PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 07, 2018, 06:22:43 PM |
|
C:\Users\Miner\Desktop> 533254865834117451 1HW7FaFCwK3SLXH1zpfxX93Z7FLP7acK5S 00000000000000000000000000000000000000000000000007668079a4ca894b 0b11101100110100000000111100110100100110010101000100101001011 C:\Users\Miner\Desktop\BitCrack-master>cdstart "C:\Users\Miner\Desktop\BitCrack-master" /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000007668079a4ca894b C:\Users\Miner\Desktop>
cd "C:\Users\Miner\Desktop\BitCrack-master"
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000007668079a4ca894b
C:\Users\Miner\Desktop\BitCrack-master>start542563419171164525 1Kb65sRL1aSwSdVozB2N5TBPTzbweaUbix 0000000000000000000000000000000000000000000000000787928e1bd1916d 0b11110000111100100101000111000011011110100011001000101101101 /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000787928e1bd1916d
C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master" 552942365625655711 1KiYZF6wfuG6Z2BKSLkVaSNtcSwUYaHxzL 00000000000000000000000000000000000000000000000007ac7226e461a19f 0b11110101100011100100010011011100100011000011010000110011111
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000007ac7226e461a19f
438802464588486901 1CcmX8jJpVyvB199WniyaNr9h6ugBNq3BX 0000000000000000000000000000000000000000000000000616f084445cd8f5 0b11000010110111100001000010001000100010111001101100011110101 C:\Users\Miner\Desktop> C:\Users\Miner\Desktop>cdcd "C:\Users\Miner\Desktop\BitCrack-master" "C:\Users\Miner\Desktop\BitCrack-master"
441982445053163826 1Ja7o7GJhKfeJrRPk3Xgg3iLXofkJW7HdP 00000000000000000000000000000000000000000000000006223cb12a5a3932 0b11000100010001111001011000100101010010110100011100100110010
C:\Users\Miner\Desktop\BitCrack-master>C:\Users\Miner\Desktop\BitCrack-master>startstart /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000006223cb12a5a3932 /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000006223cb12a5a3932
C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"
452060289090857845 12Dr632u9Emzvv21mTbUjbXLfhZCC665Hk 00000000000000000000000000000000000000000000000006460a7014522b75 0b11001000110000010100111000000010100010100100010101101110101 C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 00000000000000000000000000000000000000000000000006460a7014522b75
469739005230228692 193R7ww6QUsbRvZ85CbGoQjk74Gs4qUkWY 0000000000000000000000000000000000000000000000000684d922efe4a4d4 0b11010000100110110010010001011101111111001001010010011010100 C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"
C:\Users\Miner\Desktop\BitCrack-master>C:\Users\Miner\Desktop>startcd /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000684d922efe4a4d4 "C:\Users\Miner\Desktop\BitCrack-master"
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000692e629a8ebbda6 473693977429392806 13JmKF9mDns5qtg9ReKEWHJhuH3micpXi6 0000000000000000000000000000000000000000000000000692e629a8ebbda6 0b11010010010111001100010100110101000111010111011110110100110
C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master"
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 0000000000000000000000000000000000000000000000000692e629a8ebbda6 488849425605668981 1B25uxVCPXAqbwRXDGdKJ7HsHxC3KNJwok 00000000000000000000000000000000000000000000000006c8bdf669e13075 0b11011001000101111011111011001101001111000010011000001110101
C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master" 507448557522984509 14v9AW7NN4Q3UBepWfMH5rgSvGTe1QTJ4H 000000000000000000000000000000000000000000000000070ad1c644f11e3d 0b11100001010110100011100011001000100111100010001111000111101
C:\Users\Miner\Desktop>cd "C:\Users\Miner\Desktop\BitCrack-master" C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 000000000000000000000000000000000000000000000000070ad1c644f11e3d
C:\Users\Miner\Desktop\BitCrack-master>start /min cuBitCrack -d 0 -i 87k.txt -c -u -o found0.txt -b 15 -t 512 -p 15 -s 000000000000000000000000000000000000000000000000070ad1c644f11e3d
i only get this when is start.
|
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 07, 2018, 06:35:24 PM |
|
Settings, anyway, will have to sort out. You have such -b 15 -t 512 -p 4120 why did you choose -b 15? Let's try these -b 32 -t 256 -p 512 for 10 copies.
because with your settings -b 32 -t 256 -p 512 i get only 129 Mkeys and with my settings -b 15 -t 512 -p 4125 (for more copies lower number) i get 245 Mkeys not understood. Only this will write or that you indicate to him in the "print (blablabla)". python 3 just run bitcrack so that it does not start manually. Can run from python idle, can simply double click on the blablabla.py file script without idle. you have to understand i am not a coder i learn the basics from python but this was a while ago. and i start not with the IDLE i start normal as you say
|
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 07, 2018, 06:53:11 PM |
|
Try to run bitcrack in python.
It’s hard to say how best to look for 1 video card at full speed or run multiple copies of the program for one card at a lower speed but with more space options. Depends on the setting.
Here is an example script for 20 copies of the program on 1 video card with minimal settings ( apologize, the code may look more compact, I don’t bother with that much).
My setup example cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 15 -s where new1.txt address list, find.txt file for dropping found, -c -u comp, uncomp addresses we are also looking for collisions, -b 32 -t 256 -p 15 directly settings for video card it is necessary to select a compromise between the number of copies of the program, or rather the minimum ones at which the program will not begin to crash.
for work script copy bitcrack prog. files to dir C:\crackbit ,in it to throw the file with addresses and name new1.txt create empty file find.txt. Create empty file with extension on C:\testpy.cmd
Or rename to your own in the python editor itself Edite\Replace... Replace All... i tought when i run this python script for every search space there opens a new cmd file with Bitcrack and this search 180sec in random space. so when we have 20 copies there are 20 cmd windows with started Bitcrack and after 180sec it will cancel and start auto with new random search space
|
|
|
|
Andzhig
Jr. Member
Offline
Activity: 184
Merit: 3
|
|
December 07, 2018, 07:46:49 PM |
|
you have to understand i am not a coder i learn the basics from python but this was a while ago. Me too about 10 years ago assembler even under ms-dos taught)) From examples from the Internet glued. Can be without .cmd run, there damn head break, figure out how.)) If you still have experience in this matter, then if necessary, you will understand how it is more convenient for you to make a program. There are lots of options. Take the dec range convert to bin, filter (if necessary) back to dec and on... Take any combinations, organization of zeros, ones.. bits, bytes. Or create a list of options to a file and binomial randomly choose from it. Or, alternatively, take out the leaves from the pouch while in deep trance.
|
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 07, 2018, 07:55:12 PM |
|
hahaha yeah ok but i like your strategy can you code something what i wrote at last ?
|
|
|
|
Andzhig
Jr. Member
Offline
Activity: 184
Merit: 3
|
|
December 08, 2018, 03:43:14 AM Last edit: December 08, 2018, 06:32:25 AM by Andzhig |
|
what i wrote at last ? You mean this? https://bitcointalk.org/index.php?topic=1306983.msg48483082#msg48483082 or i tought when i run this python script for every search space there opens a new cmd file with Bitcrack and this search 180sec in random space.
