Bitcoin Forum
November 12, 2019, 05:23:44 AM *
News: 10th anniversary art contest
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 80498 times)
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 07, 2018, 12:09:40 AM
Last edit: December 07, 2018, 12:48:28 AM by Andzhig
 #561

Quote
make this sense or not?

Try to run bitcrack in python.

It’s hard to say how best to look for 1 video card at full speed or run multiple copies of the program for one card at a lower speed but with more space options. Depends on the setting.

Here is an example script for 20 copies of the program on 1 video card with minimal settings ( apologize, the code may look more compact, I don’t bother with that much).

My setup example cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s  where new1.txt address list, find.txt file for dropping found,  -c -u comp, uncomp addresses we are also looking for collisions, -b 32 -t 256 -p 15 directly settings for video card it is necessary to select a compromise between the number of copies of the program, or rather the minimum ones at which the program will not begin to crash.

for work script copy bitcrack prog. files to dir C:\crackbit ,in it to throw the file with addresses and name new1.txt create empty file find.txt. Create empty file with extension on C:\testpy.cmd

Or rename to your own in the python editor itself Edite\Replace... Replace All...

Quote
import random
from bitcoin import *
import subprocess
import time
#from PyRandLib import *
#rand = FastRand63()
#random.seed(rand())


while 1 == 1:
    ii = 1
    while ii <= 10000000:
        rando = random.randrange(430000000000000000,440000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)


        rando = random.randrange(440000000000000000,450000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(450000000000000000,460000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(460000000000000000,470000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(470000000000000000,480000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(480000000000000000,490000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(490000000000000000,500000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(500000000000000000,510000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(510000000000000000,520000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(520000000000000000,530000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(530000000000000000,540000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(540000000000000000,550000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(550000000000000000,560000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(430000000000000000,440000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(440000000000000000,450000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(450000000000000000,460000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(460000000000000000,470000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(470000000000000000,480000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(480000000000000000,490000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        time.sleep(0.1)

        rando = random.randrange(490000000000000000,550000000000000000,1) #288230376151711744,576460752303423488
        ran = rando
        myhex = "%064x" % ran
        myhex = myhex[:64]
        priv = myhex
        pub = privtopub(priv)
        pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
        addr = pubtoaddr(pubkey1)

        oy = """cd "C:\crackbit" """
        ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s "
        f=open("C:/testpy.cmd","w")
        f.write (oy)
        f.write (ey)
        f.write (priv)
        f.close()

        subprocess.Popen([r"C:/testpy.cmd"])

        print(rando,addr,priv,bin(rando))

        
        time.sleep(180.0) # time for scan in sec
        subprocess.call("taskkill /IM cuBitCrack.exe")
        ii = ii +1

    pass
[/size]

Will scan randomly assigned ranges.with a 180 second scan interval.

Quote
436255798676581527 1DEJj2kLLPApXWKtvN6LxK4khX6TWe1vRs 000000000000000000000000000000000000000000000000060de45667526c97 0b11000001101111001000101011001100111010100100110110010010111
441507056942360318 1PfpMYgqG1XvqGAB7VbmEkqi5LJcZXH1tE 00000000000000000000000000000000000000000000000006208c543ee0a6fe 0b11000100000100011000101010000111110111000001010011011111110
459138491207522404 1P65P9uq3jh6dQGn71ty1ncwetfsYYaDBJ 000000000000000000000000000000000000000000000000065f30066f221864 0b11001011111001100000000011001101111001000100001100001100100
461915945739820515 1AVY8PpJWoRitWvqLo3TM4Mkjox4DdXHMU 00000000000000000000000000000000000000000000000006690e1af5e91de3 0b11001101001000011100001101011110101111010010001110111100011
475748685656264755 1QCr7MjWX8KPqroPCGvCd8154TYQSQ7qjb 000000000000000000000000000000000000000000000000069a32e8b2e69033 0b11010011010001100101110100010110010111001101001000000110011
480437702123105246 1Q5bJch874J1qLFX9d1kGbg5hwS29WXYPZ 00000000000000000000000000000000000000000000000006aadb8b6bc0abde 0b11010101010110110111000101101101011110000001010101111011110
499681233881334263 1J2jKM66vsbxnQwhny6FNbnFhYW6SoPYhy 00000000000000000000000000000000000000000000000006ef396f4e6d01f7 0b11011101111001110010110111101001110011011010000000111110111
505963224890171215 1PmhNACinLrHKpZKAe2qRVQHUpb4fg64b2 00000000000000000000000000000000000000000000000007058adf50fd5f4f 0b11100000101100010101101111101010000111111010101111101001111
519981219040329526 1BdnH1wb1EJ8AerfecP8MoyhhAErELxhdN 00000000000000000000000000000000000000000000000007375829eac5ff36 0b11100110111010110000010100111101010110001011111111100110110
525573134512519358 1N51AuBTfKXuFW5gz8SmrvZSjXuJUqFS5v 000000000000000000000000000000000000000000000000074b35fb321b78be 0b11101001011001101011111101100110010000110110111100010111110
535208647800522894 1AKrVPBrepAGQ5iUh1hGtXZtK1UG9jM6oC 000000000000000000000000000000000000000000000000076d716df4de088e 0b11101101101011100010110110111110100110111100000100010001110
547573542492859303 1218GFAz7U2CMt3Dg1NANWXASRPd2GUehZ 00000000000000000000000000000000000000000000000007995f3c58b06ba7 0b11110011001010111110011110001011000101100000110101110100111
551235443847304427 1FWRjD8vc5V1292wmwETiEwKEvCRDwnN47 00000000000000000000000000000000000000000000000007a661b7321f94eb 0b11110100110011000011011011100110010000111111001010011101011
431862599371012664 1NQtY7KvWhLZSMvubxJ1N3qFobn9mWK3vR 00000000000000000000000000000000000000000000000005fe48befb493a38 0b10111111110010010001011111011111011010010010011101000111000
442689619007000816 1JZQqE3Hq7615DE7akCA6W8WgWGrbAQvpu 0000000000000000000000000000000000000000000000000624bfdceeaa50f0 0b11000100100101111111101110011101110101010100101000011110000
450054996901302633 1MY1L5LjuLGVqSEGkdTqMa2KrmjPMhBVfW 000000000000000000000000000000000000000000000000063eeaa29bb11169 0b11000111110111010101010001010011011101100010001000101101001
463404660570563360 1EwsCkEFdGfkDvkyjntydoq7Prrm6kXzeY 000000000000000000000000000000000000000000000000066e58156491a320 0b11001101110010110000001010101100100100100011010001100100000
476391074956334032 1HM3dYR8RUgwD2NpwpmbGaE5VPpej4hrbu 000000000000000000000000000000000000000000000000069c7b289cf053d0 0b11010011100011110110010100010011100111100000101001111010000
485975192431053672 1E4YP4KmAu62DiR1rxDmCoNvBKvyq8HAN2 00000000000000000000000000000000000000000000000006be87dcda814b68 0b11010111110100001111101110011011010100000010100101101101000
495091615987254152 12jHiq9UrxA9Uk38W9B1YH6Y8pVzKJ4VSx 00000000000000000000000000000000000000000000000006deeb339e31c388 0b11011011110111010110011001110011110001100011100001110001000

