Bitcoin Forum
May 18, 2026, 10:01:47 PM *
News: Latest Bitcoin Core release: 31.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 [665] 666 667 668 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 387174 times)
cctv5go
Newbie
*
Offline

Activity: 53
Merit: 0


View Profile
May 14, 2026, 04:35:12 AM
 #13281

The interesting math behind this (private key binary):
Plz27
13,14
Plz31
10,21--->The two numbers differ by 11
Plz35
20,15
Plz39
19,20
Plz43
19,24
Plz47
23,24
Plz51
32,19--->The two numbers differ by 13
Plz55
24,31
Plz59
26,33
Plz63
27,36
Plz67
36,31
Plz71
 Huh, Huh--->The two numbers differ by 15???(43,28)?
Divaytis
Newbie
*
Offline

Activity: 3
Merit: 0


View Profile
May 14, 2026, 05:13:14 AM
 #13282

Anyone here know how to code and want to help me solve the puzzles? I created a system from the ground up complete with axioms definitions and procedural operations i just designed my system so that it happens to use the exact same values as secp256k1 im not saying i solved the discrete log thats impossible instead i created a system where the discrete log doesnt even apply at all

If it's still relevant, I can help write the code for you.



Bro if you can code we can cook


I can help with writing the code without any problems, how can I contact you to discuss everything?

Dude allow new members to send you message im not trying to dox my phone number and email address

Allowed
OzBtcOz
Newbie
*
Offline

Activity: 16
Merit: 0


View Profile
May 14, 2026, 10:21:47 AM
 #13283

As i see there is GPU crisys and you cannot find anymore on a good price 4090 or 5090 to rent.
I want to see the ones that had scripts and GPU farms rental to steal now the key Smiley (unless they have their own GPU farm)

Funny you!  Grin
You think it is rental GPU ? Don't worry about it, my rig has enough RTX5090 on it  Cool
nomachine
Full Member
***
Offline

Activity: 854
Merit: 137



View Profile
May 14, 2026, 11:12:48 AM
Merited by Cricktor (1)
 #13284

I am open to collaboration with anyone who has strong mathematical expertise.


Nah bruh, this ain’t “hidden math hacks unlock Bitcoin” territory, this straight up cap physics cosplay.

You talkin’ like you can reverse-engineer secp256k1 with some +7 denominator wizardry like the curve just gon’ fold under algebra pressure. That’s not cryptography, that’s wishful thinking with extra steps.

Bitcoin keys ain’t solved, they’re picked 256-bit entropy, pure randomness, no pattern to reverse. Public key is just scalar multiplication on an elliptic curve: priv × G. That’s it. One-way street with no U-turn, no cheat code, no “formula bridge.”

Trying to reverse it is like watching an explosion and thinking you can reconstruct the uranium atom by reading the smoke.

And this “gravity leaking from parallel dimensions” talk? That’s like you took Randall Sundrum brane world physics and started remixing it like it explains Bitcoin.

In real theory, extra dimensions could in principle let gravity spread through a higher dimensional bulk while the Standard Model forces stay locked on a 3 plus 1 dimensional brane. That is part of why these models exist in the first place, to try to explain why gravity is so weak compared to the other forces.

But even in that setup it still does not line up cleanly with real observations like gravitational lensing, the cosmic microwave background, and large scale structure without adding extra assumptions on top of extra assumptions.

So trying to connect that kind of physics to Bitcoin is just category error. Bitcoin does not sit in some hidden geometry you can probe. It sits on deterministic elliptic curve multiplication where the private key is random entropy and the public key is just a one way transformation of it.

Different universe of problems entirely.  Grin


BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
And24r
Newbie
*
Offline

Activity: 14
Merit: 0


View Profile
May 14, 2026, 12:56:24 PM
 #13285

I am open to collaboration with anyone who has strong mathematical expertise.


Nah bruh, this ain’t “hidden math hacks unlock Bitcoin” territory, this straight up cap physics cosplay.

You talkin’ like you can reverse-engineer secp256k1 with some +7 denominator wizardry like the curve just gon’ fold under algebra pressure. That’s not cryptography, that’s wishful thinking with extra steps.

Bitcoin keys ain’t solved, they’re picked 256-bit entropy, pure randomness, no pattern to reverse. Public key is just scalar multiplication on an elliptic curve: priv × G. That’s it. One-way street with no U-turn, no cheat code, no “formula bridge.”