In the first case, there would be more explanation of what the table means, In the second case (if I understand you correctly), bitcrack does not know how (currently not implemented in the program) to sort randomly in a given range, so the only option is to reduce the search time for the start of the next random part and step by step from smaller value to bigger.. *** Since we have 4 repetitions 11110101 1001001011100100 100000111100101011101011000011100 28-29 11 2 2 16093924 F592E4 11101001 1010111001001001 0011001111010110 18-22 11 2 2 15314505 E9AE49 10010110 1011111100000110 000001111101001 19-20 11 2 2 9879302 96BF06 10001010 1111010100001111 00001011101001001101010100 26-24 11 2 2 9106703 8AF50F the script takes the same initial bytes 11110101 11101001 10010110 10001010 and through the filter produces 10 options for subsequent puzzles. running time 600 sec = 10 min. Or take ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"), ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), and drive a week)) The truth is there is a miss in space 147573952589676412928 - 295147905179352825856. 295147905179352825856−45147905179352825856=250000000000000000000 110110001101011100100110 10110111000101110111101010000000000000000000 14210854 14210854* 2 44 times 249999987418033291264 250000000000000000000-249999987418033291264=~12581966708736 fourteen digit number, how many 1 2080ti squeezes 1000mk\s ~ 3 hours apparently. may have, further, take the first not 3 but 4 bytes... Variant with filter 11 zeros, 2 111, 2 101. import random from bitcoin import * import subprocess import time #from PyRandLib import * #rand = FastRand63() #random.seed(rand())
#l1= [("11010000")]
l1= [("11110101"),("10001010"),("11101001"),("10010110")] l2= [("10000000"),("10000001"),("10000010"),("10000011"),("10000100"),("10000101"),("10000110"),("10000111"), ("10001000"),("10001001"),("10001010"),("10001011"),("10001100"),("10001101"),("10001110"),("10001111"), ("10010000"),("10010001"),("10010010"),("10010011"),("10010100"),("10010101"),("10010110"),("10010111"), ("10011000"),("10011001"),("10011010"),("10011011"),("10011100"),("10011101"),("10011110"),("10011111"), ("10100000"),("10100001"),("10100010"),("10100011"),("10100100"),("10100101"),("10100110"),("10100111"), ("10101000"),("10101001"),("10101010"),("10101011"),("10101100"),("10101101"),("10101110"),("10101111"), ("10110000"),("10110001"),("10110010"),("10110011"),("10110100"),("10110101"),("10110110"),("10110111"), ("10111000"),("10111001"),("10111010"),("10111011"),("10111100"),("10111101"),("10111110"),("10111111"), ("11000000"),("11000001"),("11000010"),("11000011"),("11000100"),("11000101"),("11000110"),("11000111"), ("11001000"),("11001001"),("11001010"),("11001011"),("11001100"),("11001101"),("11001110"),("11001111"), ("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"), ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111"), ("11100000"),("11100001"),("11100010"),("11100011"),("11100100"),("11100101"),("11100110"),("11100111"), ("11101000"),("11101001"),("11101010"),("11101011"),("11101100"),("11101101"),("11101110"),("11101111"), ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"), ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), ("00000000"),("00000001"),("00000010"),("00000011"),("00000100"),("00000101"),("00000110"),("00000111"), ("00001000"),("00001001"),("00001010"),("00001011"),("00001100"),("00001101"),("00001110"),("00001111"), ("00010000"),("00010001"),("00010010"),("00010011"),("00010100"),("00010101"),("00010110"),("00010111"), ("00011000"),("00011001"),("00011010"),("00011011"),("00011100"),("00011101"),("00011110"),("00011111"), ("00100000"),("00100001"),("00100010"),("00100011"),("00100100"),("00100101"),("00100110"),("00100111"), ("00101000"),("00101001"),("00101010"),("00101011"),("00101100"),("00101101"),("00101110"),("00101111"), ("00110000"),("00110001"),("00110010"),("00110011"),("00110100"),("00110101"),("00110110"),("00110111"), ("00111000"),("00111001"),("00111010"),("00111011"),("00111100"),("00111101"),("00111110"),("00111111"), ("01000000"),("01000001"),("01000010"),("01000011"),("01000100"),("01000101"),("01000110"),("01000111"), ("01001000"),("01001001"),("01001010"),("01001011"),("01001100"),("01001101"),("01001110"),("01001111"), ("01010000"),("01010001"),("01010010"),("01010011"),("01010100"),("01010101"),("01010110"),("01010111"), ("01011000"),("01011001"),("01011010"),("01011011"),("01011100"),("01011101"),("01011110"),("01011111"), ("01100000"),("01100001"),("01100010"),("01100011"),("01100100"),("01100101"),("01100110"),("01100111"), ("01101000"),("01101001"),("01101010"),("01101011"),("01101100"),("01101101"),("01101110"),("01101111"), ("01110000"),("01110001"),("01110010"),("01110011"),("01110100"),("01110101"),("01110110"),("01110111"), ("01111000"),("01111001"),("01111010"),("01111011"),("01111100"),("01111101"),("01111110"),("01111111")]
def take1(): yy = str(random.choice(l1)) return yy
def take2(): uu = str(random.choice(l2)) return uu
def rana(): s = [take2(),take2()] d = ''.join(random.sample(s,len(s))) bina = (take1()+d) return bina
def mult(): a1 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 35 288230376151711744 - 576460752303423488 a2 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 36 576460752303423488 - 1152921504606846976 a3 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 37 1152921504606846976 - 2305843009213693952 a4 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 38 2305843009213693952 - 4611686018427387904 a5 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 39 4611686018427387904 - 9223372036854775808 a6 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 40 9223372036854775808 - 18446744073709551616 a7 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 41 18446744073709551616 - 36893488147419103232 a8 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 42 36893488147419103232 - 73786976294838206464 a9 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 43 73786976294838206464 - 147573952589676412928 a10= 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 44 147573952589676412928 - 295147905179352825856 multypl = random.choice([a1,a2,a3,a4,a5,a6,a7,a8,a9,a10]) return multypl
def funk(): i = 2 while i != 1: aaa = rana() filtr0 = aaa.count("0") if filtr0 == 11: # zeros filt filtr1 = aaa.count("111") if filtr1 == 2: # 111 filt filtr2 = aaa.count("101") if filtr2 == 2: # 101 filt b = int(aaa,2)* mult() ran = b myhex = "%064x" % ran myhex = myhex[:64] priv = myhex pub = privtopub(priv) pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed") addr = pubtoaddr(pubkey1)
oy = """cd "C:\crackbit" """ ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s " # bitcrack settings f=open("C:/testpy.cmd","w") f.write (oy) f.write (ey) f.write (priv) f.close()
subprocess.Popen([r"C:/testpy.cmd"])
print(aaa,b,addr,priv,bin(b))
time.sleep(0.1) break return None while True: for a in range(10): # number of copies funk()
time.sleep(600.0) # break between restarts, scan time, in sec subprocess.call("taskkill /IM cuBitCrack.exe")
[/size]
|
|
|
|
zielar
|
|
December 08, 2018, 08:54:24 PM |
|
what i wrote at last ? You mean this? https://bitcointalk.org/index.php?topic=1306983.msg48483082#msg48483082 or i tought when i run this python script for every search space there opens a new cmd file with Bitcrack and this search 180sec in random space.