180 sec

Quote
434397307476904640 1KwmnYnwx3RBdai8Hg6gg9YioUqRE5SyPz 00000000000000000000000000000000000000000000000006074a0cb38c0ac0 0b11000000111010010100000110010110011100011000000101011000000
448180614452161049 1Dm66qi8M9XV1nXmUpNTXKPkuJfiCqAbka 000000000000000000000000000000000000000000000000063841e4efa32a19 0b11000111000010000011110010011101111101000110010101000011001
455848687860036132 1AohCP71Q6ETRPAJvfYL1YA9FgJimUrTYD 00000000000000000000000000000000000000000000000006537ff76739b224 0b11001010011011111111111011101100111001110011011001000100100
462603130947331666 1JRTAE82D57BKeK42BD7V6AEbaUXwVvQh1 000000000000000000000000000000000000000000000000066b7f18bc196652 0b11001101011011111110001100010111100000110010110011001010010
477874477159224936 1PiJTdZZXpU3qCLhJQ8XDJcTTGfjvyQWbW 00000000000000000000000000000000000000000000000006a1c04e1a4d1668 0b11010100001110000000100111000011010010011010001011001101000
489611196952328879 1J7acijCcCh6RomLPNGhziRz4UaKeuHWPe 00000000000000000000000000000000000000000000000006cb72ca2065baaf 0b11011001011011100101100101000100000011001011011101010101111
497692554980595627 1CZf3pPim9Qv5EaM4mPMbrNQ1WAd4bSFoR 00000000000000000000000000000000000000000000000006e828bdeaf997ab 0b11011101000001010001011110111101010111110011001011110101011
504154894995661991 1LhjwaKt5Z6ZRDp6zRspzxa66vm54L4Uf5 00000000000000000000000000000000000000000000000006ff1e34b3fda4a7 0b11011111111000111100011010010110011111111011010010010100111
513734719315617733 18S5yDG4t1z6cNy5XL3E4dCsZsLbzJFWuv 000000000000000000000000000000000000000000000000072127015d97a7c5 0b11100100001001001110000000101011101100101111010011111000101
524089558560688939 1HMtuBWjn84XVrPTp472avYm122Ug9J9mY 0000000000000000000000000000000000000000000000000745f0ad40804b2b 0b11101000101111100001010110101000000100000000100101100101011
533526184362501078 1LbVYerCAykwoFRNNq1HEcEETnx99kofNN 0000000000000000000000000000000000000000000000000767773ce94be3d6 0b11101100111011101110011110011101001010010111110001111010110
541141267079494343 1MkHc9tQ2zfWfmKqDjCyZ8mT8DFaxcmQwr 0000000000000000000000000000000000000000000000000782851d8593fac7 0b11110000010100001010001110110000101100100111111101011000111
557294163226682575 1GbmYRdFQ7Muj2qLETcnFTRjt6JT2nt65W 00000000000000000000000000000000000000000000000007bbe816ba8664cf 0b11110111011111010000001011010111010100001100110010011001111
431426588295510113 1H7JEXVK6n2DR2m5dvnCGS8mog2Ub5Hpob 00000000000000000000000000000000000000000000000005fcbc323e033861 0b10111111100101111000011001000111110000000110011100001100001
440184254933268814 16unzLvdVK3onNS5PkUELXvYELMEnj25Aj 000000000000000000000000000000000000000000000000061bd93f6704794e 0b11000011011110110010011111101100111000001000111100101001110
452076765920283756 13uebyVH62vYMvKKKiWWtXFCv1EMyFMxQE 0000000000000000000000000000000000000000000000000646196c63e2cc6c 0b11001000110000110010110110001100011111000101100110001101100
466109431548019383 14sP97eQyj6GRXAdccdpdpbLF67EzVNd4r 0000000000000000000000000000000000000000000000000677f40ef5e102b7 0b11001110111111101000000111011110101111000010000001010110111
473565831398854640 1GgMgAuUF4U8XjYo5pGFmuZvPRbSoxJYaJ 0000000000000000000000000000000000000000000000000692719d564a8ff0 0b11010010010011100011001110101010110010010101000111111110000
481001336899844371 13sMZvkWA7aqSKAXAtAPWEwS2UQFc3Wruc 00000000000000000000000000000000000000000000000006acdc2ade673913 0b11010101100110111000010101011011110011001110011100100010011
505710979847703937 19LpNTAN5orXp3pD27Hkqy3BKB1p88uyyz 0000000000000000000000000000000000000000000000000704a574f0d64d81 0b11100000100101001010111010011110000110101100100110110000001

On 5 cards, maybe you can run 500 copies of the program at the same time.
1573536224
Hero Member
*
Offline Offline

Posts: 1573536224

View Profile Personal Message (Offline)

Ignore
1573536224
Reply with quote  #2

1573536224
Report to moderator
1573536224
Hero Member
*
Offline Offline

Posts: 1573536224

View Profile Personal Message (Offline)

Ignore
1573536224
Reply with quote  #2

1573536224
Report to moderator
1573536224
Hero Member
*
Offline Offline

Posts: 1573536224

View Profile Personal Message (Offline)

Ignore
1573536224
Reply with quote  #2

1573536224
Report to moderator
The Bitcoin Forum is turning 10 years old! Join the community in sharing and exploring the notable posts made over the years.
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 07, 2018, 12:35:24 AM
 #562

It may be worth looking for the next 10-20 filter puzzles 60,61,62,63.... Need to analyze what bits can be in those addresses, there, of course, the error (deviation) may exceed the number with 9 zeros.

                                                                                                         0  111  101        
101100011001110101101110 0001010010000110001001101000100001 33-25   10  2    3      11640174 B19D6E
111101011001001011100100 100000111100101011101011000011100 28-29     11  2    2        16093924 F592E4
100111010001100010110110 00111010110001001111111111011111 22-34      12  1    3        10295478 9D18B6
110101010111110000111111 0011011011001111110000100010100 24-31        8   3    2        13990975 D57C3F
100011011011111011011011 010101101011010001111101000100 23-31          8   1    5        9289435  8DBEDB
110000000011110001000111 00100011111100011001001101100 29-24           14  2    0        12598343 C03C47
111011111010111000010110 0100110010111001111000111100 22-30             9   3    3        15707670 EFAE16
111010100000111000010100 001101000000000100111010000 33-18              14  2    2        15339028 EA0E14
100010101111010100001111 00001011101001001101010100 26-24               11  2    2        9106703  8AF50F
101110100000101110110101 1000000010101111101001101 24-25                 11  2    5        12192693 BA0BB5
101011011110011011010111 110011100011101110011011  17-31                  8   2    4        11396823 ADE6D7
110110011010110000100001 01101010011110010111010  23-24                   13  0    2        14265377 D9AC21
101110110000011000001110 0010001101010101000100 27-19                     13  2    2        12256782 BB060E
100100010111111001010000 101000011110000000101 26 -19                      13  2    2        9535056  917E50
111000000010101100110101 10100011010110001111 22-22                        13  1    2        14691125 E02B35
110101111010011101100100 1111100010110010001 19-24                          10  2    3        14133092 D7A764
101010001000100001110001 011000110110001111 23-19                           15  1    1        11044977 A88871
101010011100001101001101 01100110001011011 20-21                             12  1    3        11125581 A9C34D
111010011010111001001001 0011001111010110  18-22                             11  2    2       15314505 E9AE49
100101101011111100000110 000001111101001  19-20                               11  2    2        9879302  96BF06
100010001110000010111110 10110011010000 21-17                                 13  2    1        8970430  88E0BE
101110101011101110101011 0101010010011 14 -22                                  8   3    6        12237739 BABBAB
100111011110100000100000 101001111100 19- 17                                   14  2    2        10348576 9DE820
100101011101101001000010 00101110000 20-15                                     13  1    3        9820738  95DA42
110100101001100101100100 0100011101 18-16                                       13  0    3        13801828 D29964
110101001011011001010100 011011000 17-16                                        12  0    4        13940308 D4B654
101110000110001010100110 00101110  17-15                                         13  1    2        12083878 B862A6
111110101001111111001110 1000111  10-21                                           7   4    1        16424910 FA9FCE
111101100101001100110101 100100 14-16                                             10  1    3        16143157 F65335
101111110001001010101000 11110 13-16                                              12  2    3        12522152 BF12A8
110110010001011011001110 1000 14-14                                                11  1    3        14227150 D916CE
110101011000011100001110 101 13-14                                                 12  2    2        13993742 D5870E
110100000000110010011011 10 15-11                                                  14  0    2        13634715 D00C9B
111111010010111101110010 1 8-17                                                      8   4    3        16592754 FD2F72
110111000010101000000100  15-9                                                       15  1    2        14428676 DC2A04

repeat 4 > 11 2 2, repeat 2 > 10 2 3,  repeat 2 > 12 1 3, repeat 2 > 14 2 2 ,repeat 2> 13 2 2.  
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 07, 2018, 02:32:00 PM
 #563

OK so the code will be really long with 500 starting points.

So how do this code work do the code check mabey 10mkey per search space and then the change after 180 sec?

And do the code print all like you show me or only founds?
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 07, 2018, 06:07:54 PM
Last edit: December 07, 2018, 06:20:54 PM by Andzhig
 #564

Quote
And do the code print all like you show me or only founds?
not understood. Only this will write or that you indicate to him in the "print (blablabla)". python 3 just run bitcrack so that it does not start manually. Can run from python idle, can simply double click on the blablabla.py file script without idle.

110101110001101001111000 484369781529509888 18PeFv41FQ7uVDdNGt7i1LfnZZyezSsejP 00000000000000000000000000000000000000000000000006b8d3c000000000 0b11010111000110100111100000000000000000000000000000000000000
110101101000001110001010 483042189958447104 1EJg7g9vsQPCRuGaVxAUHGiwsZ5b4H4h4K 00000000000000000000000000000000000000000000000006b41c5000000000 0b11010110100000111000101000000000000000000000000000000000000
110101110011000101010111 484570957797654528 1A1D9jeYo8r7fkkTRLDRoMMn4iMSkytjcw 00000000000000000000000000000000000000000000000006b98ab800000000 0b11010111001100010101011100000000000000000000000000000000000
110100111000001000111111 476275417443991552 16aVvWoxxC4eJ8cEtP4FUpz3cLaB2pPV12 000000000000000000000000000000000000000000000000069c11f800000000 0b11010011100000100011111100000000000000000000000000000000000
110100111011011000110111 476732539403239424 1Mbyuvjvyty1Lc849rn87mhQRE6v6FpQHQ 000000000000000000000000000000000000000000000000069db1b800000000 0b11010011101101100011011100000000000000000000000000000000000
110111010100111100011100 498343612245868544 121Hz1XawZudRzMhtEYNxceTUFvrLfwCYK 00000000000000000000000000000000000000000000000006ea78e000000000 0b11011101010011110001110000000000000000000000000000000000000
110101010000011010001000 479690809797509120 15EKuQWW97hDEysicZMbojpGGQWoB2VBhy 00000000000000000000000000000000000000000000000006a8344000000000 0b11010101000001101000100000000000000000000000000000000000000
110101000010000011110111 477671522333360128 1MvzoKWtgELYWMwMbstqyBEhDREGL4KwXN 00000000000000000000000000000000000000000000000006a107b800000000 0b11010100001000001111011100000000000000000000000000000000000
110101011001100111101000 480987134006657024 1DTwSYy5X2zLTcRZq5EcFKfk5ctMPFmcCt 00000000000000000000000000000000000000000000000006accf4000000000 0b11010101100110011110100000000000000000000000000000000000000
110110010011011010010000 489120496395223040 1J5WMtSWrufSZ5u36DoBucXQLqVHB3N7Qh 00000000000000000000000000000000000000000000000006c9b48000000000 0b11011001001101101001000000000000000000000000000000000000000


Try this one for the test (yet without filter 111 101).

