Bitcoin Forum
May 05, 2024, 09:09:04 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 [63] 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 317 »
1241  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: August 04, 2023, 12:57:03 AM
Just for comparison purposes, I tested it with puzzle 30:

we know the range is 20000000:3fffffff
total of 536,870,911 possible keys

I reduced it to approximately 77,000,000 or -85.66%

based on the same calculations I suppose the 66 is reduced to about 27 trillion keys
Reduced what exactly, addresses? You don't have public key, so reducing whatever you think you reduced is not gonna work. But hey, I wish you are up to something and really hope to find the keys you are looking for.
1242  Bitcoin / Development & Technical Discussion / Re: Why point by point multiplication is undefined in ECDSA? on: August 02, 2023, 10:24:17 PM
https://www.coindesk.com/markets/2014/10/19/the-math-behind-the-bitcoin-protocol/
Quote
Point addition of p + q to find r is defined component-wise as follows:

c = (qy - py) / (qx - px)
rx = c2 - px - qx
ry = c (px - rx) - py

And point doubling of to find r is as follows:

c = (3px2 + a) / 2py
rx = c2 - 2px
ry = c (px - rx) - py

Can show point's multiplication example ? Multiplication is not classic double and add....
There is no such a thing as multiplying 2 public keys to have a valid result, you can't multiply public key 3 with 2 to have the public key of private key 6.

So why are you asking for something that doesn't exist?
1243  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: August 02, 2023, 10:15:28 PM
I'm developing brute force software following a slightly more coherent logic, I'll post the code soon.  Grin

support the project:  Wink
1JamesJ2H2myei94NswaBATqEsBhATENSU
Cool project, keeping an eye on this one!
Btw what project? 🤣 first show us what you got, then we'll talk about support, in case you haven't noticed, people are here to find money not give it away.😉
1244  Bitcoin / Development & Technical Discussion / Re: Why point by point multiplication is undefined in ECDSA? on: August 02, 2023, 02:56:38 AM
So this is the reason when I multiply G by itself I can't figure out what is the result! I wonder if there is a way to find the result private key?🤔

Edit, Ok, I admit that I didn't spend enough time to figure it out, after posting this I went out to find out G * G is what?

Here it is  public key :
Code:
0353854510f675922eb4d1ed3fd044c54d161c85852be5bf8074a8a8b1f2ee5273

Private key :
Code:
79be667ef9dcbbac55a06295ce870b098d3e430dcf3ce861da4dc441768b9516

I hope by multiplying point by point, you meant public keys by public keys? if I misunderstood and this is off topic, apology.

1245  Bitcoin / Project Development / Re: ecctools - a small collection of tools written in C on: July 31, 2023, 09:24:46 PM
Many examples are written in the repository ecctools.

Alberto already provided couple of examples for each program Wink
I just read WP's page, there was only 1 example, since Alberto and WP  share the same topic, I had to ask it here, you could have said that when I asked you via PM. Thanks though, let the never ending division begin! 😉
1246  Bitcoin / Project Development / Re: ecctools - a small collection of tools written in C on: July 31, 2023, 06:47:35 PM
Is there any example command to use modmath, keydivision etc for windows? Appreciate a reply.
1247  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 31, 2023, 06:41:12 PM
The goal is to find some key, it doesn't matter if it is invalid for the bitcoin standard, because knowing the pk of any of them will know the original pk you are looking for. If you limit your mind thinking about the parameters that satoshi imposed, you will not achieve

example: suppose you want to find an unknown key that we call Z Z= 1200 if we know that its range is between 1000:2000 if we subtract 2000 we will get -800 wow yes, an invalid key?? should i care The answer is no, because if we find the value -800, even if it represents an invalid key, we will know that the original pk is 1200.

Ok, how do you know the result is -800? And whatever the result, it's not invalid, but what if the key is 1890? You'd be searching from 700 to 800 in hopes of finding you imaginary -800, while the actual result is 110, far away from your searching range. I guess you haven't figured out a way to  validate whether your target is greater than 1500 or not, once you figure that out, you can base your future calculations on the fact that your target is greater or smaller than 1500.

E.g. if the key is 1650, multiply by 3 to get 4950, divide by 2 to get 2475, subtract your target from 2475 to get 825, which is half of your target.
Or just subtract 1 divide by 2, to name a few methods.