In the first case, there would be more explanation of what the table means, In the second case (if I understand you correctly), bitcrack does not know how (currently not implemented in the program) to sort randomly in a given range, so the only option is to reduce the search time for the start of the next random part and step by step from smaller value to bigger.. *** Since we have 4 repetitions 11110101 1001001011100100 100000111100101011101011000011100 28-29 11 2 2 16093924 F592E4 11101001 1010111001001001 0011001111010110 18-22 11 2 2 15314505 E9AE49 10010110 1011111100000110 000001111101001 19-20 11 2 2 9879302 96BF06 10001010 1111010100001111 00001011101001001101010100 26-24 11 2 2 9106703 8AF50F the script takes the same initial bytes 11110101 11101001 10010110 10001010 and through the filter produces 10 options for subsequent puzzles. running time 600 sec = 10 min. Or take ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"), ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), and drive a week)) The truth is there is a miss in space 147573952589676412928 - 295147905179352825856. 295147905179352825856−45147905179352825856=250000000000000000000 110110001101011100100110 10110111000101110111101010000000000000000000 14210854 14210854* 2 44 times 249999987418033291264 250000000000000000000-249999987418033291264=~12581966708736 fourteen digit number, how many 1 2080ti squeezes 1000mk\s ~ 3 hours apparently. may have, further, take the first not 3 but 4 bytes... Variant with filter 11 zeros, 2 111, 2 101. import random from bitcoin import * import subprocess import time #from PyRandLib import * #rand = FastRand63() #random.seed(rand())
#l1= [("11010000")]
l1= [("11110101"),("10001010"),("11101001"),("10010110")] l2= [("10000000"),("10000001"),("10000010"),("10000011"),("10000100"),("10000101"),("10000110"),("10000111"), ("10001000"),("10001001"),("10001010"),("10001011"),("10001100"),("10001101"),("10001110"),("10001111"), ("10010000"),("10010001"),("10010010"),("10010011"),("10010100"),("10010101"),("10010110"),("10010111"), ("10011000"),("10011001"),("10011010"),("10011011"),("10011100"),("10011101"),("10011110"),("10011111"), ("10100000"),("10100001"),("10100010"),("10100011"),("10100100"),("10100101"),("10100110"),("10100111"), ("10101000"),("10101001"),("10101010"),("10101011"),("10101100"),("10101101"),("10101110"),("10101111"), ("10110000"),("10110001"),("10110010"),("10110011"),("10110100"),("10110101"),("10110110"),("10110111"), ("10111000"),("10111001"),("10111010"),("10111011"),("10111100"),("10111101"),("10111110"),("10111111"), ("11000000"),("11000001"),("11000010"),("11000011"),("11000100"),("11000101"),("11000110"),("11000111"), ("11001000"),("11001001"),("11001010"),("11001011"),("11001100"),("11001101"),("11001110"),("11001111"), ("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"), ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111"), ("11100000"),("11100001"),("11100010"),("11100011"),("11100100"),("11100101"),("11100110"),("11100111"), ("11101000"),("11101001"),("11101010"),("11101011"),("11101100"),("11101101"),("11101110"),("11101111"), ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"), ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), ("00000000"),("00000001"),("00000010"),("00000011"),("00000100"),("00000101"),("00000110"),("00000111"), ("00001000"),("00001001"),("00001010"),("00001011"),("00001100"),("00001101"),("00001110"),("00001111"), ("00010000"),("00010001"),("00010010"),("00010011"),("00010100"),("00010101"),("00010110"),("00010111"), ("00011000"),("00011001"),("00011010"),("00011011"),("00011100"),("00011101"),("00011110"),("00011111"), ("00100000"),("00100001"),("00100010"),("00100011"),("00100100"),("00100101"),("00100110"),("00100111"), ("00101000"),("00101001"),("00101010"),("00101011"),("00101100"),("00101101"),("00101110"),("00101111"), ("00110000"),("00110001"),("00110010"),("00110011"),("00110100"),("00110101"),("00110110"),("00110111"), ("00111000"),("00111001"),("00111010"),("00111011"),("00111100"),("00111101"),("00111110"),("00111111"), ("01000000"),("01000001"),("01000010"),("01000011"),("01000100"),("01000101"),("01000110"),("01000111"), ("01001000"),("01001001"),("01001010"),("01001011"),("01001100"),("01001101"),("01001110"),("01001111"), ("01010000"),("01010001"),("01010010"),("01010011"),("01010100"),("01010101"),("01010110"),("01010111"), ("01011000"),("01011001"),("01011010"),("01011011"),("01011100"),("01011101"),("01011110"),("01011111"), ("01100000"),("01100001"),("01100010"),("01100011"),("01100100"),("01100101"),("01100110"),("01100111"), ("01101000"),("01101001"),("01101010"),("01101011"),("01101100"),("01101101"),("01101110"),("01101111"), ("01110000"),("01110001"),("01110010"),("01110011"),("01110100"),("01110101"),("01110110"),("01110111"), ("01111000"),("01111001"),("01111010"),("01111011"),("01111100"),("01111101"),("01111110"),("01111111")]
def take1(): yy = str(random.choice(l1)) return yy
def take2(): uu = str(random.choice(l2)) return uu
def rana(): s = [take2(),take2()] d = ''.join(random.sample(s,len(s))) bina = (take1()+d) return bina
def mult(): a1 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 35 288230376151711744 - 576460752303423488 a2 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 36 576460752303423488 - 1152921504606846976 a3 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 37 1152921504606846976 - 2305843009213693952 a4 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 38 2305843009213693952 - 4611686018427387904 a5 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 39 4611686018427387904 - 9223372036854775808 a6 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 40 9223372036854775808 - 18446744073709551616 a7 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 41 18446744073709551616 - 36893488147419103232 a8 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 42 36893488147419103232 - 73786976294838206464 a9 = 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 43 73786976294838206464 - 147573952589676412928 a10= 2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2*2 # * 44 147573952589676412928 - 295147905179352825856 multypl = random.choice([a1,a2,a3,a4,a5,a6,a7,a8,a9,a10]) return multypl
def funk(): i = 2 while i != 1: aaa = rana() filtr0 = aaa.count("0") if filtr0 == 11: # zeros filt filtr1 = aaa.count("111") if filtr1 == 2: # 111 filt filtr2 = aaa.count("101") if filtr2 == 2: # 101 filt b = int(aaa,2)* mult() ran = b myhex = "%064x" % ran myhex = myhex[:64] priv = myhex pub = privtopub(priv) pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed") addr = pubtoaddr(pubkey1)
