Bitcoin Forum
November 18, 2024, 08:25:10 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 335 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 227223 times)
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 04:12:47 PM
Last edit: December 28, 2015, 07:16:34 PM by Bulista
Merited by vapourminer (1), LoyceV (1), dragonvslinux (1), th3nolo (1)
 #1

Hi guys,

In continuation to this thread: https://bitcointalk.org/index.php?topic=1305887.0

While playing around with my bot, I found out this mysterious transaction:

https://blockchain.info/tx/08389f34c98c606322740c0be6a7125d9860bb8d5cb182c02f98461e5fa6cd15

those 32.896 BTC were sent to multiple addresses, all the private keys of those addresses seem to be generated by some kind of formula.

For example:

Address 2:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU74sHUHy8S
1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb
Biginteger PVK value: 3
Hex PVK value: 3

Address 3:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU76rnZwVdz
19ZewH8Kk1PDbSNdJ97FP4EiCjTRaZMZQA
Biginteger PVK value: 7
Hex PVK value: 7

Address 4:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU77MfhviY5
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e
Biginteger PVK value: 8
Hex PVK value: 8

Address 5:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7Dq8Au4Pv
1E6NuFjCi27W5zoXg8TRdcSRq84zJeBW3k
Biginteger PVK value: 21
Hex PVK value: 15

Address 6:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7Tmu6qHxS
1PitScNLyp2HCygzadCh7FveTnfmpPbfp8
Biginteger PVK value: 49
Hex PVK value: 31

Address 7:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU7hDgvu64y
1McVt1vMtCC7yn5b9wgX1833yCcLXzueeC
Biginteger PVK value: 76
Hex PVK value: 4C

Address 8:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFU8xvGK1zpm
1M92tSqNmQLYw33fuBvjmeadirh1ysMBxK
Biginteger PVK value: 224
Hex PVK value: E0

Address 9:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUB3vfDKcxZ
1CQFwcjw1dwhtkVWBttNLDtqL7ivBonGPV
Biginteger PVK value: 467
Hex PVK value: 1d3

Address 10:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUBTL67V6dE
1LeBZP5QCwwgXRtmVUvTVrraqPUokyLHqe
Biginteger PVK value: 514
Hex PVK value: 202

Address 11:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUGxXgtm63M
1PgQVLmst3Z314JrQn5TNiys8Hc38TcXJu
Biginteger PVK value: 1155
Hex PVK value: 483

Address 12:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUW5RtS2JN1
1DBaumZxUkM4qMQRt2LVWyFJq5kDtSZQot
Biginteger PVK value: 2683
Hex PVK value: a7b

Address 13:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFUspniiQZds
1Pie8JkxBT6MGPz9Nvi3fsPkr2D8q3GBc1
Biginteger PVK value: 5216
Hex PVK value: 1460

Address 14:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFVfZyiN5iEG
1ErZWg5cFCe4Vw5BzgfzB74VNLaXEiEkhk
Biginteger PVK value: 10544
Hex PVK value: 2930

and so on...

until the addresses 50 (1MEzite4ReNuWaL5Ds17ePKt2dCxWEofwk) it was already cracked by someone.

Any ideas what's the formula behind the generation of these addresses?

Address 2, pvk decimal value: 3
Address 3, pvk decimal value: 7
Address 4, pvk decimal value: 8
Address 5, pvk decimal value: 21
Address 6, pvk decimal value: 49
Address 7, pvk decimal value: 76
Address 8, pvk decimal value: 224
Address 9, pvk decimal value: 467
Address 10, pvk decimal value: 514
Address 11, pvk decimal value: 1155
Address 12, pvk decimal value: 2683
Address 13, pvk decimal value: 5216
Address 14, pvk decimal value: 10544
Address 15 and after, pvk decimal value: ?

The prize would be ~32 BTC Smiley

EDIT: If you find the solution feel free to leave a tip Smiley 1DPUhjHvd2K4ZkycVHEJiN6wba79j5V1u3
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 06:06:43 PM
 #2

As BurtW also pointed out the transaction values increase from from 0.001 to 0.256, according to the address position.

Lets start by what we know:

The BTC values of the outputs (0.001 through 0.256) are obviously the sequence numbers and the private keys are the sequence values.

How many of the sequence values do we already know (have been found by brute force)?  

Is the list in this thread the entire list of known values from the sequence?

here are the other pvk decimal values I was able to find:

Address 15: 26867
Address 16: 51510
Address 17: 95823
Address 18: 198669
Address 19: 357535
Address 20: ?
Erkallys
Legendary
*
Offline Offline

Activity: 1120
Merit: 1004



View Profile
December 28, 2015, 06:12:52 PM
 #3

I don't know why but I'm smelling a big scam. Because a newbie that offer more than 12 000€ to solve a following of numbers this is strange...
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1012


View Profile
December 28, 2015, 06:16:45 PM
 #4

Any info on who published this puzzle and what's their goal? Also, how would one go on about calculating those pvk decimal values and covert them to the private keys?

