Bitcoin Forum
April 27, 2024, 11:10:32 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Private Key - Miners  (Read 276 times)
walerikus (OP)
Member
**
Offline Offline

Activity: 180
Merit: 18


View Profile WWW
February 03, 2020, 11:42:32 AM
 #1

I am curious if private keys are vulnerable to the computational power of miners.

Can a miner or a group of miners use their huge computational power to access private keys for any public address, or the computational power is too small for that.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714259432
Hero Member
*
Offline Offline

Posts: 1714259432

View Profile Personal Message (Offline)

Ignore
1714259432
Reply with quote  #2

1714259432
Report to moderator
ranochigo
Legendary
*
Offline Offline

Activity: 2954
Merit: 4165


View Profile
February 03, 2020, 11:49:33 AM
Merited by TMAN (3), Quickseller (2), hugeblack (2), BitMaxz (1), ABCbits (1)
 #2

No. The main problem is not about their lack of computational power. Miners uses ASIC which are designed to only mine Bitcoin (ie. Only do double hashing of block headers to produce SHA256 hashes). This means that those ASICs can never ever be used to generate addresses.

That aside, even if you convert the hashing power directly to the number of keys per second, you would still need a astoundingly huge amount of time before you hit the jackpot. The probability is so small, it might be more worthwhile to just buy a huge bunch of lottery tickets and its more likely for you to hit every single one of them than to be able to bruteforce addresses that are securely generated.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
NeuroticFish
Legendary
*
Offline Offline

Activity: 3654
Merit: 6366


Looking for campaign manager? Contact icopress!


View Profile
February 03, 2020, 11:53:31 AM
 #3

I am curious if private keys are vulnerable to the computational power of miners.

Can a miner or a group of miners use their huge computational power to access private keys for any public address, or the computational power is too small for that.

There are 2 threads to read about this:
https://bitcointalk.org/index.php?topic=5147514
https://bitcointalk.org/index.php?topic=5216788


This could make you understand that there are so many possible private keys they just cannot "hack" / brute force a private key. The energy of our sun would not be enough for the effort.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
walerikus (OP)
Member
**
Offline Offline

Activity: 180
Merit: 18


View Profile WWW
February 03, 2020, 04:03:18 PM
 #4

I am curious if private keys are vulnerable to the computational power of miners.

Can a miner or a group of miners use their huge computational power to access private keys for any public address, or the computational power is too small for that.

There are 2 threads to read about this:
https://bitcointalk.org/index.php?topic=5147514
https://bitcointalk.org/index.php?topic=5216788


This could make you understand that there are so many possible private keys they just cannot "hack" / brute force a private key. The energy of our sun would not be enough for the effort.

An example Bitcoin private key
L1VmqTKdwzM361jkFVAT5Dd2b3APSQEW6bHs8TG2XCrGj2qVRSBb

Merkle Trees - Once hashed it will look like this:
2d94683fa2f8aaae4a6f377d93b875f680adf96b9c3e9577554b742f412fa9ad

Proof of Work
The Bitcoin protocol sets a target value for a block header’s hash. The output must be less than the specified number. Another way of saying this is that the hash of the block header must start with a certain number of zeros. For example a valid hash may look like this:
000000000000002e9067f1cf7252333f7aeb619c89d220985a70ac0e015248e0

In Bitcoin, a private key is a 256-bit number, which can be represented one of several ways. Here is a private key in hexadecimal - 256 bits in hexadecimal is 32 bytes, or 64 characters in the range 0-9 or A-F.

Thank you, now I get it, what miners do, is encrypting transaction data, and decryption of a hash is much harder work, numerous times harder, 1,000,000 and more.

I started understanding much better the function of miners by reading this article https://chrispacia.wordpress.com/2013/09/02/bitcoin-mining-explained-like-youre-five-part-2-mechanics/
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18507


View Profile
February 03, 2020, 08:33:46 PM
 #5

An example Bitcoin private key
L1VmqTKdwzM361jkFVAT5Dd2b3APSQEW6bHs8TG2XCrGj2qVRSBb
That's in compressed Wallet Import Format, but that particular private key is invalid.

