Bitcoin Forum
September 22, 2018, 08:36:17 AM *
News: ♦♦ New info! Bitcoin Core users absolutely must upgrade to previously-announced 0.16.3 [Torrent]. All Bitcoin users should temporarily trust confirmations slightly less. More info.
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: ECDSA question for profs?  (Read 499 times)
RentGPU
Sr. Member
****
Offline Offline

Activity: 560
Merit: 251


View Profile
August 17, 2017, 12:52:49 AM
 #1

I am a big fan of cryptocurrency and bitcoin specially , so i am trying to read about the way it works and how secure it is , as i see the way of generating keys in btc is so simple and hard at same time , how comes i can generat alot of keys a even a key for every transaction and no one will collide with other ppls keys , i read about ECDSA curve , but i have a question to ask , as i understand that the publickey=privtkey*G , and we know the G and the publickey how come this equation can't be solved for the privtkey , and how it's only one way (one-way equations can't be in mathematics)....any good information will help me to understand more.....thanks in advance

Telegram ClockwiseCryptoNews join @ClockwiseCrypto
1537605377
Hero Member
*
Offline Offline

Posts: 1537605377

View Profile Personal Message (Offline)

Ignore
1537605377
Reply with quote  #2

1537605377
Report to moderator
1537605377
Hero Member
*
Offline Offline

Posts: 1537605377

View Profile Personal Message (Offline)

Ignore
1537605377
Reply with quote  #2

1537605377
Report to moderator
1537605377
Hero Member
*
Offline Offline

Posts: 1537605377

View Profile Personal Message (Offline)

Ignore
1537605377
Reply with quote  #2

1537605377
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
DannyHamilton
Legendary
*
Offline Offline

Activity: 2198
Merit: 1373



View Profile
August 17, 2017, 02:30:35 AM
 #2

The quick answer is that there is a set of formula that can be used for point multiplication so that a computer can quickly compute privateKey*G.  However, there is no known set of formula yet for point division to quickly compute publicKey/G. It is not even known in mathematics if it will be possible to find such a set of formula for point division.

I don't have time right now to go into much more detail than that. Hopefully someone else will stop by to demonstrate why it is difficult with currently known maths.

AGD
Legendary
*
Offline Offline

Activity: 1688
Merit: 1025


HODLER SINCE 2013


View Profile
August 18, 2017, 06:28:20 PM
 #3

The quick answer is that there is a set of formula that can be used for point multiplication so that a computer can quickly compute privateKey*G.  However, there is no known set of formula yet for point division to quickly compute publicKey/G. It is not even known in mathematics if it will be possible to find such a set of formula for point division.

I don't have time right now to go into much more detail than that. Hopefully someone else will stop by to demonstrate why it is difficult with currently known maths.

This one is quick and easy: https://www.youtube.com/watch?v=ZloHVKk7DHk&t=3s

edit: The difficulty to compute publicKey/G is a little bit like root calculation. It is easy to find out the numer in one direction, but a lot more difficult to calculate it in the other direction. calculating 3.82 is pretty easy (3.8*3.8=14.44), but to find out the root of 14.44 you'll need a lot more computation.

Bitcoin is not a bubble, it's the pin!
+++ GPG Public key FFBD756C24B54962E6A772EA1C680D74DB714D40 +++ http://pgp.mit.edu/pks/lookup?op=get&search=0x1C680D74DB714D40
Prodeskhp
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
August 23, 2017, 07:10:05 PM
 #4

If you reverse ECDSA you are awarded with 1 million dollars Smiley

https://en.wikipedia.org/wiki/Millennium_Prize_Problems

P vs. NP is mathematical problem for which you are guarented one million dollar.
Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!