I don't know why but I'm smelling a big scam. Because a newbie that offer more than 12 000€ to solve a following of numbers this is strange...

The OP is not offering anything
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 06:18:01 PM
 #5

More details of the new values, including pvks and publics

Address 15:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFY5iMZbuRxj
1QCbW9HWnwQWiQqVo5exhAnmfqKRrCRsvW
pvk decimal value: 26867
pvk hex value: 68F3

Address 16:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFbjHrFMWzJp
1BDyrQ6WoF8VN3g9SAS1iKZcPzFfnDVieY
pvk decimal value: 51510
pvk hex value: C936

Address 17:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFiHkRsp99uC
1HduPEXZRdG26SUT5Yk83mLkPyjnZuJ7Bm
pvk decimal value: 95823
pvk hex value: 1764F

Address 18:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rFyWkjT5fywW
1GnNTmTVLZiqQfLbAdp9DVdicEnB5GoERE
pvk decimal value: 198669
pvk hex value: 3080D

Address 19:

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rGP2jMrxCfX3
1NWmZRpHH4XSPwsW6dsS3nrNWfL1yrJj4w
pvk decimal value: 357535
pvk hex value: 5749F
Erkallys
Legendary
*
Offline Offline

Activity: 1120
Merit: 1004



View Profile
December 28, 2015, 06:20:04 PM
 #6

Any info on who published this puzzle and what's their goal? Also, how would one go on about calculating those pvk decimal values and covert them to the private keys?

I don't know why but I'm smelling a big scam. Because a newbie that offer more than 12 000€ to solve a following of numbers this is strange...

The OP is not offering anything

Oh, in that case I'm sorry. I thought it was him who was offering this. So who's offering it ?
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 06:25:09 PM
Merited by vapourminer (1)
 #7

Any info on who published this puzzle and what's their goal? Also, how would one go on about calculating those pvk decimal values and covert them to the private keys?

I don't know why but I'm smelling a big scam. Because a newbie that offer more than 12 000€ to solve a following of numbers this is strange...

The OP is not offering anything

I have no idea about who created this transactions, I was just playing around with the bot and stumbled upon it.

After reviewing a bunch of pvks found by the bot I noticed that many of the addresses were on the same transaction, after checking closely I found those kind of sequence patterns.

Looks tempting to crack Smiley

One thing I noticed:

The first address in the transaction is tagged on blockchain.info with "1st Bitcoin Address Compressed".

So probably this transaction was done by the Bitcoin devs? or even... satoshi?
Bitcoinpro
Legendary
*
Offline Offline

Activity: 1358
Merit: 1000



View Profile
December 28, 2015, 06:34:53 PM
 #8

looks really easy to crack

why would reward be so high

WWW.FACEBOOK.COM

CRYPTOCURRENCY CENTRAL BANK

LTC: LP7bcFENVL9vdmUVea1M6FMyjSmUfsMVYf
TreasureSeeker
Sr. Member
****
Offline Offline

Activity: 455
Merit: 251



View Profile WWW
December 28, 2015, 06:35:32 PM
 #9

The transactions seem to originate from address 173ujrhEVGqaZvPHXLqwXiSmPVMo225cqT  which had a Total received amount of   56,457.80848111 BTC and a Final Balance of    312.04932734 BTC

Definitely a very big player of some kind.

Fun & Friendly p2pool Mining at TreasureQuarry.  Litecoin http://litecoin.treasurequarry.com:9327 Dash p2pool  http://dash.treasurequarry.com:7903
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 06:42:37 PM
 #10

The transactions seem to originate from address 173ujrhEVGqaZvPHXLqwXiSmPVMo225cqT  which had a Total received amount of   56,457.80848111 BTC and a Final Balance of    312.04932734 BTC

Definitely a very big player of some kind.

Well spotted.

Also it looks active, there are daily transactions there.

Probably some exchange?
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 06:49:31 PM
 #11

looks really easy to crack

why would reward be so high

It's not easy, trust me.

But go ahead, maybe you can crack it.
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1012


View Profile
December 28, 2015, 06:49:38 PM
 #12

Looks tempting to crack Smiley

It does, but I still haven't understand the method/how does one go to attempt and find the solution to the puzzle Cheesy


One thing I noticed:

The first address in the transaction is tagged on blockchain.info with "1st Bitcoin Address Compressed".

So probably this transaction was done by the Bitcoin devs? or even... satoshi?