oy = """cd "C:\crackbit" """ ey = "\nstart /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s " # bitcrack settings f=open("C:/testpy.cmd","w") f.write (oy) f.write (ey) f.write (priv) f.close()
subprocess.Popen([r"C:/testpy.cmd"])
print(aaa,b,addr,priv,bin(b))
time.sleep(0.1) break return None while True: for a in range(10): # number of copies funk()
time.sleep(600.0) # break between restarts, scan time, in sec subprocess.call("taskkill /IM cuBitCrack.exe")
[/size] Something is wrong.... It's dump from command line: C:\Users\olo\Desktop\bitcrack>python start.py ('100101100010011100110111', 173114833646726938624L, '14JLKDijKbKtfV3caW5T5gumNpQTX6gwXR', '0000000000000000000000000000000000000000000000096273700000000000', '0b10010110001001110011011100000000000000000 0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack" 0 00000000000000000000000'The file name, directory name or volume label syntax is incorrect. )
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 0000000000000000000000000000000000000000000000096273700000000000 ('111101011001000001110101', 8847385789399564288L, '15rqTzR4XatoCqgCWef1JAchj71vvTMAkc', '0000000000000000000000000000000000000000000000007ac83a8000000000', '0b111101011001000001110101000000000000000000000000000000000 0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack" 0 00') The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 0000000000000000000000000000000000000000000000007ac83a8000000000 ('111101011000100010111100', 552893682634719232L, '1N9wE9gN8jYEMn3kJtWmcEu8pdjeEYPzQW', '00000000000000000000000000000000000000000000000007ac45e000000000', '0b11110101100010001011110000000000000000000000000000000000000')
C:\Users\olo\Desktop\bitcrack>cd "C:\Users\olo\Desktoitcrack" The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000007ac45e000000000 ('100101101111110000110010', 87037006203213316096L, '1MLUb3GVRSPMv47Ht9v5JDrEwmPmFyWESq', '000000000000000000000000000000000000000000000004b7e1900000000000', '0b100101101111110000110010000000000000000000000000000000000000000 0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack" 0 ') The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 000000000000000000000000000000000000000000000004b7e1900000000000 ('111101010011011100100100', 141357049963440242688L, '1JuNtDafgMP7iVcy7PqdpHZPHZzENe1eHa', '000000000000000000000000000000000000000000000007a9b9200000000000', '0b1111010100110111001001000000000000000000000000000000000000000000000')
C:\Users\olo\Desktop\bitcrack>cd "C:\Users\olo\Desktoitcrack" The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 000000000000000000000000000000000000000000000007a9b9200000000000 ('111010011000101100011110', 269257238687181176832L, '156apRKXAW8ePEqJNsg4L2GMj7EcpwUCt6', '0000000000000000000000000000000000000000000000e98b1e00000000000', '0b111010011000101100011110000000000000000000000000000000000000000000 0C:\Users\olo\Desktop\bitcrack>0cd' "C:\Users\olo\Desktoitcrack" )
The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000e98b1e00000000000 ('100101100010111100001111', 173150158756304125952L, '166WSCWuwNc6XUMiouwJT33zhJENkX9fha', '00000000000000000000000000000000000000000000000962f0f00000000000', '0b10010110001011110000111100000000000000000000000000000000000000000000')
C:\Users\olo\Desktop\bitcrack>cd "C:\Users\olo\Desktoitcrack" The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000962f0f00000000000 ('100101101010011100111100', 86845691179980292096L, '1AbPmyzZ2Uh72s1nRzrzMZq9ymKDnLt6Az', '000000000000000000000000000000000000000000000004b539e00000000000', '0b1001011010100111001111000000000000000000000000000000000000000000 0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack" ' ) The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 000000000000000000000000000000000000000000000004b539e00000000000 ('111010011101100001100110', 134802641247941951488L, '1pAYydvT6bKsUZrCFRwxfRCVG2cuTUfw7', '0000000000000000000000000000000000000000000000074ec3300000000000', '0b11101001110110000110011000000000000000000000000000000000000000 0C:\Users\olo\Desktop\bitcrack>0cd0 "C:\Users\olo\Desktoitcrack" 0 0') The file name, directory name or volume label syntax is incorrect.
C:\Users\olo\Desktop\bitcrack>start /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 0000000000000000000000000000000000000000000000074ec3300000000000 ('111101011100110100100100', 283389639870986059776L, '1DE2jSpXqWKc8Pj4xVaiZjsy159krJR9Vt', '00000000000000000000000000000000000000000000000f5cd240000 0C:\Users\olo\Desktop\bitcrack>0000cd0 "C:\Users\olo\Desktoitcrack" 0 ', '0b111101011100110100100100000000000000000000000000000The file name, directory name or volume label syntax is incorrect. 000000000 0C:\Users\olo\Desktop\bitcrack>start000 /min cuBitCrack.exe -d 0 -i new1.txt -o find.txt -c -u -b 32 -t 256 -p 56 -s 00000000000000000000000000000000000000000000000f5cd2400000000000 0 000')
I have changed places to C:\Users\olo\Desktop\bitcrack becouse think before about problem is with privilages in mail c:\ path but problem still wrong. I have already installed python 2.7
|
If you want - you can send me a donation to my BTC wallet address 31hgbukdkehcuxcedchkdbsrygegyefbvd
|
|
|
zielar
|
|
December 08, 2018, 09:23:28 PM |
|
ok ... finally after installing Python 3.7.1 and patches from "\" to "/" everything is OK. Has anyone of you can knowledge about the best settings for 1080TI? For me, these 10 processes reach 22Mkey / s on my setting [-b 28 -t 256 -p 512]
|
If you want - you can send me a donation to my BTC wallet address 31hgbukdkehcuxcedchkdbsrygegyefbvd
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 09, 2018, 07:26:35 PM |
|
There is no formula, there is a random and our collective unconscious. Therefore, someone will write something, someone will think of something. Grin You never know, I will write now and you will light up (light bulb lights up).
Take the last number found. 1011000110011101011011100001010010000110001001101000100001 take the first 3 bytes from it 10110001 10011101 01101110 here we have 10 zeros. Check how many combinations will be from the first byte 10110001, 8008 combinations which we need in place 583 (depending on the given data of course, table for counting in python, I'll leave it down) bin 101100011001110101101110 dec 11640174 multiply this number 34 times by 2 will get ~199976666598998016 practically what you need 199976667976342049. 199976667976342049-199976666598998016=1377344033 error on 1377344033 using a scanner "bitcrack" it's practically nothing. You need to guess just 3 bytes then "bitcrack" will do everything himself.