Settings, anyway, will have to sort out. You have such  -b 15 -t 512 -p 4120 why did you choose -b 15? Let's try these -b 32 -t 256 -p 512 for 10 copies.

Quote
import random
from bitcoin import *
import subprocess
import time
#from PyRandLib import *
#rand = FastRand63()
#random.seed(rand())

#l1= [("11010000")]

l1= [("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"), # start 8 bit, random list or 1 first.
     ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111")]
 

l2= [("10000000"),("10000001"),("10000010"),("10000011"),("10000100"),("10000101"),("10000110"),("10000111"), # second and third bits random list.
     ("10001000"),("10001001"),("10001010"),("10001011"),("10001100"),("10001101"),("10001110"),("10001111"),
     ("10010000"),("10010001"),("10010010"),("10010011"),("10010100"),("10010101"),("10010110"),("10010111"),
     ("10011000"),("10011001"),("10011010"),("10011011"),("10011100"),("10011101"),("10011110"),("10011111"),
     ("10100000"),("10100001"),("10100010"),("10100011"),("10100100"),("10100101"),("10100110"),("10100111"),
     ("10101000"),("10101001"),("10101010"),("10101011"),("10101100"),("10101101"),("10101110"),("10101111"),
     ("10110000"),("10110001"),("10110010"),("10110011"),("10110100"),("10110101"),("10110110"),("10110111"),
     ("10111000"),("10111001"),("10111010"),("10111011"),("10111100"),("10111101"),("10111110"),("10111111"),
     ("11000000"),("11000001"),("11000010"),("11000011"),("11000100"),("11000101"),("11000110"),("11000111"),
     ("11001000"),("11001001"),("11001010"),("11001011"),("11001100"),("11001101"),("11001110"),("11001111"),
     ("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"),
     ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111"),
     ("11100000"),("11100001"),("11100010"),("11100011"),("11100100"),("11100101"),("11100110"),("11100111"),
     ("11101000"),("11101001"),("11101010"),("11101011"),("11101100"),("11101101"),("11101110"),("11101111"),
     ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"),
     ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"),
     ("00000000"),("00000001"),("00000010"),("00000011"),("00000100"),("00000101"),("00000110"),("00000111"),
     ("00001000"),("00001001"),("00001010"),("00001011"),("00001100"),("00001101"),("00001110"),("00001111"),
     ("00010000"),("00010001"),("00010010"),("00010011"),("00010100"),("00010101"),("00010110"),("00010111"),
     ("00011000"),("00011001"),("00011010"),("00011011"),("00011100"),("00011101"),("00011110"),("00011111"),
     ("00100000"),("00100001"),("00100010"),("00100011"),("00100100"),("00100101"),("00100110"),("00100111"),
     ("00101000"),("00101001"),("00101010"),("00101011"),("00101100"),("00101101"),("00101110"),("00101111"),
     ("00110000"),("00110001"),("00110010"),("00110011"),("00110100"),("00110101"),("00110110"),("00110111"),
     ("00111000"),("00111001"),("00111010"),("00111011"),("00111100"),("00111101"),("00111110"),("00111111"),
     ("01000000"),("01000001"),("01000010"),("01000011"),("01000100"),("01000101"),("01000110"),("01000111"),
     ("01001000"),("01001001"),("01001010"),("01001011"),("01001100"),("01001101"),("01001110"),("01001111"),
     ("01010000"),("01010001"),("01010010"),("01010011"),("01010100"),("01010101"),("01010110"),("01010111"),
     ("01011000"),("01011001"),("01011010"),("01011011"),("01011100"),("01011101"),("01011110"),("01011111"),
     ("01100000"),("01100001"),("01100010"),("01100011"),("01100100"),("01100101"),("01100110"),("01100111"),
     ("01101000"),("01101001"),("01101010"),("01101011"),("01101100"),("01101101"),("01101110"),("01101111"),
     ("01110000"),("01110001"),("01110010"),("01110011"),("01110100"),("01110101"),("01110110"),("01110111"),
     ("01111000"),("01111001"),("01111010"),("01111011"),("01111100"),("01111101"),("01111110"),("01111111")]


def take1():
    yy = str(random.choice(l1))
    return yy

def take2():
    uu = str(random.choice(l2))
    return uu

def rana():
    s = [take2(),take2()]
    d = ''.join(random.sample(s,len(s)))
    bina = (take1()+d)
    return bina


def funk():
    aaa = rana()
    b = int(aaa,2)*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2
    ran = b
    myhex = "%064x" % ran
    myhex = myhex[:64]
    priv = myhex
    pub = privtopub(priv)
    pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
    addr = pubtoaddr(pubkey1)

    oy = """cd "C:\crackbit" """
    ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 512 -s " # bitcrack settings
    f=open("C:/testpy.cmd","w")
    f.write (oy)
    f.write (ey)
    f.write (priv)
    f.close()

    subprocess.Popen([r"C:/testpy.cmd"])

    print(aaa,b,addr,priv,bin(b)) # print(blablabla)

    time.sleep(0.1)
    return None
                
while True:
    for a in range(10): # number of copies
        funk()

    time.sleep(180.0) # break between restarts, scan time, in sec
    subprocess.call("taskkill /IM cuBitCrack.exe")
[/size]
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 07, 2018, 06:22:43 PM
 #565

C:\Users\Miner\Desktop>
533254865834117451 1HW7FaFCwK3SLXH1zpfxX93Z7FLP7acK5S 00000000000000000000000000000000000000000000000007668079a4ca894b 0b11101100110100000000111100110100100110010101000100101001011
C:\Users\Miner\Desktop\BitCrack-master>cdstart
 "C:\Users\Miner\Desktop\BitCrack-master"   /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000007668079a4ca894b C:\Users\Miner\Desktop>

cd "C:\Users\Miner\Desktop\BitCrack-master"

C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000007668079a4ca894b

C:\Users\Miner\Desktop\BitCrack-master>start542563419171164525 1Kb65sRL1aSwSdVozB2N5TBPTzbweaUbix 0000000000000000000000000000000000000000000000000787928e1bd1916d 0b11110000111100100101000111000011011110100011001000101101101
 /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000787928e1bd1916d

C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"
552942365625655711 1KiYZF6wfuG6Z2BKSLkVaSNtcSwUYaHxzL 00000000000000000000000000000000000000000000000007ac7226e461a19f 0b11110101100011100100010011011100100011000011010000110011111

C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000007ac7226e461a19f

438802464588486901 1CcmX8jJpVyvB199WniyaNr9h6ugBNq3BX 0000000000000000000000000000000000000000000000000616f084445cd8f5 0b11000010110111100001000010001000100010111001101100011110101
C:\Users\Miner\Desktop>
C:\Users\Miner\Desktop>cdcd "C:\Users\Miner\Desktop\BitCrack-master"   "C:\Users\Miner\Desktop\BitCrack-master"

441982445053163826 1Ja7o7GJhKfeJrRPk3Xgg3iLXofkJW7HdP 00000000000000000000000000000000000000000000000006223cb12a5a3932 0b11000100010001111001011000100101010010110100011100100110010


C:\Users\Miner\Desktop\BitCrack-master>C:\Users\Miner\Desktop\BitCrack-master>startstart /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000006223cb12a5a3932  /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000006223cb12a5a3932


C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"

452060289090857845 12Dr632u9Emzvv21mTbUjbXLfhZCC665Hk 00000000000000000000000000000000000000000000000006460a7014522b75 0b11001000110000010100111000000010100010100100010101101110101
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000006460a7014522b75

469739005230228692 193R7ww6QUsbRvZ85CbGoQjk74Gs4qUkWY 0000000000000000000000000000000000000000000000000684d922efe4a4d4 0b11010000100110110010010001011101111111001001010010011010100
C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master" 


C:\Users\Miner\Desktop\BitCrack-master>C:\Users\Miner\Desktop>startcd /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000684d922efe4a4d4  "C:\Users\Miner\Desktop\BitCrack-master"


C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000692e629a8ebbda6 473693977429392806 13JmKF9mDns5qtg9ReKEWHJhuH3micpXi6 0000000000000000000000000000000000000000000000000692e629a8ebbda6 0b11010010010111001100010100110101000111010111011110110100110


C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"

C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000692e629a8ebbda6
488849425605668981 1B25uxVCPXAqbwRXDGdKJ7HsHxC3KNJwok 00000000000000000000000000000000000000000000000006c8bdf669e13075 0b11011001000101111011111011001101001111000010011000001110101

C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"  507448557522984509 14v9AW7NN4Q3UBepWfMH5rgSvGTe1QTJ4H 000000000000000000000000000000000000000000000000070ad1c644f11e3d 0b11100001010110100011100011001000100111100010001111000111101



C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 000000000000000000000000000000000000000000000000070ad1c644f11e3d

C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 000000000000000000000000000000000000000000000000070ad1c644f11e3d


i only get this when is start.


PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 07, 2018, 06:35:24 PM
 #566

Quote
Settings, anyway, will have to sort out. You have such  -b 15 -t 512 -p 4120 why did you choose -b 15? Let's try these -b 32 -t 256 -p 512 for 10 copies.


because with your settings -b 32 -t 256 -p 512 i get only 129 Mkeys

and with my settings -b 15 -t 512 -p 4125 (for more copies lower number) i get 245 Mkeys

Quote
not understood. Only this will write or that you indicate to him in the "print (blablabla)". python 3 just run bitcrack so that it does not start manually. Can run from python idle, can simply double click on the blablabla.py file script without idle.


you have to understand i am not a coder i learn the basics from python but this was a while ago.

and i start not with the IDLE i start normal as you say
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 07, 2018, 06:53:11 PM
 #567

Quote
Try to run bitcrack in python.

It’s hard to say how best to look for 1 video card at full speed or run multiple copies of the program for one card at a lower speed but with more space options. Depends on the setting.

Here is an example script for 20 copies of the program on 1 video card with minimal settings ( apologize, the code may look more compact, I don’t bother with that much).

My setup example cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s  where new1.txt address list, find.txt file for dropping found,  -c -u comp, uncomp addresses we are also looking for collisions, -b 32 -t 256 -p 15 directly settings for video card it is necessary to select a compromise between the number of copies of the program, or rather the minimum ones at which the program will not begin to crash.

for work script copy bitcrack prog. files to dir C:\crackbit ,in it to throw the file with addresses and name new1.txt create empty file find.txt. Create empty file with extension on C:\testpy.cmd

Or rename to your own in the python editor itself Edite\Replace... Replace All...

i tought when i run this python script for every search space there opens a new cmd file with Bitcrack and this search 180sec in random space.

so when we have 20 copies there are 20 cmd windows with started Bitcrack and after 180sec it will cancel and start auto with new random search space
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 07, 2018, 07:46:49 PM
 #568

Quote
you have to understand i am not a coder i learn the basics from python but this was a while ago.
Me too about 10 years ago assembler even under ms-dos taught)) From examples from the Internet glued. Can be without .cmd run, there damn head break, figure out how.)) If you still have experience in this matter, then if necessary, you will understand how it is more convenient for you to make a program. There are lots of options. Take the dec range convert to bin, filter (if necessary) back to dec and on... Take any combinations, organization of zeros, ones.. bits, bytes. Or create a list of options to a file and binomial randomly choose from it. Or, alternatively, take out the leaves from the pouch while in deep trance.  Grin 
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 07, 2018, 07:55:12 PM
 #569

hahaha yeah ok   Grin

but i like your strategy can you code something what i wrote at last ?
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 08, 2018, 03:43:14 AM
Last edit: December 08, 2018, 06:32:25 AM by Andzhig
 #570

Quote
what i wrote at last ?
You mean this? https://bitcointalk.org/index.php?topic=1306983.msg48483082#msg48483082 or
Quote
i tought when i run this python script for every search space there opens a new cmd file with Bitcrack and this search 180sec in random space.
In the first case, there would be more explanation of what the table means, In the second case (if I understand you correctly), bitcrack does not know how (currently not implemented in the program) to sort randomly in a given range, so the only option is to reduce the search time for the start of the next random part and step by step from smaller value to bigger..

***

Since we have 4 repetitions

11110101 1001001011100100 100000111100101011101011000011100 28-29   11  2    2        16093924 F592E4
11101001 1010111001001001 0011001111010110  18-22                             11  2    2        15314505 E9AE49
10010110 1011111100000110 000001111101001  19-20                               11  2    2        9879302  96BF06
10001010 1111010100001111 00001011101001001101010100 26-24              11  2    2         9106703  8AF50F

the script takes the same initial bytes 11110101 11101001 10010110 10001010 and through the filter produces 10 options for subsequent puzzles. running time 600 sec = 10 min.
Or take  ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"),
            ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), and drive a week))

The truth is there is a miss in space 147573952589676412928 - 295147905179352825856.
295147905179352825856−45147905179352825856=250000000000000000000
110110001101011100100110 10110111000101110111101010000000000000000000 14210854
14210854* 2 44 times 249999987418033291264
250000000000000000000-249999987418033291264=~12581966708736 fourteen digit number, how many 1 2080ti squeezes 1000mk\s ~ 3 hours apparently.
may have, further, take the first not 3 but 4 bytes...


Variant with filter 11 zeros, 2 111, 2 101.
Quote
import random
from bitcoin import *
import subprocess
import time
#from PyRandLib import *
#rand = FastRand63()
#random.seed(rand())

#l1= [("11010000")]

l1= [("11110101"),("10001010"),("11101001"),("10010110")]
 
l2= [("10000000"),("10000001"),("10000010"),("10000011"),("10000100"),("10000101"),("10000110"),("10000111"),
     ("10001000"),("10001001"),("10001010"),("10001011"),("10001100"),("10001101"),("10001110"),("10001111"),
     ("10010000"),("10010001"),("10010010"),("10010011"),("10010100"),("10010101"),("10010110"),("10010111"),
     ("10011000"),("10011001"),("10011010"),("10011011"),("10011100"),("10011101"),("10011110"),("10011111"),
     ("10100000"),("10100001"),("10100010"),("10100011"),("10100100"),("10100101"),("10100110"),("10100111"),
     ("10101000"),("10101001"),("10101010"),("10101011"),("10101100"),("10101101"),("10101110"),("10101111"),
     ("10110000"),("10110001"),("10110010"),("10110011"),("10110100"),("10110101"),("10110110"),("10110111"),
     ("10111000"),("10111001"),("10111010"),("10111011"),("10111100"),("10111101"),("10111110"),("10111111"),
     ("11000000"),("11000001"),("11000010"),("11000011"),("11000100"),("11000101"),("11000110"),("11000111"),
     ("11001000"),("11001001"),("11001010"),("11001011"),("11001100"),("11001101"),("11001110"),("11001111"),
     ("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"),
     ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111"),
     ("11100000"),("11100001"),("11100010"),("11100011"),("11100100"),("11100101"),("11100110"),("11100111"),
     ("11101000"),("11101001"),("11101010"),("11101011"),("11101100"),("11101101"),("11101110"),("11101111"),
     ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"),
     ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"),
     ("00000000"),("00000001"),("00000010"),("00000011"),("00000100"),("00000101"),("00000110"),("00000111"),
     ("00001000"),("00001001"),("00001010"),("00001011"),("00001100"),("00001101"),("00001110"),("00001111"),
     ("00010000"),("00010001"),("00010010"),("00010011"),("00010100"),("00010101"),("00010110"),("00010111"),
     ("00011000"),("00011001"),("00011010"),("00011011"),("00011100"),("00011101"),("00011110"),("00011111"),
     ("00100000"),("00100001"),("00100010"),("00100011"),("00100100"),("00100101"),("00100110"),("00100111"),
     ("00101000"),("00101001"),("00101010"),("00101011"),("00101100"),("00101101"),("00101110"),("00101111"),
     ("00110000"),("00110001"),("00110010"),("00110011"),("00110100"),("00110101"),("00110110"),("00110111"),
     ("00111000"),("00111001"),("00111010"),("00111011"),("00111100"),("00111101"),("00111110"),("00111111"),
     ("01000000"),("01000001"),("01000010"),("01000011"),("01000100"),("01000101"),("01000110"),("01000111"),
     ("01001000"),("01001001"),("01001010"),("01001011"),("01001100"),("01001101"),("01001110"),("01001111"),
     ("01010000"),("01010001"),("01010010"),("01010011"),("01010100"),("01010101"),("01010110"),("01010111"),
     ("01011000"),("01011001"),("01011010"),("01011011"),("01011100"),("01011101"),("01011110"),("01011111"),
     ("01100000"),("01100001"),("01100010"),("01100011"),("01100100"),("01100101"),("01100110"),("01100111"),
     ("01101000"),("01101001"),("01101010"),("01101011"),("01101100"),("01101101"),("01101110"),("01101111"),
     ("01110000"),("01110001"),("01110010"),("01110011"),("01110100"),("01110101"),("01110110"),("01110111"),
     ("01111000"),("01111001"),("01111010"),("01111011"),("01111100"),("01111101"),("01111110"),("01111111")]