Trying to reverse it is like watching an explosion and thinking you can reconstruct the uranium atom by reading the smoke.

And this “gravity leaking from parallel dimensions” talk? That’s like you took Randall Sundrum brane world physics and started remixing it like it explains Bitcoin.

In real theory, extra dimensions could in principle let gravity spread through a higher dimensional bulk while the Standard Model forces stay locked on a 3 plus 1 dimensional brane. That is part of why these models exist in the first place, to try to explain why gravity is so weak compared to the other forces.

But even in that setup it still does not line up cleanly with real observations like gravitational lensing, the cosmic microwave background, and large scale structure without adding extra assumptions on top of extra assumptions.

So trying to connect that kind of physics to Bitcoin is just category error. Bitcoin does not sit in some hidden geometry you can probe. It sits on deterministic elliptic curve multiplication where the private key is random entropy and the public key is just a one way transformation of it.

Different universe of problems entirely.  Grin



The curve with the equation y^2=x^3(mod p) lends itself perfectly to decryption. I have ready‑made formulas for this curve and I can derive the private key from the public key for this curve. For the Bitcoin curve y^2=x^3+7(mod p), I haven’t found a solution. But it exists, because it cannot not exist. You don’t know a lot of things
Diaghilev
Newbie
*
Offline

Activity: 6
Merit: 0


View Profile
May 14, 2026, 02:10:34 PM
 #13286

Tell me, does Mara send the client code to the email address specified when requesting the code?
SecretAdmirere
Newbie
*
Offline

Activity: 19
Merit: 1


View Profile
May 14, 2026, 03:08:58 PM
 #13287

Tell me, does Mara send the client code to the email address specified when requesting the code?

No, the CEO personally comes to your door and delivers it via USB drive with "MARA" engraved on it
mjojo
Newbie
*
Online Online

Activity: 93
Merit: 0


View Profile
May 14, 2026, 04:04:54 PM
 #13288

It’s a long explanation. I’ve provided examples of formulas and set the task goal. If we derive the formula, we’ll work only with the x coordinate — the y coordinate isn’t needed.

Following your example:

x is the base point GP;

x1 is the public key;

2^n is the private key with the number 2 raised to an unknown power.

In the first and second examples, you can substitute any value for x — formula 2 will always return x. However, formulas 3 and 4 won’t work in this case.

In general, the point is that if you know the degree n, you can easily adjust the private key to match the x-coordinate of the base point GP through sequential increase, using formula 4.

Code:
from decimal import Decimal, getcontext

# set high precision
getcontext().prec = 100

# x value
x = Decimal("55066263022277343669578718895168534326250603453777594175500187360389116729240")

# -----------------------------------
# Calculate x1
# Formula:
# ((x**2 / sqrt(x**3)) * 1.5)**2 - 2*x
# -----------------------------------

x1 = (((x**2 / (x**3).sqrt()) * Decimal("1.5")) ** 2) - (2 * x)

# -----------------------------------
# Calculate x

x = (2**2) * x1

print("x1 =")
print(format(x1, 'f'))

print("\nx =")
print(format(x, 'f'))
this python for your formula no. 1 and 2, my question what P number and Gen X for the curve y^2=x^3(mod p) is random or specific number like in Secp256k1 curve,because without Bcurve point is not valid again. then how you derive the pubkey to pvkey from the  the curve y^2=x^3(mod p), did you reduce bit by bit or just with one reverse. thank you if you share anymore
And24r
Newbie
*
Offline

Activity: 14
Merit: 0


View Profile
May 14, 2026, 04:39:14 PM
Last edit: May 15, 2026, 12:39:55 PM by hilariousandco
 #13289

It’s a long explanation. I’ve provided examples of formulas and set the task goal. If we derive the formula, we’ll work only with the x coordinate — the y coordinate isn’t needed.

Following your example:

x is the base point GP;

x1 is the public key;

2^n is the private key with the number 2 raised to an unknown power.

In the first and second examples, you can substitute any value for x — formula 2 will always return x. However, formulas 3 and 4 won’t work in this case.

In general, the point is that if you know the degree n, you can easily adjust the private key to match the x-coordinate of the base point GP through sequential increase, using formula 4.