The most important question is how to guess these 3 bytes (and multiply by 2 35 times for 59 puzzle). so i calculate like you say but this dont work for the others. look here: 288 230 376 151 711 744 = 58bit found #58priv key puzzel is 199 976 667 976 342 049 mitte errechneter wert 199 976 666 598 998 016 mit hoch 34 == 1 377 344 033 144 115 188 075 855 872 = 57bit found #57priv key puzzel is 138 245 758 910 846 492 ende errechneter wert 138 245 754 488 619 008 mit hoch 33 == 4 422 227 484 72 057 594 037 927 936 = 56bit found #56priv key puzzel is 44 218 742 292 676 575 mitte errechneter wert 44 218 741 306 687 488 mit hoch 32 == 985 989 087 36 028 797 018 963 968 = 55bit found #55priv key puzzel is 30 045 390 491 869 460 ende errechneter wert 30 045 387 884 593 152 mit hoch 32 18 014 398 509 481 984 = 54bit found #54priv key puzzel is 9 974 455 244 496 707 anfang errechneter wert 9 974 451 659 603 968 mit hoch 32 9 007 199 254 740 992 = 53bit found #53priv key puzzel is 6 763 683 971 478 124 mitte errechneter wert 6 763 680 138 002 432 mit hoch 32 4 503 599 627 370 496 = 52bit found #52priv key puzzel is 4 216 495 639 600 700 ende errechneter wert 4 216 495 559 147 520 mit hoch 28 2 251 799 813 685 248 = 51bit found #51priv key puzzel is 2 058 769 515 153 876 ende errechneter wert 2 058 769 487 888 384 mit hoch 28 59bit = 58bit = 10110001 10011101 01101110 = 14 (1) 34 57bit = 11110101 10010010 11100100 = 13 (1) 33 56bit = 10011101 00011000 10110110 = 12 (1) 32 55bit = 01101010 10111110 00011111 = 15 (1) 32 54bit = 00100011 01101111 10110110 = 14 (1) 32 53bit = 00011000 00000111 10001000 = 7 (1) 32 52bit = 11101111 10101110 00010110 = 15 (1) 28 51bit = 01110101 00000111 00001010 = 10 (1) 28
|
|
|
|
Andzhig
Jr. Member
Offline
Activity: 184
Merit: 3
|
|
December 09, 2018, 08:27:19 PM Last edit: December 10, 2018, 12:56:28 PM by Andzhig |
|
Chew for stupid what are you doing. But the first byte cannot start at 0. And each step up is multiplied by +2. Every step below -2. Ie 55 * 2> 31, 54 * 2> 30 ... 55bit = 01101010 10111110 00011111 = 15 (1) 32 54bit = 00100011 01101111 10110110 = 14 (1) 32 > 31 53bit = 00011000 00000111 10001000 = 7 (1) 32 > 30 *** a little thought 1("10000000"), 2("10000001"), 3("10000010"), 4("10000011"), 5("10000100"), 6("10000101"), 7("10000110"), 8("10000111"), 9("10001000"), 10("10001001"), 11("10001010"), 12("10001011"), 13("10001100"), 14("10001101"), 15("10001110"), 16("10001111"), 17("10010000"), 18("10010001"), 19("10010010"), 20("10010011"), 21("10010100"), 22("10010101"), 23("10010110"), 24("10010111"), 25("10011000"), 26("10011001"), 27("10011010"), 28("10011011"), 29("10011100"), 30("10011101"), 31("10011110"), 32("10011111"), 33("10100000"), 34("10100001"), 35("10100010"), 36("10100011"), 37("10100100"), 38("10100101"), 39("10100110"), 40("10100111"), 41("10101000"), 42("10101001"), 43("10101010"), 44("10101011"), 45("10101100"), 46("10101101"), 47("10101110"), 48("10101111"), 49("10110000"), 50("10110001"), 51("10110010"), 52("10110011"), 53("10110100"), 54("10110101"), 55("10110110"), 56("10110111"), 57("10111000"), 58("10111001"), 59("10111010"), 60("10111011"), 61("10111100"), 62("10111101"), 63("10111110"), 64("10111111"), 65("11000000"), 66("11000001"), 67("11000010"), 68("11000011"), 69("11000100"), 70("11000101"), 71("11000110"), 72("11000111"), 73("11001000"), 74("11001001"), 75("11001010"), 76("11001011"), 77("11001100"), 78("11001101"), 79("11001110"), 80("11001111"), 81("11010000"), 82("11010001"), 83("11010010"), 84("11010011"), 85("11010100"), 86("11010101"), 87("11010110"), 88("11010111"), 89("11011000"), 90("11011001"), 91("11011010"), 92("11011011"), 93("11011100"), 94("11011101"), 95("11011110"), 96("11011111"), 97("11100000"), 98("11100001"), 99("11100010"),100("11100011"),101("11100100"),102("11100101"),103("11100110"),104("11100111"), 105("11101000"),106("11101001"),107("11101010"),108("11101011"),109("11101100"),110("11101101"),111("11101110"),112("11101111"), 113("11110000"),114("11110001"),115("11110010"),116("11110011"),117("11110100"),118("11110101"),119("11110110"),120("11110111"), 121("11111000"),122("11111001"),123("11111010"),124("11111011"),125("11111100"),126("11111101"),127("11111110"),128("11111111") first byte numbers of found puzzles (starting at eighth where is the whole byte). 51 whole byte + 7 non-integer initial(1001100,110001,10101,1000,111,11,1). 97 106 1 17 40 36 37 82 74 60 67 47 83 94 56 43, 93 126 81 86 90 64 119 123 57 85 83 22 30 59 9 23 106 42 41 88 97 18 60 90 46 59 11 107 112 65 14 86 30 118 50 On these 51 bytes 5 repetitions with the maximum step between them 13, 83-83. How can this be used, by removing the last 10 bytes from the table for example. 1("10000000"), 2("10000001") , 3("10000010" ), 4("10000011"), 5("10000100") , 6("10000101") , 7("10000110") , 8("10000111"), 9("10001000"), 10("10001001") , 11 , 12("10001011"), 13("10001100"), 14 , 15("10001110"), 16("10001111"), 17("10010000"), 18("10010001"), 19("10010010"), 20("10010011"), 21("10010100"), 22("10010101") , 23("10010110"), 24("10010111"), 25("10011000"), 26("10011001"), 27("10011010"), 28("10011011"), 29("10011100"), 30 , 31("10011110"), 32("10011111"), 33("10100000"), 34("10100001"), 35("10100010"), 36("10100011"), 37("10100100"), 38("10100101") , 39("10100110"), 40("10100111"), 41("10101000"), 42("10101001"), 43("10101010"), 44("10101011"), 45("10101100"), 46("10101101") , 47("10101110"), 48("10101111"), 49("10110000"), 50 , 51("10110010"), 52("10110011"), 53("10110100"), 54("10110101") , 55("10110110"), 56("10110111"), 57("10111000"), 58("10111001"), 59 , 60("10111011"), 61("10111100"), 62("10111101") , 63("10111110"), 64("10111111"), 65 , 66("11000001"), 67("11000010"), 68("11000011"), 69("11000100"), 70("11000101") , 71("11000110"), 72("11000111"), 73("11001000"), 74("11001001"), 75("11001010") , 76("11001011"), 77("11001100"), 78("11001101") , 79("11001110"), 80("11001111"), 81("11010000"), 82("11010001"), 83("11010010") , 84("11010011"), 85("11010100"), 86 , 87("11010110"), 88("11010111"), 89("11011000"), 90("11011001"), 91("11011010") , 92("11011011"), 93("11011100"), 94("11011101") , 95("11011110"), 96("11011111"), 97("11100000"), 98("11100001"), 99("11100010") ,100("11100011"),101("11100100"), 102("11100101"),103("11100110"),104("11100111"), 