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub1y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P1 = E.point( (pub1x, pub1y) )
z1= 112323818011444308532154156809791512490481409328487377578658798184939273365753
r1= 90937764429714181091518576954784497381123753886576264887848415721161268263325
s1= 32301773972298712856167522581835852952363404020702604124031703051653475276885

tra2= 2
pub2x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub2y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P2 = E.point( (pub2x, pub2y) )
z2= 63411750104378216106268069909600790451706028461203456737824525370631845328318
r2= 86346150910137509609344625691599542535918568842055530411731320679899147085087
s2= 4268945849575439948632718326171397033773861929869244843748630668533369222459

tra3= 3
pub3x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub3y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P3 = E.point( (pub3x, pub3y) )
z3= 79349320560799676563200310034840814874240057254321858269232326144300293024337
r3= 17527396478512552536838095497662531293473312719074902415474332336063038520883
s3= 1671086020812206913314822827788093121970071457555990962314488521750031778348

tra4= 4
pub4x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub4y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P4 = E.point( (pub4x, pub4y) )
z4= 111719407542708627765406496929766523417674769638494346343617935212775064712492
r4= 29924894305911993971700689926582623154606975873466877427514213965666352295789
s4= 21981255311504029252979084394556501113150570806366735255642359545289593453509

tra5= 5
pub5x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub5y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P5 = E.point( (pub5x, pub5y) )
z5= 69076318301948576252908653750751030641098462381295895398198246556556305709667
r5= 35853472164935290410520861945617816820817694765156371040066672386028198756245
s5= 44140947380041473199446770734677178553251520307452000438635125756091954802847

tra6= 6
pub6x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub6y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P6 = E.point( (pub6x, pub6y) )
z6= 87525281104793248555223962753932102474091353245616358894220342137591065648795
r6= 89534910675379598084426240944960884675142967536453203977482074273337524935469
s6= 5350576882548184285107132822746894553839456649519356490152422985208823848543

tra7= 7
pub7x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub7y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P7 = E.point( (pub7x, pub7y) )
z7= 95154703799470404948889839708281614422210985157462320787309126126493711238454
r7= 10775530465875143628733301317249144070875689297140563589176512846977330663836
s7= 1107971449980930012886449289371213158640444298743499432700140060040278154625

tra8= 8
pub8x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub8y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P8 = E.point( (pub8x, pub8y) )
z8= 110297984137336887794534618636891464624414782506677071251915312211039779947200
r8= 102857886285610163920553573747206657882523095308544812605465441040956132906749
s8= 34652899766470849191428673246386046253608995660442342723959267794555071724709

tra9= 9
pub9x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub9y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P9 = E.point( (pub9x, pub9y) )
z9= 101136862093088071135619001641654061024696125299802677020023914291291699874740
r9= 46023516006578146309179116894598082725309041773116316861858192938740182959154
s9= 19891325783813369953760125498837483480602547846597004555509645284209518427843

tra10= 10
pub10x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub10y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P10 = E.point( (pub10x, pub10y) )
z10= 80283304551230692096705107162165636851582354186724160938325034740970194443177
r10= 105686457221516425581405664247289208618482746662391728170105454277713940179807
s10= 47799421689155557861152960464456039875212287576265789366024969637118423238926

tra11= 11
pub11x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub11y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P11 = E.point( (pub11x, pub11y) )
z11= 76140262367232740107525887002986367458233406162495221138952531809352128558978
r11= 45348056768983801149761165185703075512814820550286816087723438606638135265199
s11= 38095791640553240055871336715264903859554980744832998730617923320799279282180

tra12= 12
pub12x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub12y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P12 = E.point( (pub12x, pub12y) )
z12= 60257785799524921311274429022105648366660637649238490144652133000794141844645
r12= 103656988377335599225818665595591545611294317291646647074969142528172991113325
s12= 10525626476774003458944943852994282003423265631210717927939879129516368879782

tra13= 13
pub13x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub13y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P13 = E.point( (pub13x, pub13y) )
z13= 58747953750937722457540535386074118582083718187792382051999147199706267645083
r13= 108563762891357698413857806573341350065561933367103292526880876467583951078221
s13= 777953126996477196917829783802846459733193065817709018291251315733698606670

tra14= 14
pub14x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub14y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P14 = E.point( (pub14x, pub14y) )
z14= 63756554271606490276232988732865881640604490071182994203641010731164236465123
r14= 35412754309711787837106357563296019605036467059184878081814799897633761540746
s14= 17444874267423315657964674752777832930946249718935840056475015046994286231023

