Bitcoin Forum
November 16, 2024, 01:42:51 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 »  All
  Print  
Author Topic: This message was too old and has been purged  (Read 50756 times)
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 18, 2014, 09:44:13 PM
Last edit: April 17, 2016, 09:23:45 PM by Evil-Knievel
 #1

This message was too old and has been purged
b!z
Legendary
*
Offline Offline

Activity: 1582
Merit: 1010



View Profile
January 20, 2014, 07:37:51 AM
 #2

This is actually for cracking public addresses and finding the private key? lol
r3wt
Hero Member
*****
Offline Offline

Activity: 686
Merit: 504


always the student, never the master.


View Profile
January 20, 2014, 09:10:31 AM
 #3

This is actually for cracking public addresses and finding the private key? lol

DOH!

My negative trust rating is reflective of a personal vendetta by someone on default trust.
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 05:37:24 PM
 #4

Don't anyone buy this, it is impossible to brute force a private key, it would take many many lifetimes. This is the protection that addresses give.
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 06:11:21 PM
 #5

Don't anyone buy this, it is impossible to brute force a private key, it would take many many lifetimes. This is the protection that addresses give.

That's what gweedo says. But who tells us "gweedo is the pure incarnation of physics laws"?
I would rather say, the facts are described in the original posting - now the people may position it in their own world view and judge weather they find it useful or not.

Actually I can prove Gweedo is wrong:
I can generate millions of Public/Private Key pairs that are being cracked within seconds. Alone the existence of one such key should prove that "gweedo" is somewhat ... well ... let's say on the wrong path.

It is called math, people don't have to believe me it is math.

gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 06:23:34 PM
 #6

gweedo, as you are talking about math:

If you say something like: "it is impossible to brute force a private key, it would take many many lifetimes"
And I give you a key, that can be bruteforced in 10 seconds, than - by definition - your statement was proven to be wrong.

Stop playing this, let me use your words and twist them you know what I mean. Just generating a key pair is not brute forcing.
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 06:42:59 PM
 #7

gweedo, as you are talking about math:

If you say something like: "it is impossible to brute force a private key, it would take many many lifetimes"
And I give you a key, that can be bruteforced in 10 seconds, than - by definition - your statement was proven to be wrong.

Stop playing this, let me use your words and twist them you know what I mean. Just generating a key pair is not brute forcing.

You got it wrong. What I mean is, I could generate a key pair, share the public key with you, and you would be able to recover my private key in an instant with any "script kiddy key cracker" in a manner of seconds.  Smiley Alone the existence of such key proves that it does not neccessarily take a lifetime.

That is impossible, so stop lying. If that is true do it on my address https://blockchain.info/address/1GweedoZJYb5CNLfSaBgBBYS2y7BMVb2Wo
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 09:11:11 PM
 #8

You abviously have not read my answer correctly.
Please do so, then we can continue talking.

Wait so you can't brute force my address in seconds then? $16 in that address it could be yours. The public key is visible since I have done transactions so if that is what you need it is there.
meowmix4jo
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
January 24, 2014, 09:13:39 PM
 #9

gweedo, as you are talking about math:

If you say something like: "it is impossible to brute force a private key, it would take many many lifetimes"
And I give you a key, that can be bruteforced in 10 seconds, than - by definition - your statement was proven to be wrong.

Stop playing this, let me use your words and twist them you know what I mean. Just generating a key pair is not brute forcing.

You got it wrong. What I mean is, I could generate a key pair, share the public key with you, and you would be able to recover my private key in an instant with any "script kiddy key cracker" in a manner of seconds.  Smiley Alone the existence of such key proves that it does not neccessarily take a lifetime.

That is impossible, so stop lying. If that is true do it on my address https://blockchain.info/address/1GweedoZJYb5CNLfSaBgBBYS2y7BMVb2Wo

He's not saying he can get the privkey for any bitcoin address, it sounds like it can only get the privkeys for certain "weak" addresses and close approximations for others. Some private keys should be MUCH easier to find that others, so this could actually be legit. If it's useful is a different question.
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 09:50:37 PM
 #10

gweedo, as you are talking about math:

If you say something like: "it is impossible to brute force a private key, it would take many many lifetimes"
And I give you a key, that can be bruteforced in 10 seconds, than - by definition - your statement was proven to be wrong.

Stop playing this, let me use your words and twist them you know what I mean. Just generating a key pair is not brute forcing.

You got it wrong. What I mean is, I could generate a key pair, share the public key with you, and you would be able to recover my private key in an instant with any "script kiddy key cracker" in a manner of seconds.  Smiley Alone the existence of such key proves that it does not neccessarily take a lifetime.

That is impossible, so stop lying. If that is true do it on my address https://blockchain.info/address/1GweedoZJYb5CNLfSaBgBBYS2y7BMVb2Wo

He's not saying he can get the privkey for any bitcoin address, it sounds like it can only get the privkeys for certain "weak" addresses and close approximations for others. Some private keys should be MUCH easier to find that others, so this could actually be legit. If it's useful is a different question.