105("11101000"),106("11101001"),107 ,108("11101011"),109("11101100"),110("11101101"),111("11101110"),112 , 113("11110000"),114("11110001"),115("11110010"),116("11110011"),117("11110100"),118 ,119("11110110"),120("11110111"), 121("11111000"),122("11111001"),123("11111010"),124("11111011"),125("11111100"),126("11111101"),127("11111110"),128("11111111") In the puzzle 160 steps (don’t know what a madman will look for 150-160 puzzles even if hypothetically a large collider seeks for collisions no higher "The effective search space until a collision is found is 134.58 bits (See here why).") and 128 possible initial bytes, - 7 initial non-full, 153-128=25 at least 25 repetitions are possible (Minimum 20, 5 already). If random when creating the puzzle worked to create the greatest difference maybe he will go through all the initial bytes therefore, they are already used can be discarded. *** Or for specifically that table with numbers time finding 3 bytes of initial. We take the whole initial numbers. It is understandable the closer to the beginning of bytes, the faster the time for finding a combination of three. 0 111 101 sec N 10110001 10011101 01101110 0001010010000110001001101000100001 33-25 10 2 3 11640174 B19D6E 2.0 50 11110101 10010010 11100100 100000111100101011101011000011100 28-29 11 2 2 16093924 F592E4 4.9 118 10011101 00011000 10110110 00111010110001001111111111011111 22-34 12 1 3 10295478 9D18B6 1.2 30 11010101 01111100 00111111 0011011011001111110000100010100 24-31 8 3 2 13990975 D57C3F 3.7 86 10001101 10111110 11011011 010101101011010001111101000100 23-31 8 1 5 9289435 8DBEDB 0.6 14 11000000 00111100 01000111 00100011111100011001001101100 29-24 14 2 0 12598343 C03C47 2.6 65 11101111 10101110 00010110 0100110010111001111000111100 22-30 9 3 3 15707670 EFAE16 4.6 112 11101010 00001110 00010100 001101000000000100111010000 33-18 14 2 2 15339028 EA0E14 4.5 107 10001010 11110101 00001111 00001011101001001101010100 26-24 11 2 2 9106703 8AF50F 0.4 11 10111010 00001011 10110101 1000000010101111101001101 24-25 11 2 5 12192693 BA0BB5 2.3 59 10101101 11100110 11010111 110011100011101110011011 17-31 8 2 4 11396823 ADE6D7 1.9 46 11011001 10101100 00100001 01101010011110010111010 23-24 13 0 2 14265377 D9AC21 3.6 90 10111011 00000110 00001110 0010001101010101000100 27-19 13 2 2 12256782 BB060E 2.4 60 10010001 01111110 01010000 101000011110000000101 26 -19 13 2 2 9535056 917E50 0.7 18 11100000 00101011 00110101 10100011010110001111 22-22 13 1 2 14691125 E02B35 4.0 97 11010111 10100111 01100100 1111100010110010001 19-24 10 2 3 14133092 D7A764 3.6 88 10101000 10001000 01110001 011000110110001111 23-19 15 1 1 11044977 A88871 1.5 41 10101001 11000011 01001101 01100110001011011 20-21 12 1 3 11125581 A9C34D 1.7 42 11101001 10101110 01001001 0011001111010110 18-22 11 2 2 15314505 E9AE49 4.3 106 10010110 10111111 00000110 000001111101001 19-20 11 2 2 9879302 96BF06 0.9 23 10001000 11100000 10111110 10110011010000 21-17 13 2 1 8970430 88E0BE 0.3 9 10111010 10111011 10101011 0101010010011 14 -22 8 3 6 12237739 BABBAB 2.3 59 10011101 11101000 00100000 101001111100 19- 17 14 2 2 10348576 9DE820 1.2 30 10010101 11011010 01000010 00101110000 20-15 13 1 3 9820738 95DA42 0.9 22 11010010 10011001 01100100 0100011101 18-16 13 0 3 13801828 D29964 3.3 83 11010100 10110110 01010100 011011000 17-16 12 0 4 13940308 D4B654 3.3 85 10111000 01100010 10100110 00101110 17-15 13 1 2 12083878 B862A6 2.2 57 11111010 10011111 11001110 1000111 10-21 7 4 1 16424910 FA9FCE 4.9 (7) 123 11110110 01010011 00110101 100100 14-16 10 1 3 16143157 F65335 4.8 119 10111111 00010010 10101000 11110 13-16 12 2 3 12522152 BF12A8 2.6 64 11011001 00010110 11001110 1000 14-14 11 1 3 14227150 D916CE 3.7 90 11010101 10000111 00001110 101 13-14 12 2 2 13993742 D5870E 3.5 86 11010000 00001100 10011011 10 15-11 14 0 2 13634715 D00C9B 3.2 81 11111101 00101111 01110010 1 8-17 8 4 3 16592754 FD2F72 5.2 126 11011100 00101010 00000100 15-9 15 1 2 14428676 DC2A04 3.8 93
93 126 81 86 90 64 119 123 57 85 83 22 30 59 9 23 106 42 41 88 97 18 60 90 46 59 11 107 112 65 14 86 30 118 50 3 5 3 3 3 2 4 4 2 3 3 0 1 2 0 0 4 1 1 3 4 0 2 3 1 2 0 4 4 2 0 3 1 4 2
=>===<>><==<<<==><<=><<=<<<>><<=<>< 35333244233012004113402312044203142
[/size] Here we see that after the two so far followed 2(4),2(3),2(0). 2(1),2(2) did not have. It means 101 disappears. 100 questionable. More likely 110 111.
|
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 09, 2018, 08:33:21 PM |
|
shit ok yeah i see i do really wrong thanks for show me the right. you have to know i am only interested in this i really know not much about that whole thing i learn this all by myself
|
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 10, 2018, 10:09:23 PM |
|
If the public key is revealed it is still safe from bruteforce if the attacker don't know the range of bits to search for?
Of course. Many blocks mined by Satoshi have txs with "pay to public key" script (P2PK) instead of "pay to public key hash" script (P2PKH, pay to address). The public keys are known, but the btc are still there: block #100 https://www.blockchain.com/it/btc/tx/2d05f0c9c3e1c226e63b5fac240137687544cf631cd616fd34fd188fc9020866PUSHDATA(65)[04 e70a02f5af48a1989bf630d92523c9d14c45c75f7d1b998e962bff6ff9995fc5bdb44f1793b3749 5d80324acba7c8f537caaf8432b8d47987313060cc82d8a93] CHECKSIG x = e70a02f5af48a1989bf630d92523c9d14c45c75f7d1b998e962bff6ff9995fc5
y = bdb44f1793b37495d80324acba7c8f537caaf8432b8d47987313060cc82d8a93
hey arulbero mabey someone found keys for these addresses ? or am i wrong ? https://www.blockchain.com/btc/address/1E9jNPoV7R14mzgcoZcGn6fjHGq7FdfbFv
|
|
|
|
|
racminer
Member
Offline
Activity: 245
Merit: 17
|
|
December 12, 2018, 01:09:22 PM |
|
Hi I have a suggestion to everyone here interested in solving case #59 We know for sure that the private key looks like: 04XX PPPP PPPP PPPP or 05XX PPPP PPPP PPPP or 06XX PPPP PPPP PPPP or 07XX PPPP PPPP PPPP the range PPPP PPPP PPPP can be scanned with a single RX480 using bitcrack in about ten days from 400 to 7FF we have 1023 possibles cases we could split the workload and create a peer to peer method (via private messages here + trust + honesty ) and exchange ruled out scanned ranges. the lucky one will get the prize anyone interested?