Merkle Trees - Once hashed it will look like this:
2d94683fa2f8aaae4a6f377d93b875f680adf96b9c3e9577554b742f412fa9ad
I think you are confused here. Private keys undergo ECDSA to give a public key, but they aren't hashed, and they certainly aren't hashed to Merkle Trees.

and decryption of a hash is much harder work, numerous times harder, 1,000,000 and more.
It's not "numerous times harder", it's impossible. Hashing is not the same as encryption. You can't "decrypt" a hash. Nor can you reverse it. It is a one way process.
Velkro
Legendary
*
Offline Offline

Activity: 2296
Merit: 1014



View Profile
February 03, 2020, 09:22:29 PM
 #6

I am curious if private keys are vulnerable to the computational power of miners.

Can a miner or a group of miners use their huge computational power to access private keys for any public address, or the computational power is too small for that.
Miners not, but people in front of super computers yes.
There is project somewhere, that people trying to find used already addresses by finding them with brute computing power.
They found around 4-6 already. Is this something to worry about? Not sure. Probably not because there are many theories why they found 4-6 already.
webtricks
Legendary
*
Offline Offline

Activity: 1918
Merit: 1728



View Profile
February 03, 2020, 09:37:52 PM
 #7

I am curious if private keys are vulnerable to the computational power of miners.

Can a miner or a group of miners use their huge computational power to access private keys for any public address, or the computational power is too small for that.
Miners not, but people in front of super computers yes.
There is project somewhere, that people trying to find used already addresses by finding them with brute computing power.
They found around 4-6 already. Is this something to worry about? Not sure. Probably not because there are many theories why they found 4-6 already.

Are you sure? There is a difference between how set of public/private keys are used and how block is mined.

Keys are generated through Elliptic Curve Cryptography. It is one way tap door. We don't use any hashing or encryption technique in ECDSA. Instead we use special generator point G whose value is taken from secp256k1 curve. It is next to impossible to find private key from public key.

However, it is somewhat possible from signatures. When signing a message, ecdsa curve takes another parameter i.e. random number. This number is used to generate R parameter of signature. If same number is used to sign more than one message then it is possible to crack private key from R and S values of signature. Similar incident happened with Sony when the company signed their play station with ecdsa key pair but uses same value for R parameter than random number. But there is no back door for brute forcing directly on public key.

/]..JAMBLER.io../]Create Your Bitcoin Mixing
Business Now for   F R E E 
▄█████████████████████████████
█████████████████████████
████▀████████████████████
███▀█████▄█▀███▀▀▀██████
██▀█████▄█▄██████████████
██▄▄████▀▄▄▄▀▀▀▀▀▄▄██████
█████▄▄▄██████████▀▄████
█████▀▄█▄██████▀█▄█████
███████▀▄█▀█▄██▀█▄███████
█████████▄█▀▄█▀▄█████████
█████████████████████████
█████████████████████████
▀█████████████████████████████
█████████████████████████████████████████████████
.
/our-partners.php]      OUR      
PARTNERS

.
█████████████████████████████████████████████████
████▄
██
██
██
██
██
██
██
██
██
██
██
████▀
▄█████████████████████████████
████████▀▀█████▀▀████████
█████▀█████████████▀█████
████████████████████████
███████████████▄█████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████▀█████████
████████████████████████
█████▄█████████████▄█████
████████▄▄█████▄▄████████
▀█████████████████████████████
█████████████████████████████████████████████████
.
/become-seller.php]   INVEST   
BITCOIN

.
█████████████████████████████████████████████████
████▄
██
██
██
██
██
██
██
██
██
██
██
████▀
hosseinimr93
Legendary
*
Online Online

Activity: 2380
Merit: 5214



View Profile
February 03, 2020, 10:03:16 PM
 #8

There is project somewhere, that people trying to find used already addresses by finding them with brute computing power.
They found around 4-6 already. Is this something to worry about? Not sure. Probably not because there are many theories why they found 4-6 already.
I guess you are talking about Large Bitcoin Collider (Collision Finders Pool).
If so, I recommend you to read this article.

Quote
a Pool of Computers Attempting to Brute Force Bitcoin (BTC) Private Keys, Calculates 300-500 Million Keys Per Second and 36,080 Trillion Private Keys Generated So Far, but Would Still Take at Least 2.58*1024 Years to Find a Private Key Collision

Not only this project is not a worry, but also it proves security of private keys.


