Bitcoin Forum
May 11, 2024, 07:53:37 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 [15] 16 17 »  All
  Print  
Author Topic: Bitcoin Cipher/puzzle - 0.56 Prize ! Bitcoins [SOLVED]  (Read 19314 times)
achow101
Staff
Legendary
*
Offline Offline

Activity: 3388
Merit: 6635


Just writing some code


View Profile WWW
August 28, 2015, 01:26:20 AM
 #281

Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Better reference: https://bitcointalk.org/index.php?topic=304645.msg3270248#msg3270248
This site here: https://gobittest.appspot.com/PrivateKey is actually quite useful for doing this. It also does everything step by step so you can understand the process.

1715457217
Hero Member
*
Offline Offline

Posts: 1715457217

View Profile Personal Message (Offline)

Ignore
1715457217
Reply with quote  #2

1715457217
Report to moderator
1715457217
Hero Member
*
Offline Offline

Posts: 1715457217

View Profile Personal Message (Offline)

Ignore
1715457217
Reply with quote  #2

1715457217
Report to moderator
"This isn't the kind of software where we can leave so many unresolved bugs that we need a tracker for them." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715457217
Hero Member
*
Offline Offline

Posts: 1715457217

View Profile Personal Message (Offline)

Ignore
1715457217
Reply with quote  #2

1715457217
Report to moderator
1715457217
Hero Member
*
Offline Offline

Posts: 1715457217

View Profile Personal Message (Offline)

Ignore
1715457217
Reply with quote  #2

1715457217
Report to moderator
dalek
Sr. Member
****
Offline Offline

Activity: 382
Merit: 250



View Profile
August 28, 2015, 01:54:13 AM
 #282

Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Better reference: https://bitcointalk.org/index.php?topic=304645.msg3270248#msg3270248
This site here: https://gobittest.appspot.com/PrivateKey is actually quite useful for doing this. It also does everything step by step so you can understand the process.
It's just an interactive version, but it still doesn't explain how you can ignore the checksum without first decoding the entire base58 string. On a few tests with random keys, using the technique shown in the 2nd link I posted, the checksum characters on average affect the last 6 characters of the wif, but I did find a key that affected the last 9 characters.

           ▄▄█████████▄▄
       ▄████▀▀       ▀▀████▄
     ▄██▀▀               ▀▀██▄
    ██▀                    ████
   ██                     ███▀██
  ██                    ▄██▀   ██
 ██                    ▄██      ██
██▀                  ▄██▀      ▄███
██                  ▄██      ▄██▀██
██                 ██▀    ▄███▀  ██
██               ▄██▀   ▄██▀     ██
██▄             ▄██  ▄███▀      ▄██
 ██           ▄██▀ ▄██▀         ██
  ██         ▄██▄███▀          ██
   ██       █████▀            ██
    ██▄   ▄████▀            ▄██
     ▀██▄███▀            ▄▄██▀
       ▀████▄▄       ▄▄████▀
           ▀▀█████████▀▀
L I V E T R E E   A D E P T TM
Own the future of entertainment
The World's 1st Community-Powered,
Film, TV and Content Network  ★
achow101
Staff
Legendary
*
Offline Offline

Activity: 3388
Merit: 6635


Just writing some code


View Profile WWW
August 28, 2015, 01:59:19 AM
 #283

Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Better reference: https://bitcointalk.org/index.php?topic=304645.msg3270248#msg3270248
This site here: https://gobittest.appspot.com/PrivateKey is actually quite useful for doing this. It also does everything step by step so you can understand the process.
It's just an interactive version, but it still doesn't explain how you can ignore the checksum without first decoding the entire base58 string. On a few tests with random keys, using the technique shown in the 2nd link I posted, the checksum characters on average affect the last 6 characters of the wif, but I did find a key that affected the last 9 characters.
You can't ignore the checksum without first decoding it. By converting it to base58 from base256 the last digits will be different and with each key it varies so it is not possible to know the checksum without decoding the base58

spazzdla
Legendary
*
Offline Offline

Activity: 1722
Merit: 1000


View Profile
August 28, 2015, 03:41:21 AM
 #284

The intellegence in this thread intimidates me lol.
NorrisK
Legendary
*
Offline Offline

Activity: 1946
Merit: 1007



View Profile
August 28, 2015, 05:32:05 AM
 #285

The intellegence in this thread intimidates me lol.

Quite a few of the puzzles are also just taking a step back and looking carefully. The ISBN number for instance, if you took notice of the numbers on the books you read, it was easy to spot where to look. The same goes for the morse code.