X=115792089237316195423570985008687907852837564279074904382605163141518161494337
Y=115792089237316195423570985008687907852837564279074904382605163141518161494336
If X represents a zero in the calculations of your library, a good mathematician would logically use Y and add 1 to the result.

Like

(Y-pk)+1


So the expert mathematician would use Y and then adds 1? I wonder about the logic in doing that, he might be crazy if he thinks that he can use a different algorithm to find secp256k1 keys faster. Are you sure this "good mathematician" knows about mod n in secp256k1 curve?
Anyways, when searching for unkown keys, doesn't matter if the keys are greater than n or not, because you don't have the pk to check, though if we use  standard implementation then we can be sure all keys are valid since they are all calculated mod n, whatever you do, public keys are always mod p, otherwise you get invalid public keys.

When we are talking about bitcoin's curve, you can NOT use different values expecting the results to work on bitcoin keys.
1248  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 31, 2023, 10:17:41 AM
I'm sorry, but if pk = 3; then pk -  10 =/= 7, pk - 10 = -7, very different.

I used 0-10 as an example but they are really:0-115792089237316195423570985008687907852837564279074904382605163141518161494337


Code:
[code]x= 115792089237316195423570985008687907852837564279074904382605163141518161494337
pk= 1
r= pk-x
pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
[/code]


Code:
Pk decimal: -1
pub  0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 1

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494336

pub 0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798

Pk decimal: 115792089237316195423570985008687907852837564279074904382605163141518161494338

pub 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
When I say misinformation, now I know you are misinformed, this key :
Code:
115792089237316195423570985008687907852837564279074904382605163141518161494338
is an invalid key, but mod n it is the same as G or 0x1. You see, whatever you add to n, it's like adding to zero, if you add 5 to n, what you get is just 5. So no, they are not all the same, if you convert the key above to WIF no wallet will accept it because it has a wrong format. All pk are mod n.
1249  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 30, 2023, 06:21:55 PM
for new users!
 Imagine the elliptic curve as a constant repetition of patterns where the negative or positive sign does not matter. example in a curve composed of 0-10 (in reality it is a huge number) the private key of 1 equals ...-19,-11,-9,-1, 1,9, 11, 19... to infinity in both directions.
 Any of those combinations work for all the others.
That is to say, a public key has copies of itself represented with different numbers but on paper they are the same and if you have the private key of 1, you have pk 9, pk 2 you have pk 8....

public key = pub
private key=pk

so if we have
pk=3
we apply

pk-10= 7
3=7 for the example, both pk's are mirrors.

Having said this, we understand that there is no way to know the range of a pk, if it is a pk - or positive. however there are mathematical tricks to reduce the size of these pk until finding a reasonable range to apply brute force.
How exactly did you come up with those numbers? Since when 3=7?
If you don't know how it works don't spread misinformation!

This is -n private key of 0x7,
Code:
fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd036413a
And this is +n private key of 0x7,
Code:
0000000000000000000000000000000000000000000000000000000000000007
Now where is 3 here?
If you divide 7 by 2, you will have -n of 0x3, which you will obtain by subtracting 4 from N =
Code:
fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141

One useful trick is dividing an odd key without having any remainder, that is dividing by 2 then adding n/2, or just subtract 1 from pk then divide by 2.

The only advantage we have regarding the range of keys is that we know the exact range for each one of them yet we can't do anything about it.

Do you have any tricks to reduce the range bit by bit? Well there is one, subtraction is the key, but you'd need to know what to subtract from your key. 😉
1250  Bitcoin / Project Development / Re: [BETA] MoonWalker - Just Another Bitcoin Brute Forcer on: July 30, 2023, 03:41:55 PM
What is your own benchmark? I can't see it, impress us with your speed rate first, otherwise it's not better than bitcrack, while bitcrack is open source and yours is not.!
1251  Bitcoin / Project Development / Re: [BETA] MoonWalker - Just Another Bitcoin Brute Forcer on: July 29, 2023, 06:56:53 PM
Are you searching for #66 in 63 bit range? And why only for #66, are you incapable of developing something for higher ranges?
1252  Alternate cryptocurrencies / Service Discussion (Altcoins) / Re: SecretScan project on: July 29, 2023, 02:53:25 PM
Hello, is there a way to use available calculators on secretscan offline? I have tried but it won't work, have you released their code somewhere or we should just use the site online?
There are some useful tools which are really amazing and easy to use, wish we could use them offline too.
1253  Bitcoin / Development & Technical Discussion / Re: Public Key Division - Number Theore on: July 26, 2023, 02:11:55 AM

obviously, if some private key is not divisible by 5, then you won't reach smaller key, you could get some bigger one as well. However, all ECDSA equations will be preserved in a given modulo.
Here is a problem I'm facing, it seems really easy to figure out, but I can't. Maybe you could give me a solution considering you are really good with math.

