digaran
Copper Member
Hero Member
Offline
Activity: 1330
Merit: 899
🖤😏
|
|
June 14, 2023, 07:55:52 PM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and really used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard, for example having a few 0s in a key will make it hard to reverse engineer a key manually, and brute force/kangaroo, well they have their limits. One other thing could be placing a key outside a bit range, I'm curious did Satoshi ever confirmed that the keys are truly in the assumed bit ranges or we just hope the amounts of transactions are enough of a proof that the keys are exactly there? But you know what I'd like to see? A large amount in a key with no exactly known bit range, somewhere between 160 and 180 bit not lower and not higher, then solving that key would be a global challenge, though not any amount which someone could spend half of it to use special tools and grab it, something which could only be solved by math and new methods. For example, I haven't seen any tool/ algorithm capable of adding or subtracting 1 to a key and then divide it by 2, kangaroo engages square root calculations, BSGS looks for a match after adding/subtracting calculations, but no tool does + or - 1 then divide!
|
🖤😏
|
|
|
Evillo
Member
Offline
Activity: 185
Merit: 15
Two things you should never abandon: Family & BTC
|
|
June 14, 2023, 08:41:55 PM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and re ally used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard. Lol .. you have no clue what we're talking about do you! The reason he changes the first character on the left is NOT to make it difficult, it's to make the ranges as per his puzzle requirements.. in fact, even if he changes nothing.. Brutefocring the seed is impossible. A person who knows cryptography would know that humans are terrible in creating secure randomness. Changing numbers or adding zeros doesn't do shit in terms of difficulty, the opposite is true, it can actually increase predictability
|
Cool Story Bro. BTC: 1EviLLo1Y5VeNn2Lajv9tdZTkUuVgePVYN
|
|
|
lordfrs
Jr. Member
Offline
Activity: 52
Merit: 1
|
|
June 14, 2023, 11:42:50 PM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and really used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard, for example having a few 0s in a key will make it hard to reverse engineer a key manually, and brute force/kangaroo, well they have their limits. One other thing could be placing a key outside a bit range, I'm curious did Satoshi ever confirmed that the keys are truly in the assumed bit ranges or we just hope the amounts of transactions are enough of a proof that the keys are exactly there? But you know what I'd like to see? A large amount in a key with no exactly known bit range, somewhere between 160 and 180 bit not lower and not higher, then solving that key would be a global challenge, though not any amount which someone could spend half of it to use special tools and grab it, something which could only be solved by math and new methods. For example, I haven't seen any tool/ algorithm capable of adding or subtracting 1 to a key and then divide it by 2, kangaroo engages square root calculations, BSGS looks for a match after adding/subtracting calculations, but no tool does + or - 1 then divide! Now I look at it from a different angle. In binary, the program is more practical, for example, I know the last 8 bits of the private key anyway, because 8 bits equals a maximum of 256 digits. There was a friend who said that if the curve math is 0, multiply, if 1, add, knowing the last bit means solving ecdsa, the last 8 bits are 1 in 256, you can find the rest. If you say the last 16 bits, there is 1 possibility in 65536, these numbers can be tried, you will reduce 125 bits -16 bits =109bits. This is the code from sympy import mod_inverse import secp256k1 as ice
k=mod_inverse(2,N) neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar): ScalarBin = str(bin(Scalar))[2:] le=len(ScalarBin) for i in range (0,le): if ScalarBin[le-i] == "0": Qx=ice.point_multiplication(k,Qx) else: Qx=ice.point_addition(Qx,neg1) Qx=ice.point_multiplication(k,Qx) return ice.point_to_cpub(Qx)
for x in range(65536): print(ters(pub,x))
If the last bit is 1, it moves the point forward when divided by (2). 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1 + if the last bit is 0 then normal divides
|
If you want to buy me a coffee
Btc = 3246y1G9YjnQQNRUrVMnaeCFrymZRgJAP7
Doge = DGNd8UTi8jVTVZ2twhKydyqicynbsERMjs
|
|
|
Milly1
Newbie
Offline
Activity: 3
Merit: 0
|
|
June 15, 2023, 03:34:36 PM |
|
Good evening everyone! I've been following this forum on and off for several years. I want to wish you all good luck for the 32 BTC puzzle. Well, it has increased now. Please note that this message is translated into English because I don't speak English well enough. Last night, I stumbled upon one of your pages by chance, about fifteen pages back! One of you had a brilliant idea. I don't remember the person's username, but they didn't explain much. However, as I reread the creator's message, it made sense. I did some research, and indeed, it matched. I have never coded in my life, but I followed some tutorials last night and achieved the same results (since the person shared their results). I dreamt about it all night! : ) And this morning, Eureka! I found a continuation of their work, an idea! I've been thinking about it all day, doing calculations and probabilities in my head, but unfortunately, I've been busy with work. I'm about to head home and try all this mess! I will keep you updated whether I find the answer or get closer to it! I will share the results and the method used. Please bear with me, as it takes me a lot of time to code something since I'm not an expert like most of you! I just wanted to say to those who are trying to find a mathematical solution that there isn't a single formula, but many small calculations and probabilities at times! Focus on the creator's message and on the ranges where each key is located, even those that have already been found! The goal is not a complicated mathematical formula but rather asking the right questions!! I hope this will inspire you!