Code:
from decimal import Decimal, getcontext

# set high precision
getcontext().prec = 100

# x value
x = Decimal("55066263022277343669578718895168534326250603453777594175500187360389116729240")

# -----------------------------------
# Calculate x1
# Formula:
# ((x**2 / sqrt(x**3)) * 1.5)**2 - 2*x
# -----------------------------------

x1 = (((x**2 / (x**3).sqrt()) * Decimal("1.5")) ** 2) - (2 * x)

# -----------------------------------
# Calculate x

x = (2**2) * x1

print("x1 =")
print(format(x1, 'f'))

print("\nx =")
print(format(x, 'f'))
this python for your formula no. 1 and 2, my question what P number and Gen X for the curve y^2=x^3(mod p) is random or specific number like in Secp256k1 curve,because without Bcurve point is not valid again. then how you derive the pubkey to pvkey from the  the curve y^2=x^3(mod p), did you reduce bit by bit or just with one reverse. thank you if you share anymore


The number P(mod p) can be chosen arbitrarily — it doesn’t matter for the example. However, first you need to generate the points of this curve using this modulus. You can derive a private key from a public key on the curve y^2=x^3
  using any modulus P. I cannot provide you with the formulas for this, as I have spent a lot of time searching for them. But if you share your work with me, I will be happy to share my findings with you.

Here is an example with modulus p=59 and the curve y^2=x^3:

1- x=29 y=9
2- 22 38
3 - 36 20
4 - 35 49
5 - 46 35
6 - 9 32
mjojo
Newbie
*
Online Online

Activity: 93
Merit: 0


View Profile
May 14, 2026, 05:27:04 PM
 #13290

Here is an example with modulus p=59 and the curve y^2=x^3:

1- x=29 y=9
2- 22 38
3 - 36 20
4 - 35 49
5 - 46 35
6 - 9 32
this full coordinate with P=59

1G=(29,9)
2G=(22,38)
3G=(36,20)
4G=(35,49)
5G=(46,35)
6G=(9,32)
7G=(3,26)
8G=(53,43)
9G=(4,51)
10G=(41,56)
//
51G=(53,16)
52G=(3,33)
53G=(9,27)
54G=(46,24)
55G=(35,10)
56G=(36,39)
57G=(22,21)
58G=(29,50)
[Finished in 93ms]

With Bcurve=0 the point is valid

Left side  (y² mod P):
22
Right side ((x³ + A*x + B) mod P):
22
VALID: Point lies on secp256k1 curve

X HEX:
000000000000000000000000000000000000000000000000000000000000001d
Y HEX:
0000000000000000000000000000000000000000000000000000000000000009

So you derive this pubkey 56G=(36,39) to pvkey 56 just with one reverse or bit by bit
Grzegorz2022
Newbie
*
Offline

Activity: 24
Merit: 0


View Profile
May 14, 2026, 05:32:48 PM
 #13291

Here is an example with modulus p=59 and the curve y^2=x^3:

1- x=29 y=9
2- 22 38
3 - 36 20
4 - 35 49
5 - 46 35
6 - 9 32

The curve y² = x³ (without a constant) is a singular curve. It has a cusp point. This is not a valid elliptic curve — its group of points is isomorphic to a simple additive/multiplicative group of the field. In such a group, the discrete logarithm is trivial — it reduces to ordinary division.

But Bitcoin uses y² = x³ + 7. This +7 makes the curve smooth (non-singular). A smooth elliptic curve has a group in which the DLP is hard. This is not a coincidence — Satoshi (or rather the SEC standard) chose +7 precisely for this purpose.

The transition from y² = x³ to y² = x³ + 7 is not a minor difference to overcome — it is a chasm between a trivial group and a cryptographically hard group. Formulas from one do not carry over to the other, because these are fundamentally different algebraic structures.

x1 = (((x**2 / (x**3).sqrt()) * Decimal("1.5")) ** 2) - (2 * x)


This uses Decimal and .sqrt() — floating-point numbers, a real square root. Elliptic curve cryptography lives in a finite field mod p — there is no real square root there, there is a modular square root (a completely different operation). This code does not operate on the Bitcoin curve. It computes some floating-point numbers that have no connection to secp256k1. This is not an attack — it is a misunderstanding dressed up as code.