tra15= 15
pub15x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub15y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P15 = E.point( (pub15x, pub15y) )
z15= 113624661584996837072531045236663748558335606629088436046554784054141586754165
r15= 78162809131088648799374076511285143187027593517489080668251454937016388028838
s15= 43220564322852749858292804613420793711709437674012790254465429311628515208012

tra16= 16
pub16x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub16y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P16 = E.point( (pub16x, pub16y) )
z16= 109386006454769776063864662037037460004371946202455095215564020072522130152878
r16= 19179491292102179995134524825344517110947416685081306492251802805882050890545
s16= 16719439493629962807287213336882291089819640328067335061156185379217571795163

tra17= 17
pub17x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub17y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P17 = E.point( (pub17x, pub17y) )
z17= 91070825179001828174525622157088306224668730349720431920265232817535187512108
r17= 76433730639038018834830128737808969537623238891870881356776356209041927042512
s17= 6105336249226231674347594641915320835093020836337496757685119957748940354544

tra18= 18
pub18x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub18y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P18 = E.point( (pub18x, pub18y) )
z18= 75755253450858911439222751211157287339974235291969172236999379569161006949422
r18= 76133060109729952153985167080548176544825604633529851409455092529720299251030
s18= 2420254492265318522910249870523612142287763641470314437912963906809420673955

tra19= 19
pub19x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub19y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P19 = E.point( (pub19x, pub19y) )
z19= 72942487766515545431049659873024728592988806404657970872558543560101686934761
r19= 4230009160127237103853402184829164992674977691996442718508498741187537403121
s19= 19756701990927602422191787089714828426196633002602739453061827662943200642981

tra20= 20
pub20x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub20y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P20 = E.point( (pub20x, pub20y) )
z20= 113292041920222707396601933367121838673925519878141449677291973804955653854339
r20= 83714532253348048820318334130415761065486524516862054108229046085289547400313
s20= 21826492645758597883884296843008445677500948799261289333324041943144336807182

tra21= 21
pub21x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub21y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P21 = E.point( (pub21x, pub21y) )
z21= 108484387579126728798913853832786563548436194873079940686190708601623660717214
r21= 53067875014287403230149181012786993834860635760289402736620213913767333654167
s21= 7725847764008568659029968818844964736040544448918001678027635161238194905529

tra22= 22
pub22x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub22y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P22 = E.point( (pub22x, pub22y) )
z22= 80614533734184592814229292370668269317864725988923218554228478216830991980034
r22= 44944229275906746716119169967774680611090983810442473244586848819916268162446
s22= 29326687031461128858219676854906230640622309017213289670253103186261440427722

tra23= 23
pub23x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub23y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P23 = E.point( (pub23x, pub23y) )
z23= 85204499010668241275189171914405140558152901911509187103403110457370568237474
r23= 10108401786393784241009871694432520809686452475290329590541599110891118332950
s23= 25030493248505762691691473402601971394982702380438856813113576966447968187906






why do you tamper with the signature once it's generated?

copy paste of your code.

        if s> half_mod:
            s=curve.n -s
        if s<0:
            s=s%curve.n

20  Economy / Digital goods / Re: python/sage script for sell on: October 25, 2021, 07:13:13 AM
interesting script.
let's make another test,

below are the transactions generated ..

tra1= 1
z1= 76876030023415608668423338825784187452811639173959320017817337455802041964103
r1= 29160437407760520088247392323108134391883974944341759721909486038392263934252
s1= 88057664668158915012604599595493011104336144057048137151796684081161455068940

tra2= 2
z2= 61263116138134401525028229058918539609568640472628708541655291156521288618248
r2= 11549193954947596960703021534561318910687537033109530363590706949861810191464
s2= 13855753320462738868894436900000308125592534663165802454975929237386525551901

tra3= 3
z3= 94120272562392704147662507148139386415636002525757800768256455290364818983329
r3= 13235484545503092834351146107583288106526331893492330386542837886995039286857
s3= 113471888736454597898872446719734211059501085408597184281019577940003149168065

tra4= 4
z4= 99367284209844177315046616821185029528460822746665482351687345968205433531175
r4= 21288395071614272342731373579454206117249664754398039513644770673861859644939
s4= 73413879352532156241008151728886908980344895524488338859086767531496556394060