|
|
|
|
GR Sasa
Member
Offline
Activity: 180
Merit: 14
|
|
June 15, 2023, 06:12:30 PM |
|
Last night, I stumbled upon one of your pages by chance, about fifteen pages back! One of you had a brilliant idea. I don't remember the person's username, but they didn't explain much.
DO YOU mean Professor of wilds ? He's ideas sorry are shit. They don't work because keys are generated on fly. We already discussed this.
|
|
|
|
|
unclevito
Jr. Member
Offline
Activity: 74
Merit: 4
|
|
June 15, 2023, 09:19:33 PM |
|
|
|
|
|
sssergy2705
Copper Member
Newbie
Offline
Activity: 194
Merit: 0
|
|
June 16, 2023, 04:44:56 AM |
|
|
|
|
|
|
r1ckpwn
Newbie
Offline
Activity: 12
Merit: 0
|
|
June 17, 2023, 08:30:36 AM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and really used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard, for example having a few 0s in a key will make it hard to reverse engineer a key manually, and brute force/kangaroo, well they have their limits. One other thing could be placing a key outside a bit range, I'm curious did Satoshi ever confirmed that the keys are truly in the assumed bit ranges or we just hope the amounts of transactions are enough of a proof that the keys are exactly there? But you know what I'd like to see? A large amount in a key with no exactly known bit range, somewhere between 160 and 180 bit not lower and not higher, then solving that key would be a global challenge, though not any amount which someone could spend half of it to use special tools and grab it, something which could only be solved by math and new methods. For example, I haven't seen any tool/ algorithm capable of adding or subtracting 1 to a key and then divide it by 2, kangaroo engages square root calculations, BSGS looks for a match after adding/subtracting calculations, but no tool does + or - 1 then divide! Now I look at it from a different angle. In binary, the program is more practical, for example, I know the last 8 bits of the private key anyway, because 8 bits equals a maximum of 256 digits. There was a friend who said that if the curve math is 0, multiply, if 1, add, knowing the last bit means solving ecdsa, the last 8 bits are 1 in 256, you can find the rest. If you say the last 16 bits, there is 1 possibility in 65536, these numbers can be tried, you will reduce 125 bits -16 bits =109bits. This is the code from sympy import mod_inverse import secp256k1 as ice
k=mod_inverse(2,N) neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar): ScalarBin = str(bin(Scalar))[2:] le=len(ScalarBin) for i in range (0,le): if ScalarBin[le-i] == "0": Qx=ice.point_multiplication(k,Qx) else: Qx=ice.point_addition(Qx,neg1) Qx=ice.point_multiplication(k,Qx) return ice.point_to_cpub(Qx)
for x in range(65536): print(ters(pub,x))
If the last bit is 1, it moves the point forward when divided by (2). 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1 + if the last bit is 0 then normal divides You trying to do mod_inverse using N. But N what is?