I perfectly understand your work and I am not stopping you at all, but you must understand why this happens. The better path is to embrace Symmetry and study it. Here is a small demonstration:

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 1

--------------------------------------------------
Base k: 1
X: 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
Y parity: Even (02)
Address: 1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 57896044618658097711785492504343953926418782139537452191302581570759080747168
New X: 00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
New Y parity: Odd (03)
Address: 1LVAsnUyEtJgZ9HzLfbtiJZuZMzHLX1n6k

--------------------------------------------------
MIRROR (n - k):
Key: 115792089237316195423570985008687907852837564279074904382605163141518161494336
X: 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
Address: 1GrLCmVQXoyJXaPJQdqssNqwxvha1eUo2E
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 57896044618658097711785492504343953926418782139537452191302581570759080747168

--------------------------------------------------
Base k: 57896044618658097711785492504343953926418782139537452191302581570759080747168
X: 00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
Y parity: Odd (03)
Address: 1LVAsnUyEtJgZ9HzLfbtiJZuZMzHLX1n6k

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 86844066927987146567678238756515930889628173209306178286953872356138621120753
New X: a6b594b38fb3e77c6edf78161fade2041f4e09fd8497db776e546c41567feb3c
New Y parity: Even (02)
Address: 1N9Yhd1PFn77nzysRLhDFE8kLRDRZ98Sq1

--------------------------------------------------
MIRROR (n - k):
Key: 57896044618658097711785492504343953926418782139537452191302581570759080747169
X: 00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
Address: 13see6qjfupx1YWgRefwEkccZeM8QGTAiJ
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 57896044618658097711785492504343953926418782139537452191302581570759080747169

--------------------------------------------------
Base k: 57896044618658097711785492504343953926418782139537452191302581570759080747169
X: 00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
Y parity: Even (02)
Address: 13see6qjfupx1YWgRefwEkccZeM8QGTAiJ

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 28948022309329048855892746252171976963209391069768726095651290785379540373584
New X: a6b594b38fb3e77c6edf78161fade2041f4e09fd8497db776e546c41567feb3c
New Y parity: Odd (03)
Address: 14W3eQPXrhFTxD8mFPrYx8wbUL3weu56JC

--------------------------------------------------
MIRROR (n - k):
Key: 57896044618658097711785492504343953926418782139537452191302581570759080747168
X: 00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
Address: 1LVAsnUyEtJgZ9HzLfbtiJZuZMzHLX1n6k
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 115792089237316195423570985008687907852837564279074904382605163141518161494336

--------------------------------------------------
Base k: 115792089237316195423570985008687907852837564279074904382605163141518161494336
X: 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
Y parity: Odd (03)
Address: 1GrLCmVQXoyJXaPJQdqssNqwxvha1eUo2E

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 57896044618658097711785492504343953926418782139537452191302581570759080747169
New X: 00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
New Y parity: Even (02)
Address: 13see6qjfupx1YWgRefwEkccZeM8QGTAiJ

--------------------------------------------------
MIRROR (n - k):
Key: 1
X: 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
Address: 1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 2

--------------------------------------------------
Base k: 2
X: c6047f9441ed7d6d3045406e95c07cd85c778e4b8cef3ca7abac09b95c709ee5
Y parity: Even (02)
Address: 1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 115792089237316195423570985008687907852837564279074904382605163141518161494336
New X: 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
New Y parity: Odd (03)
Address: 1GrLCmVQXoyJXaPJQdqssNqwxvha1eUo2E

--------------------------------------------------
MIRROR (n - k):
Key: 115792089237316195423570985008687907852837564279074904382605163141518161494335
X: c6047f9441ed7d6d3045406e95c07cd85c778e4b8cef3ca7abac09b95c709ee5
Address: 1NjSB7UL4MtdjmPbTUfaHne9R5C2YGxUSA
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 3

--------------------------------------------------
Base k: 3
X: f9308a019258c31049344f85f89d5229b531c845836f99b08601f113bce036f9
Y parity: Even (02)
Address: 1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 57896044618658097711785492504343953926418782139537452191302581570759080747167
New X: c62c910e502cb615a27c58512b6cc2c94f5742f76cb3d12ec993400a3695d413
New Y parity: Odd (03)
Address: 1AsPTrDFPaz6uYyuNgnmnrt8mEkfjYFmYq