|
|
|
|
Andzhig
Jr. Member
Offline
Activity: 184
Merit: 3
|
|
December 12, 2018, 04:33:02 PM |
|
Hi I have a suggestion to everyone here interested in solving case #59 We know for sure that the private key looks like: 04XX PPPP PPPP PPPP or 05XX PPPP PPPP PPPP or 06XX PPPP PPPP PPPP or 07XX PPPP PPPP PPPP the range PPPP PPPP PPPP can be scanned with a single RX480 using bitcrack in about ten days from 400 to 7FF we have 1023 possibles cases we could split the workload and create a peer to peer method (via private messages here + trust + honesty ) and exchange ruled out scanned ranges. the lucky one will get the prize anyone interested? It is unlikely, here, to find a sufficient number of people willing, so that from this idea it would turn out to be something worthwhile. Moreover, no need to reinvent the wheel, LBC already exists. And I am tormented by vague doubts that there is such a number (I think it's a "little" more.). "from 400 to 7FF we have 1023 possibles cases"
|
|
|
|
racminer
Member
Offline
Activity: 245
Merit: 17
|
|
December 12, 2018, 05:18:11 PM Last edit: December 13, 2018, 11:14:25 AM by racminer |
|
Hi I have a suggestion to everyone here interested in solving case #59 We know for sure that the private key looks like: 04XX PPPP PPPP PPPP or 05XX PPPP PPPP PPPP or 06XX PPPP PPPP PPPP or 07XX PPPP PPPP PPPP the range PPPP PPPP PPPP can be scanned with a single RX480 using bitcrack in about ten days from 400 to 7FF we have 1023 possibles cases we could split the workload and create a peer to peer method (via private messages here + trust + honesty ) and exchange ruled out scanned ranges. the lucky one will get the prize anyone interested? It is unlikely, here, to find a sufficient number of people willing, so that from this idea it would turn out to be something worthwhile. Moreover, no need to reinvent the wheel, LBC already exists. And I am tormented by vague doubts that there is such a number (I think it's a "little" more.). "from 400 to 7FF we have 1023 possibles cases" Of course I am aware of LBC but what I suggest is not the same spirit. About the 1023 cases, it is oubious no need to get "tormented by vague doubts", it's just simple arithmetic. ( 07FF FFFF FFFF FFFF - 0400 0000 0000 0000 ) = 288230376151711743 keys FFFF FFFF FFFF = 281474976710655 288230376151711743/(281474976710655+1) = 1023 do you still have doubts ?
|
|
|
|
Andzhig
Jr. Member
Offline
Activity: 184
Merit: 3
|
|
December 13, 2018, 02:36:25 PM Last edit: December 21, 2018, 05:15:26 AM by Andzhig |
|
do you still have doubts ? clearly, understood, thx. *** Another option to try your luck. 288230376151711744-576460752303423488 our range. success formula. 144115188075855872 - ((((((((((1,9850114 * 128) * 128) * 128) * 128) * 128) * 128) * 128) * 128) - 142989288169013248) * 128) = ~138245434111601493 - 138245758910846492 = 324799244999 < scan residue 288230376151711744 - ((((((((((3,9783185 * 128) * 128) * 128) * 128) * 128) * 128) * 128) * 128) - 285978576338026496) * 128) = ~199976540817066822 - 199976667976342049 = 127159275227 < scan residue 576460752303423488 - ((((((((((7,9456789 * 128) * 128) * 128) * 128) * 128) * 128) * 128) * 128) - 571957152676052992) * 128) = 63 101 3,9783185 2 111 1,9850114 4 56 sec 49 sec 42 sec 100 127,38634167733380354869954231845 1 101 127,27325883491753266696377977496 2 101 127,34166804622168456262443214655 1 110 63,583036446150909604124734642028 3 101 63,660348182749885381781496107578 1 101 63,668431836413219571113586425781 1 100 31,861576626618332619411688710898 0 110 31,787429311634468831471167504787 3 111 31,771796089393319562077522277832 4 110 15,90613502904471082688431238239 2 101 15,908679856821891007712110877037 2 100 15,926393464003922417759895324707 0 111 7,941484368221046585833988729064 4 100 7,9644791460323176579549908638 0 100 7,966582541557727381587028503418 0 111 3,97142883352349745 4 111 3,9726356460934955094899123650976 4 101 3,9699310258729383349418640136719 2 100 1,9915187218734213270288080366299 0 110 1,9868375314665325248597582685761 3 100 1,990362136945805104915052652359 1 35 28 21 100 127,41463838936761021614074707031 0 110 127,1519957482814788818359375 3 110 127,1361083984375 110 63,588673464953899383544921875 3 110 63,58295440673828125 3 110 63,58837890625 110 31,7922732196748256683349609375 3 110 31,7968273162841796875 3 101 31,82952880859375 101 15,90996809303760528564453125 2 111 15,876374721527099609375 5 110 15,9052734375 111 7,938812442123889923095703125 4 110 7,9462490081787109375 3 101 7,954345703125 111 3,979142837226390838623046875 4 101 3,97543811798095703125 110 3,97543811798095703125 101 1,9883378362865187227725982666016 2 101 1,9887961782515048980712890625 110 1,987188816070556640625 binary representations of the first 7 digits, after the comma. 1,9...3,9...7,9...15,9... (15.blabla - 127.blabla We are not taking yet.) And we look at coincidences. 63 10010101 01000111 10010001 (3,9783185 > 9783185 > 100101010100011110010001) 10010110 01001101 00000010 (1,9850114 > 9850114 > 100101100100110100000010) 56 10001010 01000011 11100110 10001010 10100111 01001110 10001101 01011011 00111110 10001111 10101000 10111011 10010011 00101010 11110111 10010011 01111101 00100001 10010100 00111010 01110000 10010100 01101001 10010100 10010011 11111111 11101110 10010111 01001011 00110011 10010110 10010100 01010111 10010111 00011110 00000101 10001010 11011001 10100000 10000101 10111001 01100011 10001010 00100010 00111110 10001111 01000000 01011100 10010000 01100010 11011010 10010001 10011111 00100001 10010101 01100111 11000100 10010100 11010111 00001101 10010100 11010111 00001101 10010110 11001110 11110010 10010110 11100000 11011001 10010110 10100010 00010000 Let's say we have a repeat 10001111 we get an approximate range 510000000000000000-550000000000000000. At 10010011 290000000000000000-340000000000000000. with clarification, on all possible ranges. 10001111 553000000000000000-580000000000000000 if after 9 comes 3 > 7,9 3... too high 10001111 519000000000000000-554000000000000000 if after 9 comes 4 > 7,9 4... 10010000 460000000000000001-520000000000000000 if after 9 comes 4 > 7,9 4... 10010000 458000000000000000-462000000000000000 if after 9 comes 5 > 7,9 5... 10010001 390000000000000000-460000000000000000 if after 9 comes 5 > 7,9 5... 10010010 369000000000000000-400000000000000000 if after 9 comes 5 > 7,9 5... did not appear yet 10010010 337000000000000000-369000000000000000 if after 9 comes 6 > 7,9 6... did not appear yet 10010011 270000000000000000-338000000000000000 if after 9 comes 6 > 7,9 6... too low if after 9 comes 7,9 012...789 fall out of range, 012 > 576460752303423488,789 < 288230376151711744. As we see 10010010 have not participated anywhere yet (unless on initial puzzles). Most likely range from 10010001 390000000000000000 to 10001111 554000000000000000. 390000000000000000-554000000000000000. *** python 3 script from bitcoin import * import random import subprocess import time from decimal import * #from PyRandLib import * #rand = FastRand63() #random.seed(rand())