I have this key :
Code:
02228c3cbe2d11af48c3b98bc2955cd2c293375f748e9aea9040ffba42c3f6be1e
When I subtract it from this key :
Code:
0000000000000000000000000000000000000400000000000000000000000000
I get this result :  *first result
Code:
0352a1087d5f64b39c33d54e02f678c50955770b736e2c7c646d0ee04e28fc83e7

Now here is another key :
Code:
038840d5318a6369971b6610cbef8a7cb998d8e106534881da28aabfefeec2f41b

If we subtract the above from this one :
Code:
0000000000000000000000000000000000000080000000000000000000000000
We will reach this key :  which is 1/8 of *first result.
Code:
037f32d1fbba6ec4ed91109538ea93afc9bb4f13e3052d319263c7bb05fcb109a7

Do you think there is a way to find any of the public keys above?
1254  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 25, 2023, 01:49:12 PM
Hello, all.
Hope you are doing well.
I am new to here, and would like to attend this puzzle.
What tool can I use in my pc(Windows10)?

Thanks

Nvidia GPU, also not open source, modified version of 2 different tools.
https://bitcointalk.org/index.php?topic=5328080.msg56699222#msg56699222

Bitcrack :
https://bitcointalk.org/index.php?topic=4453897.0

I'd suggest to dive into the ocean of public keys, learn how to add/subtract/divide, your chance of success is better than brute forcing for keys.
1255  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 24, 2023, 09:32:39 PM

@puzzle-dev We apologize for that, but we are a sensitive community, so please we respectfully ask you to upload its source code just incase for us to be in the safe side.

Thanks,
Did you just use good cop, bad cop method on him? Lol.
If he wanted to share the code, he'd have done it at the first place and nobody would have attacked him.

In case some of you haven't noticed, around these woods we paint toads and sell them as porsche!

Personally I have nothing against him, I know enough not to run the tool, even if I do I have nothing of value on my system.
Besides, his tool, your tool, my tool, none of them really help unless you have 100+ GPUs, then having that many GPUs, you wouldn't go for #66, you'd use them to search for #130. So if we are talking about "luck" searching a site like keys.lol should do the trick, if it's up to your "luck" clicking on page numbers is enough or buying a lottery ticket could also give a better result. Being "lucky" is not exclusive to finding a puzzle key, So your and his argument is not reasonable.
1256  Bitcoin / Development & Technical Discussion / Re: Algorithms used in Bitcoin are expected to be strong until at least 2030 on: July 24, 2023, 06:50:07 PM
Good to know (after reading rest discussion) it’s not really possible to break the code until it really happens. It also made me think that Satoshi did not make it so easy as his plan is for hundreds of years until 2140 by when the last Bitcoin would be mined.

It’s seems it will get more stronger with the time as the complexity of network keeps increasing.
By 2140? Lol, it has nothing to do with "network complexity" whatever that means.

Simple and pure mathematics is what keeps the coins safe, in order to make it harder for quantum computers we just need more complex math/equations.

Enigma in WW2, was the ultimate crypto/math problem, but the first computer invented managed to break the encryption, now it's the other way around, we need to invent an equation so the new computer generation can't break it.

Satoshi just chose one of the strongest curves at that time, even he knew 20 years later people will have to change the key to their safe.😉
1257  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 24, 2023, 05:44:15 PM
i just offer a different approach an my tool is quite fast on CPUs and it would be very interesting to see the keyrates on modern CPUs.