--------------------------------------------------
MIRROR (n - k):
Key: 115792089237316195423570985008687907852837564279074904382605163141518161494334
X: f9308a019258c31049344f85f89d5229b531c845836f99b08601f113bce036f9
Address: 1HjFHBmhUQkKntPPeWmiLiNGewRAMQWNYs
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 115792089237316195423570985008687907852837564279074904382605163141518161494335

--------------------------------------------------
Base k: 115792089237316195423570985008687907852837564279074904382605163141518161494335
X: c6047f9441ed7d6d3045406e95c07cd85c778e4b8cef3ca7abac09b95c709ee5
Y parity: Odd (03)
Address: 1NjSB7UL4MtdjmPbTUfaHne9R5C2YGxUSA

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 1
New X: 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
New Y parity: Even (02)
Address: 1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH

--------------------------------------------------
MIRROR (n - k):
Key: 2
X: c6047f9441ed7d6d3045406e95c07cd85c778e4b8cef3ca7abac09b95c709ee5
Address: 1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 115792089237316195423570985008687907852837564279074904382605163141518161494334

--------------------------------------------------
Base k: 115792089237316195423570985008687907852837564279074904382605163141518161494334
X: f9308a019258c31049344f85f89d5229b531c845836f99b08601f113bce036f9
Y parity: Odd (03)
Address: 1HjFHBmhUQkKntPPeWmiLiNGewRAMQWNYs

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 57896044618658097711785492504343953926418782139537452191302581570759080747170
New X: c62c910e502cb615a27c58512b6cc2c94f5742f76cb3d12ec993400a3695d413
New Y parity: Even (02)
Address: 134yamsYAgAyWVr7z4KjH6h52UigkEnrL5

--------------------------------------------------
MIRROR (n - k):
Key: 3
X: f9308a019258c31049344f85f89d5229b531c845836f99b08601f113bce036f9
Address: 1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 57896044618658097711785492504343953926418782139537452191302581570759080747167

--------------------------------------------------
Base k: 57896044618658097711785492504343953926418782139537452191302581570759080747167
X: c62c910e502cb615a27c58512b6cc2c94f5742f76cb3d12ec993400a3695d413
Y parity: Odd (03)
Address: 1AsPTrDFPaz6uYyuNgnmnrt8mEkfjYFmYq

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 28948022309329048855892746252171976963209391069768726095651290785379540373585
New X: e24ce4beee294aa6350faa67512b99d388693ae4e7f53d19882a6ea169fc1ce1
New Y parity: Odd (03)
Address: 1HiahXUfs71DnMfe2K5s7zcAidN4JqrytV

--------------------------------------------------
MIRROR (n - k):
Key: 57896044618658097711785492504343953926418782139537452191302581570759080747170
X: c62c910e502cb615a27c58512b6cc2c94f5742f76cb3d12ec993400a3695d413
Address: 134yamsYAgAyWVr7z4KjH6h52UigkEnrL5
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 57896044618658097711785492504343953926418782139537452191302581570759080747166

--------------------------------------------------
Base k: 57896044618658097711785492504343953926418782139537452191302581570759080747166
X: 5699b93fc6e1bd29e09a328d657a607b4155b61a6b5fcbedd7c12df7c67df8f5
Y parity: Even (02)
Address: 12NqA1nEZw2w2o2BrkmymQHDTMgcxBSH6w

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 86844066927987146567678238756515930889628173209306178286953872356138621120754
New X: 1b53b6cd7378ad80bfe00a7737f8fd1fc3a417fd80a5f334b1793e40d09ac841
New Y parity: Odd (03)
Address: 1PA6kemFfza7w7cWMeZqioyc95TipJTGPj

--------------------------------------------------
MIRROR (n - k):
Key: 57896044618658097711785492504343953926418782139537452191302581570759080747171
X: 5699b93fc6e1bd29e09a328d657a607b4155b61a6b5fcbedd7c12df7c67df8f5
Address: 1LtmtRzYDJLEw6cjoD8AxqzAsL4NEBvRab
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 57896044618658097711785492504343953926418782139537452191302581570759080747170