def take1():
    yy = str(random.choice(l1))
    return yy

def take2():
    uu = str(random.choice(l2))
    return uu

def rana():
    s = [take2(),take2()]
    d = ''.join(random.sample(s,len(s)))
    bina = (take1()+d)
    return bina

def mult():
    a1 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2                   # * 35   288230376151711744    -  576460752303423488
    a2 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2                 # * 36   576460752303423488    -  1152921504606846976
    a3 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2               # * 37   1152921504606846976   -  2305843009213693952
    a4 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2             # * 38   2305843009213693952   -  4611686018427387904
    a5 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2           # * 39   4611686018427387904   -  9223372036854775808
    a6 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2         # * 40   9223372036854775808   -  18446744073709551616
    a7 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2       # * 41   18446744073709551616  -  36893488147419103232
    a8 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2     # * 42   36893488147419103232  -  73786976294838206464
    a9 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2   # * 43   73786976294838206464  -  147573952589676412928
    a10= 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 44   147573952589676412928 -  295147905179352825856
    multypl = random.choice([a1,a2,a3,a4,a5,a6,a7,a8,a9,a10])
    return multypl

def funk():
    i = 2
    while i != 1:
        aaa = rana()
        filtr0 = aaa.count("0")
        if filtr0 == 11: # zeros filt
            filtr1 = aaa.count("111")
            if filtr1 == 2: # 111 filt
                filtr2 = aaa.count("101")
                if filtr2 == 2: # 101 filt
                    b = int(aaa,2)* mult()
                    ran = b
                    myhex = "%064x" % ran
                    myhex = myhex[:64]
                    priv = myhex
                    pub = privtopub(priv)
                    pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
                    addr = pubtoaddr(pubkey1)

                    oy = """cd "C:\crackbit" """
                    ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s " # bitcrack settings
                    f=open("C:/testpy.cmd","w")
                    f.write (oy)
                    f.write (ey)
                    f.write (priv)
                    f.close()

                    subprocess.Popen([r"C:/testpy.cmd"])

                    print(aaa,b,addr,priv,bin(b))

                    time.sleep(0.1)
                    
                    break
    return None
                
while True:
    for a in range(10): # number of copies
        funk()
        

    time.sleep(600.0) # break between restarts, scan time, in sec
    subprocess.call("taskkill /IM cuBitCrack.exe")
[/size]
zielar
Member
**
Offline Offline

Activity: 120
Merit: 35


View Profile
December 08, 2018, 08:54:24 PM
 #571

Quote
what i wrote at last ?
You mean this? https://bitcointalk.org/index.php?topic=1306983.msg48483082#msg48483082 or
Quote
i tought when i run this python script for every search space there opens a new cmd file with Bitcrack and this search 180sec in random space.
In the first case, there would be more explanation of what the table means, In the second case (if I understand you correctly), bitcrack does not know how (currently not implemented in the program) to sort randomly in a given range, so the only option is to reduce the search time for the start of the next random part and step by step from smaller value to bigger..

***

Since we have 4 repetitions

11110101 1001001011100100 100000111100101011101011000011100 28-29   11  2    2        16093924 F592E4
11101001 1010111001001001 0011001111010110  18-22                             11  2    2        15314505 E9AE49
10010110 1011111100000110 000001111101001  19-20                               11  2    2        9879302  96BF06
10001010 1111010100001111 00001011101001001101010100 26-24              11  2    2         9106703  8AF50F

the script takes the same initial bytes 11110101 11101001 10010110 10001010 and through the filter produces 10 options for subsequent puzzles. running time 600 sec = 10 min.
Or take  ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"),
            ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), and drive a week))

The truth is there is a miss in space 147573952589676412928 - 295147905179352825856.
295147905179352825856−45147905179352825856=250000000000000000000
110110001101011100100110 10110111000101110111101010000000000000000000 14210854
14210854* 2 44 times 249999987418033291264
250000000000000000000-249999987418033291264=~12581966708736 fourteen digit number, how many 1 2080ti squeezes 1000mk\s ~ 3 hours apparently.
may have, further, take the first not 3 but 4 bytes...


Variant with filter 11 zeros, 2 111, 2 101.
Quote
import random
from bitcoin import *
import subprocess
import time
#from PyRandLib import *
#rand = FastRand63()
#random.seed(rand())

#l1= [("11010000")]

l1= [("11110101"),("10001010"),("11101001"),("10010110")]
 
l2= [("10000000"),("10000001"),("10000010"),("10000011"),("10000100"),("10000101"),("10000110"),("10000111"),
     ("10001000"),("10001001"),("10001010"),("10001011"),("10001100"),("10001101"),("10001110"),("10001111"),
     ("10010000"),("10010001"),("10010010"),("10010011"),("10010100"),("10010101"),("10010110"),("10010111"),
     ("10011000"),("10011001"),("10011010"),("10011011"),("10011100"),("10011101"),("10011110"),("10011111"),
     ("10100000"),("10100001"),("10100010"),("10100011"),("10100100"),("10100101"),("10100110"),("10100111"),
     ("10101000"),("10101001"),("10101010"),("10101011"),("10101100"),("10101101"),("10101110"),("10101111"),
     ("10110000"),("10110001"),("10110010"),("10110011"),("10110100"),("10110101"),("10110110"),("10110111"),
     ("10111000"),("10111001"),("10111010"),("10111011"),("10111100"),("10111101"),("10111110"),("10111111"),
     ("11000000"),("11000001"),("11000010"),("11000011"),("11000100"),("11000101"),("11000110"),("11000111"),
     ("11001000"),("11001001"),("11001010"),("11001011"),("11001100"),("11001101"),("11001110"),("11001111"),
     ("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"),
     ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111"),
     ("11100000"),("11100001"),("11100010"),("11100011"),("11100100"),("11100101"),("11100110"),("11100111"),
     ("11101000"),("11101001"),("11101010"),("11101011"),("11101100"),("11101101"),("11101110"),("11101111"),
     ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"),
     ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"),
     ("00000000"),("00000001"),("00000010"),("00000011"),("00000100"),("00000101"),("00000110"),("00000111"),
     ("00001000"),("00001001"),("00001010"),("00001011"),("00001100"),("00001101"),("00001110"),("00001111"),
     ("00010000"),("00010001"),("00010010"),("00010011"),("00010100"),("00010101"),("00010110"),("00010111"),
     ("00011000"),("00011001"),("00011010"),("00011011"),("00011100"),("00011101"),("00011110"),("00011111"),
     ("00100000"),("00100001"),("00100010"),("00100011"),("00100100"),("00100101"),("00100110"),("00100111"),
     ("00101000"),("00101001"),("00101010"),("00101011"),("00101100"),("00101101"),("00101110"),("00101111"),
     ("00110000"),("00110001"),("00110010"),("00110011"),("00110100"),("00110101"),("00110110"),("00110111"),
     ("00111000"),("00111001"),("00111010"),("00111011"),("00111100"),("00111101"),("00111110"),("00111111"),
     ("01000000"),("01000001"),("01000010"),("01000011"),("01000100"),("01000101"),("01000110"),("01000111"),
     ("01001000"),("01001001"),("01001010"),("01001011"),("01001100"),("01001101"),("01001110"),("01001111"),
     ("01010000"),("01010001"),("01010010"),("01010011"),("01010100"),("01010101"),("01010110"),("01010111"),
     ("01011000"),("01011001"),("01011010"),("01011011"),("01011100"),("01011101"),("01011110"),("01011111"),
     ("01100000"),("01100001"),("01100010"),("01100011"),("01100100"),("01100101"),("01100110"),("01100111"),
     ("01101000"),("01101001"),("01101010"),("01101011"),("01101100"),("01101101"),("01101110"),("01101111"),
     ("01110000"),("01110001"),("01110010"),("01110011"),("01110100"),("01110101"),("01110110"),("01110111"),
     ("01111000"),("01111001"),("01111010"),("01111011"),("01111100"),("01111101"),("01111110"),("01111111")]

def take1():
    yy = str(random.choice(l1))
    return yy

def take2():
    uu = str(random.choice(l2))
    return uu

def rana():
    s = [take2(),take2()]
    d = ''.join(random.sample(s,len(s)))
    bina = (take1()+d)
    return bina

def mult():
    a1 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2                   # * 35   288230376151711744    -  576460752303423488
    a2 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2                 # * 36   576460752303423488    -  1152921504606846976
    a3 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2               # * 37   1152921504606846976   -  2305843009213693952
    a4 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2             # * 38   2305843009213693952   -  4611686018427387904
    a5 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2           # * 39   4611686018427387904   -  9223372036854775808
    a6 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2         # * 40   9223372036854775808   -  18446744073709551616
    a7 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2       # * 41   18446744073709551616  -  36893488147419103232
    a8 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2     # * 42   36893488147419103232  -  73786976294838206464
    a9 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2   # * 43   73786976294838206464  -  147573952589676412928
    a10= 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 44   147573952589676412928 -  295147905179352825856
    multypl = random.choice([a1,a2,a3,a4,a5,a6,a7,a8,a9,a10])
    return multypl