Then he is talking about hacking brain wallets due to the random entropy being a word or something easy.
blodyx
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
January 24, 2014, 09:56:27 PM
 #11

This is what i was afraid about when i started the other thred https://bitcointalk.org/index.php?topic=430000.0

That some evil-genius find a smart algorithm to break it all Wink

How many combinations are there to try when you have the public key?
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 10:05:07 PM
 #12

This is what i was afraid about when i started the other thred https://bitcointalk.org/index.php?topic=430000.0

That some evil-genius find a smart algorithm to break it all Wink

How many combinations are there to try when you have the public key?

No one has broken the ESCDA public key, if he did he would have taken a lot of money and he hasn't. He didn't take my address and the public key is published since I have done transactions with it. He is probably harboring back to the android flaw or something like that. Nothing to be worried about it.

This is just some FUD nothing serious.
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 24, 2014, 10:25:26 PM
 #13

No one has broken the ESCDA public key, if he did he would have taken a lot of money and he hasn't. He didn't take my address and the public key is published since I have done transactions with it. He is probably harboring back to the android flaw or something like that. Nothing to be worried about it.

This is just some FUD nothing serious.

And I do not take your concerns serious. You obviously have no that much ida about cryptography, you have no serious mathematical background, you probably did not even understand a single word of what I was talking about (or at least you prentend). Actually, ECDSA is breakable by nature - the question is just with what complexity. And there are certain tricks to reduce the overall complexity, and there are addresses which complexity is pretty low by nature.

But I think it is wasted time to explain everything to you. And what the hell should I do with your $16 wallet. Have a delicious lunch at McDonald's?  Grin  Cheesy

I have a degree in mathematics so yeah, but don't you want to prove me wrong? I want you to take my money.
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 25, 2014, 10:55:36 AM
Last edit: April 17, 2016, 09:20:23 PM by Evil-Knievel
 #14

This message was too old and has been purged
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 25, 2014, 04:53:45 PM
 #15

You simply do not understand it.
I wish I had made this topic moderated, then I could delete such trolls and troublemakers like you and keep the thread clean.

I am not trolling LOL I am proving you very much wrong.
dbell
Newbie
*
Offline Offline

Activity: 59
Merit: 0


View Profile
January 25, 2014, 06:33:00 PM
 #16

What you are describing sounds like it efficiently detects partial collisions with your rendezvous points and then from there you may be close enough to crack it in matter of days.    You have not reduced the overall search space for cracking any random address but you have greatly increased your chances and efficiency of cracking an address mathematically close to one of your Rendezvous points.

So by definition, a so called "weak" address is one that is close to a Rendezvous point


If the entire address space is 2^N,
Let A = Log2(#Rendezvous points)
Let B = Log2(#of Addresses you can brute force in few days around any one Rendezvous point)

Then within this few day time limit, you can crack any address that falls in the "weak" space of size 2^(A+B) and cannot crack any address that falls in the "hard" space of size 2^(N-A-B)

Is that about right?  If not can you describe sizes of the weak space that you can attack.
Ritual
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
January 25, 2014, 08:57:16 PM
 #17

Waiting with anticipation for the video Smiley

But I am also interested in an answer to that question. Approximately what proportion of the namespace could be regarded as "reasonably crackable" (i.e. within say a month on a home computer)?

Thanks,

Ritual.

Newbie oriented mining site - http://cryptoexperiment.wordpress.com/ --- Free BTC - http://freebitco.in/?r=231531
gweedo
Legendary
*
Offline Offline

Activity: 1498
Merit: 1000


View Profile
January 25, 2014, 10:55:06 PM
 #18

Hey guys,

here you see a proof of concept video.
- I am using a randomly generated bitcoin address (however they are all weak as you see)
- Alone this shows you that there exist many many many weak (almost an infinite number of) bitcoin addresses.
- I am working live on the block chain with real coins (all transactions in the video can be verified on blockchain.info)
- I am cracking the bitcoin address in a few seconds


Sorry for all the cursing but the day has been pretty stressful.  Wink


Show nothing but ok keep thinking you have a program that can crack private keys.
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 25, 2014, 10:58:27 PM
Last edit: April 17, 2016, 09:20:17 PM by Evil-Knievel
 #19

This message was too old and has been purged
bmoconno
Sr. Member
****
Offline Offline

Activity: 280
Merit: 261


New In Town...


View Profile
January 26, 2014, 01:53:15 AM
 #20

Very interesting.

As far as the debate going on here, why doesn't Gweedo just generate a weak address (not just any address, one that meets to criteria that Evil-Knievel sets out) and post it here.  Evil-Knievel can send a small amount of coins to the address, then crack the address and take his coins back?

Alternatively, and considerably more interestingly in my opinion, you could agree on a third party/escrow to generate a weak address.  Then both Gweedo and Evil-Knievel deposit a set (small) amount of BTC to the address.  Then Evil-Knievel has a set amount of time to break the private key before the Escrow sends all of the coins to Gweedo.

Just sayin'  Wink

If I've helped you out, or you just think I'm awesome… 13SZex4uANVrfTeeuFEXGu6W8EVYtWVB53
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!