Bitcoin Forum
March 09, 2026, 05:38:05 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 [371] 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 ... 639 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 372681 times)
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
February 20, 2025, 10:13:51 AM
 #7401

the first and second lines are the dec range of the wallet, the third line is the hex key, the key in hex is formed from the elements of the dec range, the color shows the values in the order of formation. You look at the first hex character and find it in dec by color and so on. For example 100: a=6+3+1 , f=8+7 and so on. The rest of the information is only for donations

It would be better if the creator himself joined the conversation before I started laying out a method for generating conversion coefficients from wallet to wallet.

Ok, I understand the logic.

But, you can extract any hex format you want from the 1st and 2nd decimals.
It does not take a certain point from a certain level as fixed.
You can take it from the beginning, middle or end and put it below at the beginning, middle or end of HEX.

In your table example, in the same way, when you look at it normally, the order shows that it will start with 7. But you can also get 6 from a decimal in the middle.
Gtsg
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
February 20, 2025, 10:25:18 AM
 #7402

the first and second lines are the dec range of the wallet, the third line is the hex key, the key in hex is formed from the elements of the dec range, the color shows the values in the order of formation. You look at the first hex character and find it in dec by color and so on. For example 100: a=6+3+1 , f=8+7 and so on. The rest of the information is only for donations

It would be better if the creator himself joined the conversation before I started laying out a method for generating conversion coefficients from wallet to wallet.

Ok, I understand the logic.

But, you can extract any hex format you want from the 1st and 2nd decimals.
It does not take a certain point from a certain level as fixed.
You can take it from the beginning, middle or end and put it below at the beginning, middle or end of HEX.

In your table example, in the same way, when you look at it normally, the order shows that it will start with 7. But you can also get 6 from a decimal in the middle.

The 66th wallet has reset the coefficient to 0. The 67th wallet starts with a new transition coefficient located at the point of progressing one digit. Arithmetic operations with the previous coefficient lead to the starting value of the next wallet. There are 4 possible starting points in this wallet if you don't know the exact transition coefficient. There are other formation markers in the table, there are even fractions of a coefficient and fractions of fractions of a coefficient that lead to the result.
Jorge54PT
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
February 20, 2025, 01:21:07 PM
 #7403

if 67, 68 bit wallets, etc, the bots take and if 135, 140, etc, takes thousands of years to discover, then these puzzles are only for learning and nothing more.
nomachine
Full Member
***
Offline Offline

Activity: 798
Merit: 134



View Profile
February 20, 2025, 08:50:27 PM
Last edit: February 20, 2025, 09:54:06 PM by nomachine
 #7404

3 seconds on PYTHON! PK found.

Code:
import math, time, sys, os
from gmpy2 import mpz, powmod, invert, jacobi
import xxhash  
from sortedcontainers import SortedDict

# Clear screen and initialize
os.system("cls||clear")
t = time.ctime()
sys.stdout.write(f"\033[?25l\033[01;33m[+] BSGS: {t}\n")
sys.stdout.flush()

# Elliptic Curve Parameters (secp256k1)
modulo = mpz(0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F)
order = mpz(0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141)
Gx = mpz(0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798)
Gy = mpz(0x483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8)
PG = (Gx, Gy)

# Point Addition on Elliptic Curve
def add(P, Q):
    if P == (0, 0):
        return Q
    if Q == (0, 0):
        return P
    Px, Py = P
    Qx, Qy = Q
    if Px == Qx:
        if Py == Qy:
            inv_2Py = invert((Py << 1) % modulo, modulo)
            m = (3 * Px * Px * inv_2Py) % modulo
        else:
            return (0, 0)
    else:
        inv_diff_x = invert(Qx - Px, modulo)
        m = ((Qy - Py) * inv_diff_x) % modulo
    x = (m * m - Px - Qx) % modulo
    y = (m * (Px - x) - Py) % modulo
    return (x, y)

# Scalar Multiplication on Elliptic Curve
def mul(k, P=PG):
    R0, R1 = (0, 0), P
    for i in reversed(range(k.bit_length())):
        if (k >> i) & 1:
            R0, R1 = add(R0, R1), add(R1, R1)
        else:
            R1, R0 = add(R0, R1), add(R0, R0)
    return R0

# Point Subtraction
def point_subtraction(P, Q):
    Q_neg = (Q[0], (-Q[1]) % modulo)
    return add(P, Q_neg)

# Compute Y from X using curve equation
def X2Y(X, y_parity, p=modulo):
    X3_7 = (pow(X, 3, p) + 7) % p
    if jacobi(X3_7, p) != 1:
        return None
    Y = powmod(X3_7, (p + 1) >> 2, p)
    return Y if (Y & 1) == y_parity else (p - Y)