def funk():
    i = 2
    while i != 1:
        aaa = rana()
        filtr0 = aaa.count("0")
        if filtr0 == 11: # zeros filt
            filtr1 = aaa.count("111")
            if filtr1 == 2: # 111 filt
                filtr2 = aaa.count("101")
                if filtr2 == 2: # 101 filt
                    b = int(aaa,2)* mult()
                    ran = b
                    myhex = "%064x" % ran
                    myhex = myhex[:64]
                    priv = myhex
                    pub = privtopub(priv)
                    pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed")
                    addr = pubtoaddr(pubkey1)

                    oy = """cd "C:\crackbit" """
                    ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s " # bitcrack settings
                    f=open("C:/testpy.cmd","w")
                    f.write (oy)
                    f.write (ey)
                    f.write (priv)
                    f.close()

                    subprocess.Popen([r"C:/testpy.cmd"])

                    print(aaa,b,addr,priv,bin(b))

                    time.sleep(0.1)
                    
                    break
    return None
                
while True:
    for a in range(10): # number of copies
        funk()
        

    time.sleep(600.0) # break between restarts, scan time, in sec
    subprocess.call("taskkill /IM cuBitCrack.exe")
[/size]



Something is wrong.... It's dump from command line:

Quote
C:\Users\olo\Desktop\bitcrack>python start.py
('100101100010011100110111', 173114833646726938624L, '14JLKDijKbKtfV3caW5T5gumNpQTX6gwXR', '0000000000000000000000000000000000000000000000096273700000000000', '0b10010110001001110011011100000000000000000
0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack"  0
00000000000000000000000'The file name, directory name or volume label syntax is incorrect.
)

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 0000000000000000000000000000000000000000000000096273700000000000
('111101011001000001110101', 8847385789399564288L, '15rqTzR4XatoCqgCWef1JAchj71vvTMAkc', '0000000000000000000000000000000000000000000000007ac83a8000000000', '0b111101011001000001110101000000000000000000000000000000000
0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack"  0
00')
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 0000000000000000000000000000000000000000000000007ac83a8000000000
('111101011000100010111100', 552893682634719232L, '1N9wE9gN8jYEMn3kJtWmcEu8pdjeEYPzQW', '00000000000000000000000000000000000000000000000007ac45e000000000', '0b11110101100010001011110000000000000000000000000000000000000')

C:\Users\olo\Desktop\bitcrack>cd "C:\Users\olo\Desktoitcrack"
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000007ac45e000000000
('100101101111110000110010', 87037006203213316096L, '1MLUb3GVRSPMv47Ht9v5JDrEwmPmFyWESq', '000000000000000000000000000000000000000000000004b7e1900000000000', '0b100101101111110000110010000000000000000000000000000000000000000
0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack"  0
')
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 000000000000000000000000000000000000000000000004b7e1900000000000
('111101010011011100100100', 141357049963440242688L, '1JuNtDafgMP7iVcy7PqdpHZPHZzENe1eHa', '000000000000000000000000000000000000000000000007a9b9200000000000', '0b1111010100110111001001000000000000000000000000000000000000000000000')

C:\Users\olo\Desktop\bitcrack>cd "C:\Users\olo\Desktoitcrack"
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 000000000000000000000000000000000000000000000007a9b9200000000000
('111010011000101100011110', 269257238687181176832L, '156apRKXAW8ePEqJNsg4L2GMj7EcpwUCt6', '0000000000000000000000000000000000000000000000e98b1e00000000000', '0b111010011000101100011110000000000000000000000000000000000000000000
0C:\Users\olo\Desktop\bitcrack>0cd' "C:\Users\olo\Desktoitcrack"  )

The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000e98b1e00000000000
('100101100010111100001111', 173150158756304125952L, '166WSCWuwNc6XUMiouwJT33zhJENkX9fha', '00000000000000000000000000000000000000000000000962f0f00000000000', '0b10010110001011110000111100000000000000000000000000000000000000000000')

C:\Users\olo\Desktop\bitcrack>cd "C:\Users\olo\Desktoitcrack"
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000962f0f00000000000
('100101101010011100111100', 86845691179980292096L, '1AbPmyzZ2Uh72s1nRzrzMZq9ymKDnLt6Az', '000000000000000000000000000000000000000000000004b539e00000000000', '0b1001011010100111001111000000000000000000000000000000000000000000
0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack"  '
)
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 000000000000000000000000000000000000000000000004b539e00000000000
('111010011101100001100110', 134802641247941951488L, '1pAYydvT6bKsUZrCFRwxfRCVG2cuTUfw7', '0000000000000000000000000000000000000000000000074ec3300000000000', '0b11101001110110000110011000000000000000000000000000000000000000
0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack"  0
0')
The file name, directory name or volume label syntax is incorrect.

C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 0000000000000000000000000000000000000000000000074ec3300000000000
('111101011100110100100100', 283389639870986059776L, '1DE2jSpXqWKc8Pj4xVaiZjsy159krJR9Vt', '00000000000000000000000000000000000000000000000f5cd240000
0C:\Users\olo\Desktop\bitcrack>0000cd0 "C:\Users\olo\Desktoitcrack"  0
', '0b111101011100110100100100000000000000000000000000000The file name, directory name or volume label syntax is incorrect.
000000000
0C:\Users\olo\Desktop\bitcrack>start000 /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000f5cd2400000000000 0
000')

I have changed places to C:\Users\olo\Desktop\bitcrack becouse think before about problem is with privilages in mail c:\ path but problem still wrong.
I have already installed python 2.7
zielar
Member
**
Offline Offline

Activity: 120
Merit: 35


View Profile
December 08, 2018, 09:23:28 PM
 #572

ok ... finally after installing Python 3.7.1 and patches from "\" to "/" everything is OK. Has anyone of you can knowledge about the best settings for 1080TI? For me, these 10 processes reach 22Mkey / s on my setting [-b 28 -t 256 -p 512]
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 09, 2018, 07:26:35 PM
 #573

Quote
There is no formula, there is a random and our collective unconscious. Therefore, someone will write something, someone will think of something.  Grin You never know, I will write now and you will light up (light bulb lights up).

Take the last number found. 1011000110011101011011100001010010000110001001101000100001 take the first 3 bytes from it 10110001 10011101 01101110 here we have 10 zeros. Check how many combinations will be from the first byte 10110001, 8008 combinations which we need in place 583 (depending on the given data of course, table for counting in python, I'll leave it down) bin 101100011001110101101110 dec 11640174 multiply this number 34 times by 2 will get ~199976666598998016 practically what you need 199976667976342049. 199976667976342049-199976666598998016=1377344033 error on 1377344033 using a scanner "bitcrack" it's practically nothing. You need to guess just 3 bytes then "bitcrack" will do everything himself.

The most important question is how to guess these 3 bytes (and multiply by 2 35 times for 59 puzzle).


so i calculate like you say but this dont work for the others.

look here:


288 230 376 151 711 744 = 58bit found #58priv key puzzel is 199 976 667 976 342 049‬ mitte  errechneter wert 199 976 666 598 998 016 mit hoch 34 == 1 377 344 033
144 115 188 075 855 872 = 57bit found #57priv key puzzel is 138 245 758 910 846 492 ende   errechneter wert 138 245 754 488 619 008 mit hoch 33 == 4 422 227 484
 72 057 594 037 927 936 = 56bit found #56priv key puzzel is  44 218 742 292 676 575‬ mitte    errechneter wert  44 218 741 306 687 488 mit hoch 32 ==   985 989 087
 36 028 797 018 963 968 = 55bit found #55priv key puzzel is  30 045 390 491 869 460 ende    errechneter wert  30 045 387 884 593 152 mit hoch 32
 18 014 398 509 481 984 = 54bit found #54priv key puzzel is   9 974 455 244 496 707 anfang  errechneter wert   9 974 451 659 603 968 mit hoch 32
   9 007 199 254 740 992 = 53bit found #53priv key puzzel is   6 763 683 971 478 124 mitte     errechneter wert   6 763 680 138 002 432 mit hoch 32
  4 503 599 627 370 496 = 52bit found #52priv key puzzel is   4 216 495 639 600 700 ende      errechneter wert   4 216 495 559 147 520 mit hoch 28
  2 251 799 813 685 248 = 51bit found #51priv key puzzel is   2 058 769 515 153 876 ende      errechneter wert   2 058 769 487 888 384 mit hoch 28

59bit =
58bit = 10110001 10011101 01101110 = 14 (1) 34
57bit = 11110101 10010010 11100100 = 13 (1) 33
56bit = 10011101 00011000 10110110 = 12 (1) 32
55bit = 01101010 10111110 00011111 = 15 (1) 32
54bit = 00100011 01101111 10110110 = 14 (1) 32
53bit = 00011000 00000111 10001000 = 7  (1) 32
52bit = 11101111 10101110 00010110 = 15 (1) 28
51bit = 01110101 00000111 00001010 = 10 (1) 28
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 09, 2018, 08:27:19 PM
Last edit: December 10, 2018, 12:56:28 PM by Andzhig
 #574

Chew for stupid what are you doing. But the first byte cannot start at 0. And each step up is multiplied by +2. Every step below -2. Ie 55 * 2> 31, 54 * 2> 30 ...