l1= [("10001111"),("10010000"),("10010001")] l2= [("10000000"),("10000001"),("10000010"),("10000011"),("10000100"),("10000101"),("10000110"),("10000111"), ("10001000"),("10001001"),("10001010"),("10001011"),("10001100"),("10001101"),("10001110"),("10001111"), ("10010000"),("10010001"),("10010010"),("10010011"),("10010100"),("10010101"),("10010110"),("10010111"), ("10011000"),("10011001"),("10011010"),("10011011"),("10011100"),("10011101"),("10011110"),("10011111"), ("10100000"),("10100001"),("10100010"),("10100011"),("10100100"),("10100101"),("10100110"),("10100111"), ("10101000"),("10101001"),("10101010"),("10101011"),("10101100"),("10101101"),("10101110"),("10101111"), ("10110000"),("10110001"),("10110010"),("10110011"),("10110100"),("10110101"),("10110110"),("10110111"), ("10111000"),("10111001"),("10111010"),("10111011"),("10111100"),("10111101"),("10111110"),("10111111"), ("11000000"),("11000001"),("11000010"),("11000011"),("11000100"),("11000101"),("11000110"),("11000111"), ("11001000"),("11001001"),("11001010"),("11001011"),("11001100"),("11001101"),("11001110"),("11001111"), ("11010000"),("11010001"),("11010010"),("11010011"),("11010100"),("11010101"),("11010110"),("11010111"), ("11011000"),("11011001"),("11011010"),("11011011"),("11011100"),("11011101"),("11011110"),("11011111"), ("11100000"),("11100001"),("11100010"),("11100011"),("11100100"),("11100101"),("11100110"),("11100111"), ("11101000"),("11101001"),("11101010"),("11101011"),("11101100"),("11101101"),("11101110"),("11101111"), ("11110000"),("11110001"),("11110010"),("11110011"),("11110100"),("11110101"),("11110110"),("11110111"), ("11111000"),("11111001"),("11111010"),("11111011"),("11111100"),("11111101"),("11111110"),("11111111"), ("00000000"),("00000001"),("00000010"),("00000011"),("00000100"),("00000101"),("00000110"),("00000111"), ("00001000"),("00001001"),("00001010"),("00001011"),("00001100"),("00001101"),("00001110"),("00001111"), ("00010000"),("00010001"),("00010010"),("00010011"),("00010100"),("00010101"),("00010110"),("00010111"), ("00011000"),("00011001"),("00011010"),("00011011"),("00011100"),("00011101"),("00011110"),("00011111"), ("00100000"),("00100001"),("00100010"),("00100011"),("00100100"),("00100101"),("00100110"),("00100111"), ("00101000"),("00101001"),("00101010"),("00101011"),("00101100"),("00101101"),("00101110"),("00101111"), ("00110000"),("00110001"),("00110010"),("00110011"),("00110100"),("00110101"),("00110110"),("00110111"), ("00111000"),("00111001"),("00111010"),("00111011"),("00111100"),("00111101"),("00111110"),("00111111"), ("01000000"),("01000001"),("01000010"),("01000011"),("01000100"),("01000101"),("01000110"),("01000111"), ("01001000"),("01001001"),("01001010"),("01001011"),("01001100"),("01001101"),("01001110"),("01001111"), ("01010000"),("01010001"),("01010010"),("01010011"),("01010100"),("01010101"),("01010110"),("01010111"), ("01011000"),("01011001"),("01011010"),("01011011"),("01011100"),("01011101"),("01011110"),("01011111"), ("01100000"),("01100001"),("01100010"),("01100011"),("01100100"),("01100101"),("01100110"),("01100111"), ("01101000"),("01101001"),("01101010"),("01101011"),("01101100"),("01101101"),("01101110"),("01101111"), ("01110000"),("01110001"),("01110010"),("01110011"),("01110100"),("01110101"),("01110110"),("01110111"), ("01111000"),("01111001"),("01111010"),("01111011"),("01111100"),("01111101"),("01111110"),("01111111")]
def ran1(): nnn1 = str(random.choice(l1)) return nnn1
def ran2(): nnn2 = str(random.choice(l2)) return nnn2 while 1 == 1: i = 1 while i <= 100000: a = str("7.") bina = (ran1()+ran2()+ran2()) nuli = bina.count("0") if nuli != 100: comb1 = int(bina,2) if comb1 >= 9400000: if comb1 <= 9680000: deccomb1 = str(comb1) comb2 = Decimal(a+deccomb1) deccomb2 = int(576460752303423488 - ((((((((((comb2 * 128) * 128) * 128) * 128) * 128) * 128) * 128) * 128) - 571957152676052992) * 128)) if deccomb2 >= 390000000000000000: if deccomb2 <= 554000000000000000: ran = deccomb2 myhex = "%064x" % ran myhex = myhex[:64] priv = myhex pub = privtopub(priv) pubkey1 = encode_pubkey(privtopub(priv), "bin_compressed") addr = pubtoaddr(pubkey1)
oy = """cd "C:\crackbit" """ ey = "\nstart /min cuBitCrack.exe -d 0 -i addr.txt -o find.txt -c -b 32 -t 256 -p 512 -s " # bitcrack settings f=open("C:/testpy.cmd","w") f.write (oy) f.write (ey) f.write (priv) f.close()
subprocess.Popen([r"C:/testpy.cmd"])
print(bina,nuli,comb1,deccomb1,comb2,deccomb2,bin(deccomb2)[2:])
time.sleep(0.1)
time.sleep(1200.0) # break between restarts, scan time, in sec, 1200 sec > 20 min. subprocess.call("taskkill /IM cuBitCrack.exe") i = i+1 pass
[/size]
|
|
|
|
PietCoin97
Jr. Member
Offline
Activity: 91
Merit: 3
|
|
December 13, 2018, 06:46:09 PM |
|
When you find the puzzel 59 with your success Formular it will be easy for you to find the other ones?
|
|
|
|
itod
Legendary
Offline
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
|
|
December 13, 2018, 07:07:35 PM |
|
Do you newbies know what "random" means?
Although the private keys you are talking about are generated with pseudorandom algorithm, it's obvious creator of this puzzle knew what he was doing, and this means he used enough entropy that these laughable experiments with walls of numbers where you try to find some pattern makes as much sense as trying to get in earths orbit by jumping up as hard as you can.
Amazing ignorance.
|
|
|
|
Andzhig
Jr. Member
Offline
Activity: 184
Merit: 3
|
|
December 13, 2018, 07:48:51 PM |
|
When you find the puzzel 59 with your success Formular it will be easy for you to find the other ones? do not know, it is necessary to find first)). Do you newbies know what "random" means?
Although the private keys you are talking about are generated with pseudorandom algorithm, it's obvious creator of this puzzle knew what he was doing, and this means he used enough entropy that these laughable experiments with walls of numbers where you try to find some pattern makes as much sense as trying to get in earths orbit by jumping up as hard as you can.
Amazing ignorance. This we know. But at the time of the puzzle, in early 2015, there were still no powerful graphics cards and programs for finding Bitcoin addresses on them. The speed of 1 2080 is impressive https://bitcointalk.org/index.php?topic=4453897.msg48444413#msg48444413
|
|
|
|
|