|
|
|
|
lordfrs
Jr. Member
Offline
Activity: 52
Merit: 1
|
|
June 17, 2023, 10:38:06 AM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and really used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard, for example having a few 0s in a key will make it hard to reverse engineer a key manually, and brute force/kangaroo, well they have their limits. One other thing could be placing a key outside a bit range, I'm curious did Satoshi ever confirmed that the keys are truly in the assumed bit ranges or we just hope the amounts of transactions are enough of a proof that the keys are exactly there? But you know what I'd like to see? A large amount in a key with no exactly known bit range, somewhere between 160 and 180 bit not lower and not higher, then solving that key would be a global challenge, though not any amount which someone could spend half of it to use special tools and grab it, something which could only be solved by math and new methods. For example, I haven't seen any tool/ algorithm capable of adding or subtracting 1 to a key and then divide it by 2, kangaroo engages square root calculations, BSGS looks for a match after adding/subtracting calculations, but no tool does + or - 1 then divide! Now I look at it from a different angle. In binary, the program is more practical, for example, I know the last 8 bits of the private key anyway, because 8 bits equals a maximum of 256 digits. There was a friend who said that if the curve math is 0, multiply, if 1, add, knowing the last bit means solving ecdsa, the last 8 bits are 1 in 256, you can find the rest. If you say the last 16 bits, there is 1 possibility in 65536, these numbers can be tried, you will reduce 125 bits -16 bits =109bits. This is the code from sympy import mod_inverse import secp256k1 as ice
k=mod_inverse(2,N) neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar): ScalarBin = str(bin(Scalar))[2:] le=len(ScalarBin) for i in range (0,le): if ScalarBin[le-i] == "0": Qx=ice.point_multiplication(k,Qx) else: Qx=ice.point_addition(Qx,neg1) Qx=ice.point_multiplication(k,Qx) return ice.point_to_cpub(Qx)
for x in range(65536): print(ters(pub,x))
If the last bit is 1, it moves the point forward when divided by (2). 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1 + if the last bit is 0 then normal divides You trying to do mod_inverse using N. But N what is? N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
|
If you want to buy me a coffee
Btc = 3246y1G9YjnQQNRUrVMnaeCFrymZRgJAP7
Doge = DGNd8UTi8jVTVZ2twhKydyqicynbsERMjs
|
|
|
Denis_Hitov
Newbie
Offline
Activity: 49
Merit: 0
|
|
June 17, 2023, 09:20:36 PM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and really used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard, for example having a few 0s in a key will make it hard to reverse engineer a key manually, and brute force/kangaroo, well they have their limits. One other thing could be placing a key outside a bit range, I'm curious did Satoshi ever confirmed that the keys are truly in the assumed bit ranges or we just hope the amounts of transactions are enough of a proof that the keys are exactly there? But you know what I'd like to see? A large amount in a key with no exactly known bit range, somewhere between 160 and 180 bit not lower and not higher, then solving that key would be a global challenge, though not any amount which someone could spend half of it to use special tools and grab it, something which could only be solved by math and new methods. For example, I haven't seen any tool/ algorithm capable of adding or subtracting 1 to a key and then divide it by 2, kangaroo engages square root calculations, BSGS looks for a match after adding/subtracting calculations, but no tool does + or - 1 then divide! Now I look at it from a different angle. In binary, the program is more practical, for example, I know the last 8 bits of the private key anyway, because 8 bits equals a maximum of 256 digits. There was a friend who said that if the curve math is 0, multiply, if 1, add, knowing the last bit means solving ecdsa, the last 8 bits are 1 in 256, you can find the rest. If you say the last 16 bits, there is 1 possibility in 65536, these numbers can be tried, you will reduce 125 bits -16 bits =109bits. This is the code from sympy import mod_inverse import secp256k1 as ice
k=mod_inverse(2,N) neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar): ScalarBin = str(bin(Scalar))[2:] le=len(ScalarBin) for i in range (0,le): if ScalarBin[le-i] == "0": Qx=ice.point_multiplication(k,Qx) else: Qx=ice.point_addition(Qx,neg1) Qx=ice.point_multiplication(k,Qx) return ice.point_to_cpub(Qx)
for x in range(65536): print(ters(pub,x))
If the last bit is 1, it moves the point forward when divided by (2). 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1 + if the last bit is 0 then normal divides You trying to do mod_inverse using N. But N what is? N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141 The code doesn't work. NameError: name 'pub' is not defined How to fix?
|
|
|
|
lordfrs
Jr. Member
Offline
Activity: 52
Merit: 1
|
|
June 18, 2023, 12:13:33 PM |
|
Yeah .. He, most likely, generated 256 keys and manually updated the first character on the left whenever necessary.