--------------------------------------------------
Base k: 57896044618658097711785492504343953926418782139537452191302581570759080747170
X: c62c910e502cb615a27c58512b6cc2c94f5742f76cb3d12ec993400a3695d413
Y parity: Even (02)
Address: 134yamsYAgAyWVr7z4KjH6h52UigkEnrL5

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 86844066927987146567678238756515930889628173209306178286953872356138621120752
New X: e24ce4beee294aa6350faa67512b99d388693ae4e7f53d19882a6ea169fc1ce1
New Y parity: Even (02)
Address: 124fJ1WAxDhF2sNSS3jaGoqsW8A5xT7J2q

--------------------------------------------------
MIRROR (n - k):
Key: 57896044618658097711785492504343953926418782139537452191302581570759080747167
X: c62c910e502cb615a27c58512b6cc2c94f5742f76cb3d12ec993400a3695d413
Address: 1AsPTrDFPaz6uYyuNgnmnrt8mEkfjYFmYq
====================================================================================================

G:\>python szew.py.txt
====================================================================================================
THEORY: MULTIPLICATION THROUGH THE SEAM (n/2)
Seam (n//2): 57896044618658097711785492504343953926418782139537452191302581570759080747168
====================================================================================================
Enter base k (e.g. 1): 57896044618658097711785492504343953926418782139537452191302581570759080747171

--------------------------------------------------
Base k: 57896044618658097711785492504343953926418782139537452191302581570759080747171
X: 5699b93fc6e1bd29e09a328d657a607b4155b61a6b5fcbedd7c12df7c67df8f5
Y parity: Odd (03)
Address: 1LtmtRzYDJLEw6cjoD8AxqzAsL4NEBvRab

--------------------------------------------------
TRANSFORMATION THROUGH THE SEAM (k * (n//2)):
New k: 28948022309329048855892746252171976963209391069768726095651290785379540373583
New X: 1b53b6cd7378ad80bfe00a7737f8fd1fc3a417fd80a5f334b1793e40d09ac841
New Y parity: Even (02)
Address: 18i5D6QmndczN2pEKRC4rTLi2MwhabqN5E

--------------------------------------------------
MIRROR (n - k):
Key: 57896044618658097711785492504343953926418782139537452191302581570759080747166
X: 5699b93fc6e1bd29e09a328d657a607b4155b61a6b5fcbedd7c12df7c67df8f5
Address: 12NqA1nEZw2w2o2BrkmymQHDTMgcxBSH6w
====================================================================================================
And24r
Newbie
*
Offline

Activity: 14
Merit: 0


View Profile
May 14, 2026, 05:40:37 PM
 #13292

Here is an example with modulus p=59 and the curve y^2=x^3:

1- x=29 y=9
2- 22 38
3 - 36 20
4 - 35 49
5 - 46 35
6 - 9 32
this full coordinate with P=59

1G=(29,9)
2G=(22,38)
3G=(36,20)
4G=(35,49)
5G=(46,35)
6G=(9,32)
7G=(3,26)
8G=(53,43)
9G=(4,51)
10G=(41,56)
//
51G=(53,16)
52G=(3,33)
53G=(9,27)
54G=(46,24)
55G=(35,10)
56G=(36,39)
57G=(22,21)
58G=(29,50)
[Finished in 93ms]

With Bcurve=0 the point is valid

Left side  (y² mod P):
22
Right side ((x³ + A*x + B) mod P):
22
VALID: Point lies on secp256k1 curve

X HEX:
000000000000000000000000000000000000000000000000000000000000001d
Y HEX:
0000000000000000000000000000000000000000000000000000000000000009

So you derive this pubkey 56G=(36,39) to pvkey 56 just with one reverse or bit by bit
The point cannot lie on the secp256k1 curve because it is a different curve.
mjojo
Newbie
*
Online Online

Activity: 93
Merit: 0


View Profile
May 14, 2026, 05:51:15 PM
 #13293

@And24r

just ignore Point lies on secp256k1 curve
I mean point is valid base on that curve with P=59
the question how you derive that pubkey to pvkey
And24r
Newbie
*
Offline

Activity: 14
Merit: 0


View Profile
May 14, 2026, 05:59:31 PM
 #13294



I’m perfectly aware of all this. I just wanted to say that if there is a solution for y^2 =x^3
 , then there must also be a solution for secp256k1 — it’s just more complicated. Whether with or without the modulus p, the formulas work exactly the same way.