# Convert point to compressed public key
def point_to_cpub(point):
    x, y = point
    y_parity = y & 1
    prefix = '02' if y_parity == 0 else '03'
    compressed_pubkey = prefix + format(x, '064x')
    return compressed_pubkey

# Hash a compressed public key using xxhash and store only the first 8 characters
def hash_cpub(cpub):
    return xxhash.xxh64(cpub.encode()).hexdigest()[:8]

# Main Script
if __name__ == "__main__":
    # Puzzle Parameters
    puzzle = 40
    start_range, end_range = 2**(puzzle-1), (2**puzzle) - 1
    puzzle_pubkey = '03a2efa402fd5268400c77c20e574ba86409ededee7c4020e4b9f0edbee53de0d4'

    # Parse Public Key
    if len(puzzle_pubkey) != 66:
        print("[error] Public key length invalid!")
        sys.exit(1)
    prefix = puzzle_pubkey[:2]
    X = mpz(int(puzzle_pubkey[2:], 16))
    y_parity = int(prefix) - 2
    Y = X2Y(X, y_parity)
    if Y is None:
        print("[error] Invalid compressed public key!")
        sys.exit(1)
    P = (X, Y)  # Uncompressed public key

    # Precompute m and mP for BSGS
    m = int(math.floor(math.sqrt(end_range - start_range)))
    m_P = mul(m)

    # Create Baby Table with SortedDict
    print('[+] Creating babyTable...')
    baby_table = SortedDict()  
    Ps = (0, 0)  # Start with the point at infinity
    for i in range(m + 1):
        cpub = point_to_cpub(Ps)
        cpub_hash = hash_cpub(cpub)  # Use xxhash and store only 8 characters
        baby_table[cpub_hash] = i  # Store the hash as the key and index as the value
        Ps = add(Ps, PG)  # Incrementally add PG

    # BSGS Search
    print('[+] BSGS Search in progress')
    S = point_subtraction(P, mul(start_range))
    step = 0
    st = time.time()
    while step < (end_range - start_range):
        cpub = point_to_cpub(S)
        cpub_hash = hash_cpub(cpub)  # Hash the current compressed public key
        # Check if the hash exists in the baby_table
        if cpub_hash in baby_table:
            b = baby_table[cpub_hash]
            k = start_range + step + b
            if point_to_cpub(mul(k)) == puzzle_pubkey:
                print(f'[+] m={m} step={step} b={b}')
                print(f'[+] Key found: {k}')
                print("[+] Time Spent : {0:.2f} seconds".format(time.time() - st))
                sys.exit()
        S = point_subtraction(S, m_P)
        step += m

    print('[+] Key not found')
    print("[+] Time Spent : {0:.2f} seconds".format(time.time() - st))


puzzle 40
  • BSGS: Thu Feb 20 21:49:30 2025
  • Creating babyTable...
  • BSGS Search in progress
  • m=741455 step=453895024440 b=574622
  • Key found: 1003651412950
  • Time Spent : 2.90 seconds


puzzle 50
  • BSGS: Thu Feb 20 22:13:12 2025
  • Creating babyTable...
  • BSGS Search in progress
  • m=23726566 step=48190529944714 b=12801738
  • Key found: 611140496167764
  • Time Spent : 12.71 seconds

This is the result... on a single core Grin

P.S. For puzzles above 50, you'll need a Bloom Filter

BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
benjaniah
Jr. Member
*
Offline Offline

Activity: 54
Merit: 3


View Profile
February 21, 2025, 01:44:44 AM
 #7405

Well, 67 was just solved.

730fc235c1942c1ae
mjojo
Newbie
*
Offline Offline

Activity: 87
Merit: 0


View Profile
February 21, 2025, 01:58:20 AM
 #7406

goodluck to the solver.. how about prefixs method is pvkeys is in your formula calculation???
mjojo
Newbie
*
Offline Offline

Activity: 87
Merit: 0


View Profile
February 21, 2025, 02:17:12 AM
 #7407

if he move use maraslipstream, I hope Wandering philosoper get a tip. because the guy who research found and give well instruction how to use maraslipstream after puzzle 66 intercept by bots is Wandering Philosoper.
mcdouglasx
Hero Member
*****
Offline Offline

Activity: 938
Merit: 522



View Profile WWW
February 21, 2025, 03:15:33 AM
Last edit: February 21, 2025, 04:16:06 AM by mcdouglasx
 #7408

I hope it was one of the people here who succeeded, who can please let us know how they sent the BTC, whether they used 'marasplit' or something else, and what techniques worked for them. I hope it was some enthusiastic member of this community. It is great news! From the way they withdrew, I assume they know very well what they are doing.