I agree though, some of the puzzles went way over my head too Wink
MF Doom
Hero Member
*****
Offline Offline

Activity: 560
Merit: 500



View Profile
August 28, 2015, 02:50:13 PM
 #286

The intellegence in this thread intimidates me lol.

then head over to the speculation forum, the blind predictions will recoup your intellectualism
HugoTheSpider
Jr. Member
*
Offline Offline

Activity: 38
Merit: 2


View Profile
August 28, 2015, 08:19:29 PM
Last edit: August 28, 2015, 08:38:14 PM by HugoTheSpider
 #287

Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Correct.

I know of two approaches to brute force crack a private key if some of the unknown characters are on the end:

Approach #1: Checking against checksum
1. Assemble your guess as a WIF string (base58)
2. Then do a base58_decode which outputs a 1+32+4=37 byte (1 extra byte when compressed but this puzzle has an uncompressed key).
3. Then re-calculate the checksum
4. If it matches, alert, else goto 1.
Chance of a false positive: 1:232

Approach #2: Check against hash160 (this is the way I go)
1. Split your guesses in many batches
2. Assemble the first guess in the batch as a base58 string
3. Then do a base58_decode which outputs a 37 or 38 byte binary
4. Take byte #1 to #32 (counting from #0) and load it into your EC library (yes, you can ignore the checksum here)
5. Do an EC point multiplication p=G*k where p=public key, G=base point and k=your first guess
6. If ripemd160(sha256(p)) matches target, alert and stop
7. Do an EC point addition p=p+G and goto 6. until 58n/232 repetitions has been made. n is the number of characters missing at the end
8. Open a new batch and goto 2

Approach #2 has advantages if #10 is unknown because large parts of #10 are sitting in the checksum. When directly dealing with the internal binary representation of the private key using EC math, you're "skipping" all possible invalid WIF private key combinations at once.
Approach #1 could be the better choice if you're sure that you have #10 correct.

Currently I don't do any bruteforce anymore because I ran out of ideas for #9. As soon I get new clues, I'll resume my bruteforce.


Note:
Some peoples asked for code (here/PM):
I'm handing out this hint for free but you have to do the coding work yourself. I'm fearing getting deanonymized if uploading my code here because it heavyly relies on code from other projects made by me.
Sarthak
Hero Member
*****
Offline Offline

Activity: 518
Merit: 501

Error 404: there seems to be nothing here.


View Profile
August 29, 2015, 04:12:29 AM
 #288

Finally some free time  Cheesy

Starting to work onto it  Cool Cool

Yerm
Full Member
***
Offline Offline

Activity: 126
Merit: 100



View Profile
August 29, 2015, 04:48:06 AM
 #289

Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Correct.

I know of two approaches to brute force crack a private key if some of the unknown characters are on the end:

Approach #1: Checking against checksum
1. Assemble your guess as a WIF string (base58)
2. Then do a base58_decode which outputs a 1+32+4=37 byte (1 extra byte when compressed but this puzzle has an uncompressed key).
3. Then re-calculate the checksum
4. If it matches, alert, else goto 1.
Chance of a false positive: 1:232

Approach #2: Check against hash160 (this is the way I go)
1. Split your guesses in many batches
2. Assemble the first guess in the batch as a base58 string
3. Then do a base58_decode which outputs a 37 or 38 byte binary
4. Take byte #1 to #32 (counting from #0) and load it into your EC library (yes, you can ignore the checksum here)
5. Do an EC point multiplication p=G*k where p=public key, G=base point and k=your first guess
6. If ripemd160(sha256(p)) matches target, alert and stop
7. Do an EC point addition p=p+G and goto 6. until 58n/232 repetitions has been made. n is the number of characters missing at the end
8. Open a new batch and goto 2

Approach #2 has advantages if #10 is unknown because large parts of #10 are sitting in the checksum. When directly dealing with the internal binary representation of the private key using EC math, you're "skipping" all possible invalid WIF private key combinations at once.
Approach #1 could be the better choice if you're sure that you have #10 correct.

Currently I don't do any bruteforce anymore because I ran out of ideas for #9. As soon I get new clues, I'll resume my bruteforce.


Note:
Some peoples asked for code (here/PM):
I'm handing out this hint for free but you have to do the coding work yourself. I'm fearing getting deanonymized if uploading my code here because it heavyly relies on code from other projects made by me.

as a normal person who just tried reading that "woooow" Shocked Shocked Shocked
trior
Member
**
Offline Offline

Activity: 85
Merit: 10


View Profile
August 31, 2015, 01:16:16 AM
 #290

The book is a road block for me without it I can't go any further .
I'm in a non English country .
English books are rare in bookshops  over here .
Ordering online take ages to deliver to my country .

As for brute forcing it's not fun at all.
And useless anyway at this stage especially if there is a reordering step.