This hardly has anything to to with any of them.

looks really easy to crack

why would reward be so high

Suggestions are always welcome.
BurtW
Legendary
*
Offline Offline

Activity: 2646
Merit: 1138

All paid signature campaigns should be banned.


View Profile WWW
December 28, 2015, 06:51:17 PM
Merited by vapourminer (1)
 #13

I see a pattern but I do not think it will help much.

My conjecture is that the sequence number (the BTC amount) simply states the number of random bits in the private key.

Check it out:

The 0.001 BTC output used a 1 bit key (already claimed obviously)

The 0.002 BTC output used a 2 bit key

The 0.003 BTC output used a 3 bit key

etc...

The 0.019 BTC output used a 19 bit key

So I would claim the next unclaimed output uses a 51 bit key.

Our family was terrorized by Homeland Security.  Read all about it here:  http://www.jmwagner.com/ and http://www.burtw.com/  Any donations to help us recover from the $300,000 in legal fees and forced donations to the Federal Asset Forfeiture slush fund are greatly appreciated!
shorena
Copper Member
Legendary
*
Offline Offline

Activity: 1498
Merit: 1540


No I dont escrow anymore.


View Profile
December 28, 2015, 06:53:03 PM
 #14

-snip-
Suggestions are always welcome.

The brute force way: Start @ ~607809 (multiplied the last known value by 1.7) convert to hex, create addresses, check if one address matches the next in turn.


Im not really here, its just your imagination.
BurtW
Legendary
*
Offline Offline

Activity: 2646
Merit: 1138

All paid signature campaigns should be banned.


View Profile WWW
December 28, 2015, 06:53:40 PM
 #15

BEFORE you comment on this thread

1) Carefully READ the thread
2) Think

Then please comment.

We don't need any off topic comments unrelated to the puzzle at hand.

Our family was terrorized by Homeland Security.  Read all about it here:  http://www.jmwagner.com/ and http://www.burtw.com/  Any donations to help us recover from the $300,000 in legal fees and forced donations to the Federal Asset Forfeiture slush fund are greatly appreciated!
shorena
Copper Member
Legendary
*
Offline Offline

Activity: 1498
Merit: 1540


No I dont escrow anymore.


View Profile
December 28, 2015, 06:55:43 PM
 #16

I see a pattern but I do not think it will help much.

My conjecture is that the sequence number (the BTC amount) simply states the number of random bits in the private key.

Check it out:

The 0.001 BTC output used a 1 bit key (already claimed obviously)

The 0.002 BTC output used a 2 bit key

The 0.003 BTC output used a 3 bit key

etc...

The 0.019 BTC output used a 19 bit key

So I would claim the next unclaimed output uses a 51 bit key.

So, there is no pattern? Its just getting more and more difficult to find a solution? Might be time to get something written for GPUs.

Im not really here, its just your imagination.
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1012


View Profile
December 28, 2015, 07:17:43 PM
 #17

-snip-
Suggestions are always welcome.

The brute force way: Start @ ~607809 (multiplied the last known value by 1.7) convert to hex, create addresses, check if one address matches the next in turn.



What would be the best tool to attack this in a brute force way while we all think on something better or discover a easier way?
Bulista (OP)
Member
**
Offline Offline

Activity: 169
Merit: 25


View Profile
December 28, 2015, 07:26:29 PM
 #18

-snip-
Suggestions are always welcome.

The brute force way: Start @ ~607809 (multiplied the last known value by 1.7) convert to hex, create addresses, check if one address matches the next in turn.



What would be the best tool to attack this in a brute force way while we all think on something better or discover a easier way?

Some GPU bot would be the best to brute force it, like shorena was saying.

Need to code one, but I'm not in the mood now Smiley

Anyone out there doing it? Or maybe there is something existing?
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1012


View Profile
December 28, 2015, 07:33:59 PM
 #19

Or maybe there is something existing?

That was the aim of my post, such a tool probably already exists.
shorena
Copper Member
Legendary
*
Offline Offline

Activity: 1498
Merit: 1540


No I dont escrow anymore.


View Profile
December 28, 2015, 07:35:29 PM
 #20

-snip-
Suggestions are always welcome.

The brute force way: Start @ ~607809 (multiplied the last known value by 1.7) convert to hex, create addresses, check if one address matches the next in turn.



What would be the best tool to attack this in a brute force way while we all think on something better or discover a easier way?

Some GPU bot would be the best to brute force it, like shorena was saying.

Need to code one, but I'm not in the mood now Smiley

Anyone out there doing it? Or maybe there is something existing?

I think the best existing tool currently is yours or otherwise private. I would think the best way would be to modify (ocl)vanitygen according to BurtW's suggestion. You would need to limit the random number generator to a certain amount of bits and keep the rest.

Im not really here, its just your imagination.
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 335 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!