Bitcoin Forum
May 27, 2024, 10:32:32 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4]  All
  Print  
Author Topic: Let test my scrypt for find a privkey ?  (Read 1402 times)
mausuv
Jr. Member
*
Offline Offline

Activity: 70
Merit: 1


View Profile
December 26, 2021, 06:16:42 AM
Last edit: December 26, 2021, 07:55:30 AM by mausuv
 #61


Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
thanks
Code:
mausuv, What is that number?
its reflect hex_number trickee


https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalk.org/index.php?topic=5244940.msg58488513#msg58488513

Code:
Point1 = (x1,y1)
Point2 = (x2,y2)

Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)


i need two point use div Point5 = div(Point1,Point2) #remove Scalar option
i need two point use mul Point6 = mul(Point1,Point2) # remove Scalar option
eny method Point1,Point2 use div and mul get therd point #mybadenglish
read my top 2 link modify please..

its posible remove scalar
Code:
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)
COBRAS (OP)
Member
**
Offline Offline

Activity: 864
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
December 26, 2021, 07:43:17 AM
 #62


Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
thanks
Code:
mausuv, What is that number?
its reflect hex_number trickee


https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalk.org/index.php?topic=5244940.msg58488513#msg58488513

Code:
Point1 = (x1,y1)
Point2 = (x2,y2)

Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)


i need two point use div Point5 = div(Point1,Point2) #remove Scalar option
i need two point use mul Point6 = mul(Point1,Point2) # remove Scalar option
eny method Point1,Point2 use div and mul get therd point #mybadenglish
read my top 2 link modify please..

its posible remove scalar
Code:
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)

How this communicate with private keys from ooin2 and point 3 ? Try make example with 110 and 90 bit pubkeys and privkeys ?

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
cixegz
Newbie
*
Offline Offline

Activity: 13
Merit: 0


View Profile
January 04, 2022, 11:58:46 AM
 #63

@COBRAS How this communicate with private keys from ooin2 and point 3 ? Try make example with 110 and 90 bit pubkeys and privkeys ?

just my idea please make and modify div(point1,point2),multi(point1point2) python code

https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalk.org/index.php?topic=5244940.msg58488513#msg58488513
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
January 07, 2022, 09:44:20 PM
 #64

for rsz
maybe helpfull to you
https://github.com/kanhavishva/rsz

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
walletrecovery
Copper Member
Member
**
Offline Offline

Activity: 419
Merit: 29


View Profile WWW
January 18, 2022, 07:32:27 PM
 #65

Send a bitcoin transaction message, R,S, nonce and I will try find a privkey.

Probability of success 90 %

Huh

Good Luck !!

https://youtube.com/watch?v=-UcCMjQab4w
You can't take advantage of the bug. You're 5 or more years late. No program will help you, you will only spend money and get nothing in return.

PrivatePerson
Member
**
Offline Offline

Activity: 173
Merit: 12


View Profile
August 26, 2022, 08:47:16 AM
 #66

How do you prepare the list to be loaded into this script?
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
August 26, 2022, 12:11:32 PM
Merited by ABCbits (1)
 #67


gen_data.py is make data for use it

run script  gen_data.py
then you got file data.json
and run  lattice_attack.py

or

run script  gen_data.py -f filename
then you got the file filename.json
and run  lattice_attack.py -f filename

I test already if not have a leak nonce it not works
test with a fake nonce leak (random) it never works

Pages: « 1 2 3 [4]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!