55bit = 01101010 10111110 00011111 = 15 (1) 32
54bit = 00100011 01101111 10110110 = 14 (1) 32 > 31
53bit = 00011000 00000111 10001000 = 7  (1) 32 > 30



***
a little thought

       1("10000000"),   2("10000001"),  3("10000010"),   4("10000011"),  5("10000100"),   6("10000101"),   7("10000110"),  8("10000111"),
       9("10001000"), 10("10001001"), 11("10001010"), 12("10001011"), 13("10001100"), 14("10001101"), 15("10001110"), 16("10001111"),
      17("10010000"), 18("10010001"), 19("10010010"), 20("10010011"), 21("10010100"), 22("10010101"), 23("10010110"), 24("10010111"),
      25("10011000"), 26("10011001"), 27("10011010"), 28("10011011"), 29("10011100"), 30("10011101"), 31("10011110"), 32("10011111"),
      33("10100000"), 34("10100001"), 35("10100010"), 36("10100011"), 37("10100100"), 38("10100101"), 39("10100110"), 40("10100111"),
      41("10101000"), 42("10101001"), 43("10101010"), 44("10101011"), 45("10101100"), 46("10101101"), 47("10101110"), 48("10101111"),
      49("10110000"), 50("10110001"), 51("10110010"), 52("10110011"), 53("10110100"), 54("10110101"), 55("10110110"), 56("10110111"),
      57("10111000"), 58("10111001"), 59("10111010"), 60("10111011"), 61("10111100"), 62("10111101"), 63("10111110"), 64("10111111"),
      65("11000000"), 66("11000001"), 67("11000010"), 68("11000011"), 69("11000100"), 70("11000101"), 71("11000110"), 72("11000111"),
      73("11001000"), 74("11001001"), 75("11001010"), 76("11001011"), 77("11001100"), 78("11001101"), 79("11001110"), 80("11001111"),
      81("11010000"), 82("11010001"), 83("11010010"), 84("11010011"), 85("11010100"), 86("11010101"), 87("11010110"), 88("11010111"),
      89("11011000"), 90("11011001"), 91("11011010"), 92("11011011"), 93("11011100"), 94("11011101"), 95("11011110"), 96("11011111"),
    97("11100000"), 98("11100001"), 99("11100010"),100("11100011"),101("11100100"),102("11100101"),103("11100110"),104("11100111"),
 105("11101000"),106("11101001"),107("11101010"),108("11101011"),109("11101100"),110("11101101"),111("11101110"),112("11101111"),
 113("11110000"),114("11110001"),115("11110010"),116("11110011"),117("11110100"),118("11110101"),119("11110110"),120("11110111"),
 121("11111000"),122("11111001"),123("11111010"),124("11111011"),125("11111100"),126("11111101"),127("11111110"),128("11111111")

first byte numbers of found puzzles (starting at eighth where is the whole byte). 51 whole byte + 7 non-integer initial(1001100,110001,10101,1000,111,11,1).

97 106 1 17 40 36 37 82 74 60 67 47 83 94 56 43, 93 126 81 86 90 64 119 123 57 85 83 22 30 59 9 23 106 42 41 88 97 18 60 90 46 59 11 107 112 65 14 86 30 118 50

On these 51 bytes 5 repetitions with the maximum step between them 13, 83-83. How can this be used, by removing the last 10 bytes from the table for example.

   1("10000000"),  2("10000001") ,   3("10000010" ),  4("10000011"),  5("10000100") ,  6("10000101")     , 7("10000110") ,  8("10000111"),
   9("10001000"), 10("10001001") ,  11                 , 12("10001011"), 13("10001100"),  14                    , 15("10001110"), 16("10001111"),
  17("10010000"), 18("10010001"),  19("10010010"), 20("10010011"), 21("10010100"),  22("10010101")   , 23("10010110"), 24("10010111"),
  25("10011000"), 26("10011001"),  27("10011010"), 28("10011011"), 29("10011100"),  30                    , 31("10011110"), 32("10011111"),
  33("10100000"), 34("10100001"),  35("10100010"), 36("10100011"), 37("10100100"),  38("10100101")   , 39("10100110"), 40("10100111"),
  41("10101000"), 42("10101001"),  43("10101010"), 44("10101011"), 45("10101100"),  46("10101101")   , 47("10101110"), 48("10101111"),
  49("10110000"), 50                 ,  51("10110010"), 52("10110011"), 53("10110100"),  54("10110101")   , 55("10110110"), 56("10110111"),
  57("10111000"), 58("10111001"),  59                 , 60("10111011"), 61("10111100"),  62("10111101")   , 63("10111110"), 64("10111111"),
  65                 , 66("11000001"),  67("11000010"), 68("11000011"), 69("11000100"),  70("11000101")   , 71("11000110"), 72("11000111"),
  73("11001000"), 74("11001001"), 75("11001010") , 76("11001011"), 77("11001100"),  78("11001101")   , 79("11001110"), 80("11001111"),
  81("11010000"), 82("11010001"), 83("11010010") , 84("11010011"), 85("11010100"),  86                    , 87("11010110"), 88("11010111"),
  89("11011000"), 90("11011001"), 91("11011010") , 92("11011011"), 93("11011100"),  94("11011101")  , 95("11011110"), 96("11011111"),
  97("11100000"), 98("11100001"), 99("11100010") ,100("11100011"),101("11100100"), 102("11100101"),103("11100110"),104("11100111"),
 105("11101000"),106("11101001"),107                 ,108("11101011"),109("11101100"),110("11101101"),111("11101110"),112                 ,
 113("11110000"),114("11110001"),115("11110010"),116("11110011"),117("11110100"),118                 ,119("11110110"),120("11110111"),
 121("11111000"),122("11111001"),123("11111010"),124("11111011"),125("11111100"),126("11111101"),127("11111110"),128("11111111")

In the puzzle 160 steps (don’t know what a madman will look for 150-160 puzzles even if hypothetically a large collider seeks for collisions no higher "The effective search space until a collision is found is 134.58 bits (See here why).") and 128 possible initial bytes, - 7 initial non-full, 153-128=25 at least 25 repetitions are possible (Minimum 20, 5 already). If random when creating the puzzle worked to create the greatest difference maybe he will go through all the initial bytes therefore, they are already used can be discarded.

***

Or for specifically that table with numbers time finding 3 bytes of initial. We take the whole initial numbers. It is understandable the closer to the beginning of bytes, the faster the time for finding a combination of three.

Quote
                                                                                                                     0  111  101                              sec      N
10110001 10011101 01101110 0001010010000110001001101000100001 33-25  10  2    3        11640174 B19D6E 2.0      50
11110101 10010010 11100100 100000111100101011101011000011100 28-29    11  2    2        16093924 F592E4 4.9      118
10011101 00011000 10110110 00111010110001001111111111011111 22-34      12  1    3        10295478 9D18B6 1.2      30
11010101 01111100 00111111 0011011011001111110000100010100 24-31        8   3    2        13990975 D57C3F 3.7      86
10001101 10111110 11011011 010101101011010001111101000100 23-31          8   1    5        9289435  8DBEDB 0.6      14
11000000 00111100 01000111 00100011111100011001001101100 29-24           14  2    0        12598343 C03C47 2.6      65
11101111 10101110 00010110 0100110010111001111000111100 22-30             9   3    3        15707670 EFAE16 4.6      112
11101010 00001110 00010100 001101000000000100111010000 33-18              14  2    2        15339028 EA0E14 4.5      107
10001010 11110101 00001111 00001011101001001101010100 26-24               11  2    2         9106703  8AF50F 0.4      11
10111010 00001011 10110101 1000000010101111101001101 24-25                 11  2    5        12192693 BA0BB5 2.3      59
10101101 11100110 11010111 110011100011101110011011  17-31                  8   2    4        11396823 ADE6D7 1.9      46
11011001 10101100 00100001 01101010011110010111010  23-24                   13  0    2        14265377 D9AC21 3.6      90
10111011 00000110 00001110 0010001101010101000100 27-19                      13  2    2        12256782 BB060E 2.4      60
10010001 01111110 01010000 101000011110000000101 26 -19                       13  2    2        9535056  917E50 0.7      18
11100000 00101011 00110101 10100011010110001111 22-22                         13  1    2        14691125 E02B35 4.0      97
11010111 10100111 01100100 1111100010110010001 19-24                          10  2    3        14133092 D7A764 3.6      88
10101000 10001000 01110001 011000110110001111 23-19                            15  1    1        11044977 A88871 1.5      41
10101001 11000011 01001101 01100110001011011 20-21                             12  1    3        11125581 A9C34D 1.7      42
11101001 10101110 01001001 0011001111010110  18-22                             11  2    2         15314505 E9AE49 4.3      106
10010110 10111111 00000110 000001111101001  19-20                              11  2    2         9879302  96BF06  0.9      23
10001000 11100000 10111110 10110011010000 21-17                                 13  2    1         8970430  88E0BE  0.3      9
10111010 10111011 10101011 0101010010011 14 -22                                  8   3    6         12237739 BABBAB 2.3      59
10011101 11101000 00100000 101001111100 19- 17                                   14  2    2         10348576 9DE820 1.2      30
10010101 11011010 01000010 00101110000 20-15                                     13  1    3          9820738  95DA42 0.9      22
11010010 10011001 01100100 0100011101 18-16                                       13  0    3         13801828 D29964 3.3      83
11010100 10110110 01010100 011011000 17-16                                         12  0    4         13940308 D4B654 3.3      85
10111000 01100010 10100110 00101110  17-15                                         13  1    2         12083878 B862A6 2.2      57
11111010 10011111 11001110 1000111  10-21                                           7   4    1         16424910 FA9FCE 4.9 (7) 123
11110110 01010011 00110101 100100 14-16                                             10  1    3         16143157 F65335 4.8      119
10111111 00010010 10101000 11110 13-16                                               12  2    3        12522152 BF12A8  2.6      64
11011001 00010110 11001110 1000 14-14                                                 11  1    3        14227150 D916CE 3.7      90
11010101 10000111 00001110 101 13-14                                                  12  2    2        13993742 D5870E  3.5      86
11010000 00001100 10011011 10 15-11                                                   14  0    2         13634715 D00C9B 3.2      81
11111101 00101111 01110010 1 8-17                                                       8   4    3         16592754 FD2F72 5.2      126
11011100 00101010 00000100  15-9                                                        15  1    2         14428676 DC2A04 3.8      93