█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
cctv5go
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
February 21, 2025, 03:29:52 AM
 #7409

Firstly, the puzzle solver must be 99% of the community members, and the low puzzle solver appears to be the creator themselves. From puzzle 67, it seems that this is a cold wallet address of the creator himself.
Personal opinion, don't criticize if you don't like it.
JDScreesh
Member
**
Offline Offline

Activity: 68
Merit: 27


View Profile
February 21, 2025, 04:26:00 AM
 #7410

Congratulations for the solver of puzzle 67.

I saw he (or she Grin) used MARA Slipstream. Is good to know that MARA works well for lower range puzzles  Smiley

For donations: BTC - bc1q9v9s9jtunr58pykwx77dpwzdupmfdn0x8jyt06 or 145u2ppTJhkXq11xnbBM5JgkQdgV9o1V42
For donations: LTC - LaAHGMjisi2NFMfHJpMywKm8ALzmivdRaq
Akito S. M. Hosana
Jr. Member
*
Offline Offline

Activity: 420
Merit: 8


View Profile
February 21, 2025, 04:52:55 AM
 #7411

Great!!!!
This is wonderful   Cool

I bet we all know the solver.  Grin
Asmodeus_Zero
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
February 21, 2025, 05:24:08 AM
 #7412

Great!!!!
This is wonderful   Cool

I bet we all know the solver.  Grin

Retired Coder.
frozenen
Newbie
*
Offline Offline

Activity: 46
Merit: 0


View Profile
February 21, 2025, 05:36:05 AM
 #7413

#67 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9
00000000000000000000000000000000000000000000000730fc235c1942c1ae
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qbP2K5cm35XKMND1X1KW

Well done, I think he must have insane amount of GPUs! unlike #66 I was close to #67 solution was searching just a bit too high Sad
deep_seek
Newbie
*
Offline Offline

Activity: 23
Merit: 0


View Profile
February 21, 2025, 07:38:03 AM
 #7414

https://mempool.space/tx/0be77ec8bec331da8750c8b715085c6cf6c374ca31f829a515c62b9846e32986

Only 50.4 sat/vB... even not disabling RBF...... Finally Marapool ends the Bot War.... Wondring Philosopher deserve the donation.... Smiley
Gtsg
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
February 21, 2025, 08:20:22 AM
 #7415

Creator, I understood your move, thank you, 0.2-0.06+1 . Do you have a request, + or -?
frozenen
Newbie
*
Offline Offline

Activity: 46
Merit: 0


View Profile
February 21, 2025, 08:39:40 AM
 #7416

Creator, I understood your move, thank you, 0.2-0.06+1 . Do you have a request, + or -?

Lol, creator is thinking???
#68
147573952589676412928
295147905179352825855
8+5=D  so does #68 start with D ?
WinsomeGuy
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
February 21, 2025, 09:17:55 AM
 #7417

Congratulations to the puzzle 67 solver   Smiley

It's good that this one did not get stolen
Akito S. M. Hosana
Jr. Member
*
Offline Offline

Activity: 420
Merit: 8


View Profile
February 21, 2025, 10:00:59 AM
 #7418

Can someone create a Python script that generates a raw Bitcoin transaction with fixed fee value and allows you to manually copy/paste the transaction into slipstream.mara.com ?

This is very delicate and intricate to do without screwing up.  Grin
nomachine
Full Member
***
Offline Offline

Activity: 798
Merit: 134



View Profile
February 21, 2025, 10:15:05 AM
Last edit: February 21, 2025, 04:17:28 PM by nomachine
 #7419

Can someone create a Python script that generates a raw Bitcoin transaction

Of course, we can. The question is whether we will. Do you have a preferred MP3 track for the script to play while you’re getting your RAW transaction?  Grin

BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
citb0in
Hero Member
*****
Offline Offline

Activity: 1078
Merit: 797


Bitcoin g33k


View Profile
February 21, 2025, 10:21:27 AM
 #7420

Congratulations to the solver of puzzle #67. Enjoy the weekend Smiley

Some signs are invisible, some paths are hidden - but those who see, know what to do. Follow the trail - Follow your intuition - [bc1qqnrjshpjpypepxvuagatsqqemnyetsmvzqnafh]
Pages: « 1 ... 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 [371] 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 ... 639 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!