Why don't you share this different approach in details with the rest of us? If it was working, you wouldn't be here talking, instead you'd have rented hundreds of CPUs to find #66.
1258  Bitcoin / Development & Technical Discussion / Re: Public Key Division - Number Theore on: July 24, 2023, 05:04:23 PM
Just use inversion:
Code:
   n=fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141
 n/2=7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1
-n/2=7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a0
 n/4=bfffffffffffffffffffffffffffffff0c0325ad0376782ccfddc6e99c28b0f1
 n/5=66666666666666666666666666666665e445f1f5dfb6a67e4cba8c385348e6e7
 n/6=d5555555555555555555555555555554463c62c03cbc85871fd9f975582d3661
I tried inversion and it doesn't work, if you divide +n odd key by 5 and then add n/5 to the result, you won't get near the 1/5 of your +n key.
I always use inversion and I'd never divide by anything other than n/2.

By the way, last time you messed up 1/2 with -1/2

I might have, but I don't recall, as I said I'm like a student learning here.😉
1259  Bitcoin / Development & Technical Discussion / Re: Public Key Division - Number Theore on: July 24, 2023, 01:16:14 PM
Does dividing a public key by a non division number really result in a random unknown point in the curve? Why is that though? For me, this makes no sense  : Huh Huh
The result is not random at all, did you even read my first post and other posts?

Let me give you a solution in order to successfully divide an odd key by 2, I have tried 4, 5, 6 etc, I couldn't get any meaningful result, I'm still learning.

Now the example, you could either add 1 or subtract 1 from your odd private (public key) key and then divide by 2 or you could simply divide the odd key by 2 add n/2 to the result, you will get the same result.

If your key is divisible  by 2, 4, 8 etc but the last digit is 1, you could reach key 0x3 by dividing by 2 adding n/2 and dividing the result again by 2 adding n/2 till you reach the lowest point.

Demonstration :

Private key :
Code:
0000000000000000000000000000000000000000000000000000000000008001
Public key :
Code:
03a3dd9bdf806a8c86fa43fd7c8af5fe3949b9244d46cfdf42aa716e3168f8e67b
Divided by 2, result:
Code:
024d2432b7f67a3b25fe7f6a52164f1bf0235d3f6ce00569f4fc954b823c7c7607
Adding n/2 to above
N/2 =
Code:
7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a0

Result, private key :
Code:
0000000000000000000000000000000000000000000000000000000000004001
Result, public key :
Code:
03d7ec238cd058837f44315fb8db2134f01daea15c10320c9173e7d5f68ff2d9d0

And if you keep dividing you will eventually reach 0x3, dividing 3 by 2 will give you 0x2 then 1, and dividing 1 by 2 will give you half, aka n/2 and take a look at 0.5 = n/2, it is a number around 2^255.

Now to simplify it, imagine you have 23 as your odd key, dividing by 2 adding n/2 will give you 12, it's like adding 1 to 23 = 24/2 = 12. You have 2 options.

Furthermore, there are ways to accurately divide your key by 2 without any division, but that rock is really big and I'm afraid the glass will shatter, you should start with small rocks, learn from Musk throwing a big rock at E-truck's window claiming it won't shatter. Lol
1260  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 23, 2023, 07:13:44 PM
I have developed a new tool to solve #66:

- ONLY CPU / highly optimized for speed and about 30% faster (on my CPU) than the fastest tool i know
- ONLY LINUX x86_64 / there is no and NEVER will be a WINDOWS/MAC version (DO NOT ASK!!!), but it may run on Windows Subsystem for Linux (WSL) / not tested
- SPECIAL SEARCH ALGORITHM/LOGIC that allows resuming search and has a higher chance to find the key (sucessfully tested on the solved puzzles!) / no stupid random or incremental search
- DUE TO LEGAL REASONS PRECOMPILED/PRECONFIGURED FOR #66 / i will release an update for #67 once #66 is solved

In short:
My tool is afaik the best option if you have access to one or more modern powerfull multicore CPUs and want to solve #66.
It still will not be easy to solve #66, but at least your chance to solve it will be higher!
All i ask you for is to split the reward (50:50) with me, if you use my tool.

If you are interested: the download link is in my profile.

NOTE: For anything regarding this tool leave me a private message! It may take some time, but i will try to answer all messages - thanks!




Speed? No benchmark? We already have GPU enabled tools which are 20 to 30 times faster than CPU versions, I don't know what you are promising, but definitely your tool is not faster than others whatsoever, besides searching with CPU is useless.
Pages: « 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 [63] 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 317 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!