You really think he just changed 1 digit? Some one who is an expert in cryptography would know better, but maybe he didn't want to make it very difficult and really used randomly generated keys. But if I were him, I'd have changed a few characters to make it really really hard, for example having a few 0s in a key will make it hard to reverse engineer a key manually, and brute force/kangaroo, well they have their limits. One other thing could be placing a key outside a bit range, I'm curious did Satoshi ever confirmed that the keys are truly in the assumed bit ranges or we just hope the amounts of transactions are enough of a proof that the keys are exactly there? But you know what I'd like to see? A large amount in a key with no exactly known bit range, somewhere between 160 and 180 bit not lower and not higher, then solving that key would be a global challenge, though not any amount which someone could spend half of it to use special tools and grab it, something which could only be solved by math and new methods. For example, I haven't seen any tool/ algorithm capable of adding or subtracting 1 to a key and then divide it by 2, kangaroo engages square root calculations, BSGS looks for a match after adding/subtracting calculations, but no tool does + or - 1 then divide! Now I look at it from a different angle. In binary, the program is more practical, for example, I know the last 8 bits of the private key anyway, because 8 bits equals a maximum of 256 digits. There was a friend who said that if the curve math is 0, multiply, if 1, add, knowing the last bit means solving ecdsa, the last 8 bits are 1 in 256, you can find the rest. If you say the last 16 bits, there is 1 possibility in 65536, these numbers can be tried, you will reduce 125 bits -16 bits =109bits. This is the code from sympy import mod_inverse import secp256k1 as ice
k=mod_inverse(2,N) neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar): ScalarBin = str(bin(Scalar))[2:] le=len(ScalarBin) for i in range (0,le): if ScalarBin[le-i] == "0": Qx=ice.point_multiplication(k,Qx) else: Qx=ice.point_addition(Qx,neg1) Qx=ice.point_multiplication(k,Qx) return ice.point_to_cpub(Qx)
for x in range(65536): print(ters(pub,x))
If the last bit is 1, it moves the point forward when divided by (2). 7fffffffffffffffffffffffffffffff5d576e7357a4501ddfe92f46681b20a1 + if the last bit is 0 then normal divides You trying to do mod_inverse using N. But N what is? N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141 The code doesn't work. NameError: name 'pub' is not defined How to fix? pub=ice.pub2upub('0433709eb11e0d4439a729f21c2c443dedb727528229713f0065721ba8fa46f00e2a1c304a39a77 775d3579d077b6ee5e4d26fd3ec36f52ad674a9b47fdd999c48')
|
If you want to buy me a coffee
Btc = 3246y1G9YjnQQNRUrVMnaeCFrymZRgJAP7
Doge = DGNd8UTi8jVTVZ2twhKydyqicynbsERMjs
|
|
|
NomadTheSavior
Newbie
Offline
Activity: 16
Merit: 3
|
|
June 18, 2023, 05:34:49 PM |
|
I see this thing is still going, has anyone solved any of the puzzles yet? Or has anyone made any type of progress? Can I get a TLDR of the events over the years from the start of the puzzle until now?
|
|
|
|
digaran
Copper Member
Hero Member
Offline
Activity: 1330
Merit: 899
🖤😏
|
|
June 18, 2023, 06:52:38 PM |
|
I see this thing is still going, has anyone solved any of the puzzles yet? Or has anyone made any type of progress? Can I get a TLDR of the events over the years from the start of the puzzle until now?
Over how many years exactly? 😂, #65 and #120 been solved. Prize has been increased 10 fold, now there is around 1000 bitcoins for us to loot ( yeah right).
|
🖤😏
|
|
|
cryptoDEADBEEFFFFF
Newbie
Offline
Activity: 24
Merit: 4
|
|
June 18, 2023, 06:55:34 PM |
|
I see this thing is still going, has anyone solved any of the puzzles yet? Or has anyone made any type of progress? Can I get a TLDR of the events over the years from the start of the puzzle until now?
Over how many years exactly? 😂, #65 and #120 been solved. Prize has been increased 10 fold, now there is around 1000 bitcoins for us to loot ( yeah right). You forgot one important detaill: puzzle #65 was solved before #64. Idk why!!!
|
|
|
|
GoldTiger69
|
|
June 18, 2023, 07:01:09 PM |
|
I see this thing is still going, has anyone solved any of the puzzles yet? Or has anyone made any type of progress? Can I get a TLDR of the events over the years from the start of the puzzle until now?
Over how many years exactly? 😂, #65 and #120 been solved. Prize has been increased 10 fold, now there is around 1000 bitcoins for us to loot ( yeah right). You forgot one important detaill: puzzle #65 was solved before #64. Idk why!!! That was because public key of #65 was revealed, so Kangaroo was used to find its private key.
|
|
|
|
sssergy2705
Copper Member
Newbie
Offline
Activity: 194
Merit: 0
|
|
June 19, 2023, 07:24:38 AM |
|
Can anyone suggest a Python script to subtract compressed public keys, like in the keymath program from albertobsd's ecctools library?
|
|
|
|
|
sssergy2705
Copper Member
Newbie
Offline
Activity: 194
Merit: 0
|
|
June 19, 2023, 02:51:54 PM |
|
Of course thanks, but I need a library or a python script.
|
|
|
|
|