5 days left till end of puzzle.
I hope the OP is preparing another one.


hexafraction
Sr. Member
****
Offline Offline

Activity: 392
Merit: 259

Tips welcomed: 1CF4GhXX1RhCaGzWztgE1YZZUcSpoqTbsJ


View Profile
August 31, 2015, 10:35:36 PM
 #291

As for brute forcing it's not fun at all.
And useless anyway at this stage especially if there is a reordering step.

A reordering step isn't bad. A lightly optimized bruteforcer I wrote and was running on an anemic laptop managed to search 70*(10!) private keys for validity (although none were in fact valid).

I have recently become active again after a long period of inactivity. Cryptographic proof that my account has not been compromised is available.
trior
Member
**
Offline Offline

Activity: 85
Merit: 10


View Profile
September 01, 2015, 12:14:24 AM
Last edit: September 01, 2015, 12:27:44 AM by trior
 #292

There are 15 missing characters with known letter casing.



Code:
2     1    3     4     5     6     7     8     9     10                
5Juu2 CkB3       EcyH9 dypNh DZ8fX gh6RQ wwbo5     6       E
           AAaAa                               __-_  -^^-^-      




Uc="ABCDEFGHJKLMNPQRSTUVWXYZ123456789" (33 char)
lc="abcdefghijkmnopqrstuvwxyz123456789" (34 char)




try brute forcing this number of keys  
                                                    
(33*33*34*33*34)  * (34*34*33*34) * (34*33*33*34*33*34) * (!9)


And on top of that the casing may change as seen in solved levels.

Sarthak
Hero Member
*****
Offline Offline

Activity: 518
Merit: 501

Error 404: there seems to be nothing here.


View Profile
September 01, 2015, 03:10:17 PM
 #293

5 days left till end of puzzle.
I hope the OP is preparing another one.

The Puzzle won't end Smiley Don't worry about that!

Yoshi24517
Full Member
***
Offline Offline

Activity: 126
Merit: 100


★777Coin.com★ Fun BTC Casino!


View Profile
September 01, 2015, 04:12:04 PM
 #294

Did we figure out #9 yet? Cause I really want some of this money.

wearehatetherules
Full Member
***
Offline Offline

Activity: 195
Merit: 100

★YoBit.Net★ 200+ Coins Exchange & Dice


View Profile
September 05, 2015, 04:52:27 AM
 #295

i dont really understand with that encryption  Sad
somebody can help me?

faridkifly
Sr. Member
****
Offline Offline

Activity: 294
Merit: 250



View Profile
September 06, 2015, 10:06:23 AM
 #296

i have no idea to solve it.
maybe it because i haven't solved a puzzle like that  Huh Huh
NorrisK
Legendary
*
Offline Offline

Activity: 1946
Merit: 1007



View Profile
September 06, 2015, 10:44:01 AM
 #297

i have no idea to solve it.
maybe it because i haven't solved a puzzle like that  Huh Huh

Of You read the earlier posts in This thread You can get an idea of the thought process behind solving the steps. You may learn a thing or two also!
Sakarias-Corporation (OP)
Hero Member
*****
Offline Offline

Activity: 574
Merit: 500


Call me Alice. just Alice.


View Profile WWW
September 06, 2015, 05:24:54 PM
 #298

hey guys, i know it's past the 5th, but my internet is horrible at the moment, (currently moving) i will post a new hint soon !

mrsalve
Sr. Member
****
Offline Offline

Activity: 263
Merit: 250


View Profile
September 06, 2015, 08:13:30 PM
 #299

Well one thing is sure. I'm not a spy. I had a look and I have absolutly no idea what it is or what to do with it.

.
PLAY
            ▄██████████████▄
          ▄██▀▀██████████████▄
        ▄██▀    ▀██████████████▄
      ▄██▀        ▀██████████████▄
    ▄██▀   ██████▄  ▀██████████████▄
  ▄██▀          ██    ▀██████████████▄
 ███       ▄█████▀      ███████████████
  ▀██▄    ▐██         ▄██████████████▀
    ▀██▄  ▐██████▌  ▄██████████████▀
      ▀██▄        ▄██████████████▀
        ▀██▄    ▄██████████████▀
          ▀██▄▄██████████████▀
            ▀██████████████▀
.
LIVE
.
██████
███▀▀▀
███







███
███▄▄▄
██████
██████
▀▀▀███
███







███
▄▄▄███
██████
NorrisK
Legendary
*
Offline Offline

Activity: 1946
Merit: 1007



View Profile
September 13, 2015, 11:55:32 AM
 #300

hey guys, i know it's past the 5th, but my internet is horrible at the moment, (currently moving) i will post a new hint soon !

Any chance to get the hint? This puzzle has really proven to be quite challenging! Much kudo's to you for coming up with it Cheesy
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 [15] 16 17 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!