.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
nakamura12
Hero Member
*****
Offline Offline

Activity: 2254
Merit: 669


Bitcoin Casino Est. 2013


View Profile
February 04, 2020, 12:33:40 AM
 #9

The answer is no. Miner rigs can't get your private key. Miner rig is use to solve hash. Private key is not encrypted that you can decrypt by brute force. The people behind the computer can get your private keys like through a phishing site, malwares and viruses that they can steal your private key and also damage your computer files.

███▄▀██▄▄
░░▄████▄▀████ ▄▄▄
░░████▄▄▄▄░░█▀▀
███ ██████▄▄▀█▌
░▄░░███▀████
░▐█░░███░██▄▄
░░▄▀░████▄▄▄▀█
░█░▄███▀████ ▐█
▀▄▄███▀▄██▄
░░▄██▌░░██▀
░▐█▀████ ▀██
░░█▌██████ ▀▀██▄
░░▀███
▄▄██▀▄███
▄▄▄████▀▄████▄░░
▀▀█░░▄▄▄▄████░░
▐█▀▄▄█████████
████▀███░░▄░
▄▄██░███░░█▌░
█▀▄▄▄████░▀▄░░
█▌████▀███▄░█░
▄██▄▀███▄▄▀
▀██░░▐██▄░░
██▀████▀█▌░
▄██▀▀██████▐█░░
███▀░░
jseverson
Hero Member
*****
Offline Offline

Activity: 1834
Merit: 759


View Profile
February 04, 2020, 03:42:41 AM
Merited by Quickseller (2), ABCbits (1), hugeblack (1)
 #10

Miners not, but people in front of super computers yes.
There is project somewhere, that people trying to find used already addresses by finding them with brute computing power.
They found around 4-6 already. Is this something to worry about? Not sure. Probably not because there are many theories why they found 4-6 already.

Can we get a source on this? As far as I know, these have only ever happened to poorly generated private keys. If you're using a proper wallet to generate your keys, you should be practically immune to any brute force attack, at least with current technology.

Here's a discussion on what it would take to break the SHA256 encryption.

(If you're talking about the Large Bitcoin Collider project, it's a sham.)

akirasendo17
Sr. Member
****
Offline Offline

Activity: 1106
Merit: 310



View Profile
February 04, 2020, 05:28:31 AM
 #11

They dont have the power to get your private keys, the only way others can get your keys is when they hack your pc, or they stole your hard drive, which is impossible

        ▄▀▀▀▀▀▀   ▄▄
    ▄  ▄▄▀▀▀▀▀▀▀▀▀▄▄▀▀▄
  ▄▀▄▀▀             ▀▀▄▀
 ▄▀▄▀         ▄       ▀▄
  ▄▀         ███       ▀▄▀▄
▄ █   ▀████▄▄███▄       █ █
█ █     ▀▀▀███████▄▄▄▄  █ █
█ █       ██████████▀   █ ▀
▀▄▀▄       ▀▀█████▀    ▄▀
   ▀▄        ▐██▄     ▄▀▄▀
  ▀▄▀▄▄       ███▄  ▄▄▀▄▀
    ▀▄▄▀▀▄▄▄▄▄████▀▀ ▄▀
       ▀   ▄▄▄▄▄▄▄
        █▄
  ▀▀█▀█▄▄█ ▄ ▄▄▄
   ▄▄▄▄▄████▄▄
 ▄▀▀ ▀▄██▄▀▀▀█▄
    ▄████▌▀█▄  ▀
    ▀▀
█▌  █
     ▄  ▀

    ▄
    █
    ▄▄▄▄▄█▀▀██
   ████████████▄█████
 ▄███████████▄████████████▄
 █████████████▄█████▄███████▄
█████████████████████████████
P L A Y   S L O T S   o n     
CRYPTO'S FASTEST
GROWING CASINO
★ ‎
‎ ★
▄▄███████▄▄
▄█████▀█▀█████▄
████▀▀▀ ▀ ▀▀█████
███████  ██  ▐█████
███████      ▀█████
███████  ███  █████
████▄▄▄   ▄▄▄████
▀█████▄█▄█████▀
▀▀███████▀▀