tra5= 5
z5= 69060216405924095583792910129380620270055713256952020221932327399807627102551
r5= 73000033343383277415474287756201732147913599806018084676911334919205184318951
s5= 87072726453737444924441523106612425315322987277779002678423286525578748401182

tra6= 6
z6= 92618601610473019371617964490946613446123192049470928113333991628587023928412
r6= 28067093485624905318698514057355456753086537066210474707760282283107230161754
s6= 81570316168538325691556352611345952414389273074007052937069015984756717263806

tra7= 7
z7= 64467069221879581988935526952178802798904578325721403807573521890371858623272
r7= 40928812080096313007619676294314551308323264286042053123514365242236661911514
s7= 1025329956085058380108911065381202269358907493178639449598067535198228526723

tra8= 8
z8= 72495741802917349120327698487760807911457277460026498073086860211586960327565
r8= 66378711205276032381995546935653475100643276511913002418773726587229576821881
s8= 108667454887055533668950227498601121583301007111191340394989504444791689053341

tra9= 9
z9= 78468020509772362123932250401279947970863640371108253522122735757309805907599
r9= 19231849856468166709561956160822737309083319782875295366880812480857879465237
s9= 2515169593593730466049902241306205711031444354734218814410691392439616554389

tra10= 10
z10= 78060509642529765276222634915143859953530748675308663141797340870084401854707
r10= 56781478814500394128333645854821980053762351020682230423318068363007571952796
s10= 8225138324074299127136188647123494944401351632612802372258470782812066336142

tra11= 11
z11= 79779827977136050305633476576385475751837262413801195246508844247195592956474
r11= 42569001943452434099942841287472883596088766927308919058922517240095023952305
s11= 1407663125118136808095389526630427676124736628716353500388345820111796001963

tra12= 12
z12= 106595513637886365274814102808291057278198427947604804923492103024132298662073
r12= 82416951132458437959864195479573279283096423098842842786194452820181884122047
s12= 16199057421916147554949358350810895793907227884540563767261972649834152748107

tra13= 13
z13= 68489560520876775568471829325504723427546860570677632392865683298027878436623
r13= 97942681488182315702560424236758409557001611486493184883333474649302628551040
s13= 73733576094385257028905244483867697271765712587658384121942578933083863131832

tra14= 14
z14= 88824913088586937091819419238438566701164343626280360487024697411739517103707
r14= 54289814375981922050958676638679327321247871495949246283904693248453246656483
s14= 91832431429520445149775820905320653634764190190929933708848042218874834508501

tra15= 15
z15= 85652327308811831382436205738266460574222300027367907748239792342952828973440
r15= 16613711354407097236850928854924361601015689306227892348440906864631885091973
s15= 80840039291427506062454499523631109705679566193223311715899795877750967539328

tra16= 16
z16= 65060641157937371808555230733609853408909684112561988842072826300674063030547
r16= 104272014795452675535604260916341363821801933757316993779707566144315357534767
s16= 86623263268148577559494707215944538702409651713369659284047337653056673517623

tra17= 17
z17= 111828740236090006688693495832192963032795368231157257335682470941267007171558
r17= 89073547190536414618222055280881620385309523951183694730779807318963214062280
s17= 109852499300962433164815238778976004880948668774843008897372116247815588738702

tra18= 18
z18= 98824167654958447904489072947892095719405536039819629922932614656069882836190
r18= 80987801020493569105412481143009310543451106437305306879480172043706552070200
s18= 33017440135053449429258988709931326418137982872316712662094074998694479956568

tra19= 19
z19= 64307891501710594612236762901627124305599192466451363765179703547459709187480
r19= 21793799379832572713485577223088553086939424517472399285847216328442532064794
s19= 57621584260137986132128912542938486391934345981617370353522147947744830696635

tra20= 20
z20= 87311263504060842953223757709363617585048656968711362882688595327084899926608
r20= 58944493751340891960057257317550109107802599663133688394628165694699116166302
s20= 78661678553724693559058028336158306051073544759382911835052759016056395015517

tra21= 21
z21= 85846385515466853782022953566659546519630368523799342752436473930357927040631
r21= 6002735972245524477516556767980019540936244579324152202005870420240057764448
s21= 6096604835397983429571849012761639775661587856381434059954190328993227033547




priv : 163933502030832404384531025411662545

it is correct, I must confirm that your script really works.
Pages: [1] 2 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!