93 126 81 86 90 64 119 123 57 85 83 22 30 59 9 23 106 42 41 88 97 18 60 90 46 59 11 107 112 65 14 86 30 118 50
3   5     3   3  3   2   4    4    2   3   3   0   1   2  0 0   4    1   1   3   4  0   2   3   1   2    0   4    4    2  0   3   1   4   2

=>===<>><==<<<==><<=><<=<<<>><<=<><
35333244233012004113402312044203142
[/size]

Here we see that after the two so far followed 2(4),2(3),2(0). 2(1),2(2) did not have. It means 101 disappears. 100 questionable. More likely 110 111.
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 09, 2018, 08:33:21 PM
 #575

shit ok yeah i see i do really wrong thanks for show me the right.

you have to know i am only interested in this i really know not much about that whole thing Smiley

i learn this all by myself
PietCoin97
Jr. Member
*
Offline Offline

Activity: 60
Merit: 1


View Profile
December 10, 2018, 10:09:23 PM
 #576

If the public key is revealed it is still safe from bruteforce if the attacker don't know the range of bits to search for?

Of course.
Many blocks mined by Satoshi have txs with "pay to public key" script (P2PK) instead of "pay to public key hash" script (P2PKH, pay to address).

The public keys are known, but the btc are still there:

block #100

https://www.blockchain.com/it/btc/tx/2d05f0c9c3e1c226e63b5fac240137687544cf631cd616fd34fd188fc9020866

PUSHDATA(65)[04e70a02f5af48a1989bf630d92523c9d14c45c75f7d1b998e962bff6ff9995fc5bdb44f1793b3749 5d80324acba7c8f537caaf8432b8d47987313060cc82d8a93] CHECKSIG

Code:
x = e70a02f5af48a1989bf630d92523c9d14c45c75f7d1b998e962bff6ff9995fc5

y = bdb44f1793b37495d80324acba7c8f537caaf8432b8d47987313060cc82d8a93

hey arulbero

mabey someone found keys for these addresses ?

or am i wrong ?

https://www.blockchain.com/btc/address/1E9jNPoV7R14mzgcoZcGn6fjHGq7FdfbFv
racminer
Member
**
Offline Offline

Activity: 193
Merit: 16


View Profile
December 11, 2018, 09:44:35 PM
 #577

If the public key is revealed it is still safe from bruteforce if the attacker don't know the range of bits to search for?

Of course.
Many blocks mined by Satoshi have txs with "pay to public key" script (P2PK) instead of "pay to public key hash" script (P2PKH, pay to address).

The public keys are known, but the btc are still there:

block #100

https://www.blockchain.com/it/btc/tx/2d05f0c9c3e1c226e63b5fac240137687544cf631cd616fd34fd188fc9020866

PUSHDATA(65)[04e70a02f5af48a1989bf630d92523c9d14c45c75f7d1b998e962bff6ff9995fc5bdb44f1793b3749 5d80324acba7c8f537caaf8432b8d47987313060cc82d8a93] CHECKSIG

Code:
x = e70a02f5af48a1989bf630d92523c9d14c45c75f7d1b998e962bff6ff9995fc5

y = bdb44f1793b37495d80324acba7c8f537caaf8432b8d47987313060cc82d8a93

hey arulbero

mabey someone found keys for these addresses ?

or am i wrong ?

https://www.blockchain.com/btc/address/1E9jNPoV7R14mzgcoZcGn6fjHGq7FdfbFv

Hi

look at the date 2011-06-11 12:57:32
those where normally mined blocks that where normally spent back then.  Smiley

unlike this one  https://www.blockchain.com/it/btc/tx/2d05f0c9c3e1c226e63b5fac240137687544cf631cd616fd34fd188fc9020866  mined on 2009-01-11 08:00:25 when BTC was not worth a penny !

the first mined block on 2009-01-09 02:54:25  is still unspent  https://www.blockchain.com/fr/btc/address/12c6DSiU4Rq3P4ZxziKxzrL5LmMBrzjrJX 
racminer
Member
**
Offline Offline

Activity: 193
Merit: 16


View Profile
December 12, 2018, 01:09:22 PM
 #578

Hi

I have a suggestion to everyone here interested in solving case #59
We know for sure that the private key looks like:

04XX PPPP PPPP PPPP  or
05XX PPPP PPPP PPPP  or
06XX PPPP PPPP PPPP  or
07XX PPPP PPPP PPPP

the range PPPP PPPP PPPP can be scanned with a single RX480 using bitcrack  in about ten days

from 400 to 7FF we have 1023 possibles cases

we could split the workload and create a peer to peer method (via private messages here + trust + honesty  Roll Eyes ) and exchange ruled out scanned ranges.
the lucky one will get the prize  Smiley
anyone interested?
Andzhig
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile
December 12, 2018, 04:33:02 PM
 #579

Hi

I have a suggestion to everyone here interested in solving case #59
We know for sure that the private key looks like:

04XX PPPP PPPP PPPP  or
05XX PPPP PPPP PPPP  or
06XX PPPP PPPP PPPP  or
07XX PPPP PPPP PPPP

the range PPPP PPPP PPPP can be scanned with a single RX480 using bitcrack  in about ten days

from 400 to 7FF we have 1023 possibles cases

we could split the workload and create a peer to peer method (via private messages here + trust + honesty  Roll Eyes ) and exchange ruled out scanned ranges.
the lucky one will get the prize  Smiley
anyone interested?

It is unlikely, here, to find a sufficient number of people willing, so that from this idea it would turn out to be something worthwhile. Moreover, no need to reinvent the wheel, LBC already exists. And I am tormented by vague doubts that there is such a number (I think it's a "little" more.). "from 400 to 7FF we have 1023 possibles cases"
racminer
Member
**
Offline Offline

Activity: 193
Merit: 16


View Profile
December 12, 2018, 05:18:11 PM
Last edit: December 13, 2018, 11:14:25 AM by racminer
 #580

Hi

I have a suggestion to everyone here interested in solving case #59
We know for sure that the private key looks like:

04XX PPPP PPPP PPPP  or
05XX PPPP PPPP PPPP  or
06XX PPPP PPPP PPPP  or
07XX PPPP PPPP PPPP

the range PPPP PPPP PPPP can be scanned with a single RX480 using bitcrack  in about ten days

from 400 to 7FF we have 1023 possibles cases

we could split the workload and create a peer to peer method (via private messages here + trust + honesty  Roll Eyes ) and exchange ruled out scanned ranges.
the lucky one will get the prize  Smiley
anyone interested?

It is unlikely, here, to find a sufficient number of people willing, so that from this idea it would turn out to be something worthwhile. Moreover, no need to reinvent the wheel, LBC already exists. And I am tormented by vague doubts that there is such a number (I think it's a "little" more.). "from 400 to 7FF we have 1023 possibles cases"

Of course I am aware of LBC Smiley but what I suggest is not the same spirit.  About the 1023 cases, it is oubious Smiley  no need to get "tormented by vague doubts", it's just simple arithmetic.
( 07FF FFFF FFFF FFFF - 0400 0000 0000 0000 ) = 288230376151711743 keys
   FFFF FFFF FFFF = 281474976710655

288230376151711743/(281474976710655+1) = 1023

do you still have doubts ?

 

Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!