▄▄▄▄▄▄▄
▀▀███████▀▀
▄▄███████▄▄
▄██████▀██████▄
███████▀ ▀███████
███████     ███████
██████▄     ▄██████
██████▄▀▄▄▄▀▄██████
██████▄   ▄██████
▀██████▄██████▀
▀▀███████▀▀

▄▄▄▄▄▄▄
▀▀███████▀▀
▄▄███████▄▄
▄█████████████▄
███████▌ ▐███████
████████  █████████
█████▀▀   ▄▄███████
███████  ██████████
█████▌      ▄████
▀█████████████▀
▀▀███████▀▀

▄▄▄▄▄▄▄
▀▀███████▀▀

‎ ★
      ▄▄██▄█▄        ▄██████▄
   ▀██████████▄     ██████████
      ▄▄▄▄▄     ▐██████████▌
   ▄███████████▄   ██████████
  ████████████████▄  ▀███▀▀▄██▄
     ▀▀█████████████  ▀██████████▄
          █▀▀▀▀▀▀▀▀▀
         ▐▌
         █
        ▐▌
        █       ▄▄▄▄▄▄
   ▄▄▄▄██████████████████▄▄▄
▄█████████████████████████████▄▄▄▄
█▀▀▀▀▀▀▀











█▄▄▄▄▄▄▄
.
PLAY NOW
▀▀▀▀▀▀▀█











▄▄▄▄▄▄▄█
pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10505



View Profile
February 04, 2020, 05:54:34 AM
 #12

Private keys undergo ECDSA to give a public key,

you mean "elliptic curve point multiplication".
ECDSA is Elliptic Curve Digital Signature Algorithm, that is used to create the signatures (r and s pair) through a different equation.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
joniboini
Legendary
*
Offline Offline

Activity: 2170
Merit: 1789



View Profile WWW
February 04, 2020, 06:07:57 AM
 #13

the only way others can get your keys is when they hack your pc, or they stole your hard drive, which is impossible

I'm not sure what are you referring to with the 'impossible' part but stealing others' private key through phishing, remote execution, clipboard hack, keylogging etc is definitely possible. It's already happening here and there.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
..........UNLEASH..........
THE ULTIMATE
GAMING EXPERIENCE
DUELBITS
FANTASY
SPORTS
████▄▄█████▄▄
░▄████
███████████▄
▐███
███████████████▄
███
████████████████
███
████████████████▌
███
██████████████████
████████████████▀▀▀
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
.
▬▬
VS
▬▬
████▄▄▄█████▄▄▄
░▄████████████████▄
▐██████████████████▄
████████████████████
████████████████████▌
█████████████████████
███████████████████
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
/// PLAY FOR  FREE  ///
WIN FOR REAL
..PLAY NOW..
canamani
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
February 06, 2020, 03:07:30 PM
 #14

As i read and i read a lot no the private keys are not vulnerable and even quantum computers will not can bruteforce bitcoin private keys.
walerikus (OP)
Member
**
Offline Offline

Activity: 180
Merit: 18


View Profile WWW
February 11, 2020, 12:30:04 AM
 #15

An example Bitcoin private key
L1VmqTKdwzM361jkFVAT5Dd2b3APSQEW6bHs8TG2XCrGj2qVRSBb
That's in compressed Wallet Import Format, but that particular private key is invalid.

Merkle Trees - Once hashed it will look like this:
2d94683fa2f8aaae4a6f377d93b875f680adf96b9c3e9577554b742f412fa9ad
I think you are confused here. Private keys undergo ECDSA to give a public key, but they aren't hashed, and they certainly aren't hashed to Merkle Trees.

and decryption of a hash is much harder work, numerous times harder, 1,000,000 and more.
It's not "numerous times harder", it's impossible. Hashing is not the same as encryption. You can't "decrypt" a hash. Nor can you reverse it. It is a one way process.

Yes, first I was confused, but I realized, that hashed input on merkle tree is based on transaction data which is encrypted.

And yes, there is no data to decrypt the private key, miners don't have any input information to decrypt private keys, so there is no way to make some computations to find out the private key, it will be just a random guess, which is nearly to impossible to find a correct key.

I was confused, because miners do some computations or a lot of guesses per second to find a hash. Since miners try to find a random hash for pow, it will be much harder to find a specific one in case with private keys.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!