I’ll share just one of my discoveries. Take X=389,2 without the modulus P (you’ll need to fine‑tune this value). Then derive Y from X using the equation y^2=x^3+7, find the second point using the doubling formula, and you’ll be surprised at how this curve matches the entire curve with the modulus p=59.

The data points are:

1 – 29, 41;

2 – 21, 8.

Even the transition points from the upper branch of the curve to the lower one coincide for these curves.
Grzegorz2022
Newbie
*
Offline

Activity: 24
Merit: 0


View Profile
May 14, 2026, 06:02:48 PM
 #13295

@And24r

just ignore Point lies on secp256k1 curve
I mean point is valid base on that curve with P=59
the question how you derive that pubkey to pvkey


p = 59
G = (29, 9)
inv_9 = pow(9, -1, 59)      # = 46
phi_G = (29 * inv_9) % 59    # = 36
inv_phi_G = pow(phi_G, -1, 59)  # = 41

def privkey(P):
    x, y = P
    phi_P = (x * pow(y, -1, 59)) % 59
    return (phi_P * inv_phi_G) % 59
mjojo
Newbie
*
Online Online

Activity: 93
Merit: 0


View Profile
May 14, 2026, 06:11:05 PM
 #13296

@Grzegorz2022
Thank you
Code:
p = 59

# Generator point
G = (29, 9)

# Modular inverse of 9 mod 59
inv_9 = pow(9, -1, p)

# phi(G)
phi_G = (29 * inv_9) % p

# Inverse of phi(G)
inv_phi_G = pow(phi_G, -1, p)

print("inv_9 =", inv_9)
print("phi_G =", phi_G)
print("inv_phi_G =", inv_phi_G)


def privkey(P):
    x, y = P

    # Compute inverse of y mod p
    inv_y = pow(y, -1, p)

    # phi(P) = x / y mod p
    phi_P = (x * inv_y) % p

    # private key
    k = (phi_P * inv_phi_G) % p

    return k


# Example point
P = (3, 33)

k = privkey(P)

print("Private key =", k)
Grzegorz2022
Newbie
*
Offline

Activity: 24
Merit: 0


View Profile
May 14, 2026, 06:21:23 PM
 #13297

@Grzegorz2022
Thank you
Code:
p = 59

# Generator point
G = (29, 9)

# Modular inverse of 9 mod 59
inv_9 = pow(9, -1, p)

# phi(G)
phi_G = (29 * inv_9) % p

# Inverse of phi(G)
inv_phi_G = pow(phi_G, -1, p)

print("inv_9 =", inv_9)
print("phi_G =", phi_G)
print("inv_phi_G =", inv_phi_G)


def privkey(P):
    x, y = P

    # Compute inverse of y mod p
    inv_y = pow(y, -1, p)

    # phi(P) = x / y mod p
    phi_P = (x * inv_y) % p

    # private key
    k = (phi_P * inv_phi_G) % p

    return k


# Example point
P = (3, 33)

k = privkey(P)

print("Private key =", k)


The code is correct for y² = x³ mod 59.

But it does not work for y² = x³ + 7 (secp256k1).

Because a singular curve has a simple homomorphism with (F_p, +), and a non-singular one does not.
And24r
Newbie
*
Offline

Activity: 14
Merit: 0


View Profile
May 14, 2026, 06:27:07 PM
 #13298

https://iili.io/Bm8p0ue.md.png
mjojo
Newbie
*
Online Online

Activity: 93
Merit: 0


View Profile
May 14, 2026, 06:29:15 PM
 #13299


The code is correct for y² = x³ mod 59.

But it does not work for y² = x³ + 7 (secp256k1).

Because a singular curve has a simple homomorphism with (F_p, +), and a non-singular one does not.
I see, thank you.
Will free to share if you have another approach or idea anymore.
And24r
Newbie
*
Offline

Activity: 14
Merit: 0


View Profile
May 14, 2026, 06:43:15 PM
 #13300

+7 simply changes the exponent. If y^2=x^3
shows an inverse‑square relationship between points along the x‑coordinate, then +7 changes the square to a variable exponent. There’s nothing magical about it. And this curve has a solution as well.
Pages: « 1 ... 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 [665] 666 667 668 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!