Bitcoin Forum
April 30, 2024, 01:20:51 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 [111] 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 »
  Print  
Author Topic: Pollard's kangaroo ECDLP solver  (Read 55516 times)
NotATether
Legendary
*
Online Online

Activity: 1582
Merit: 6715


bitcoincleanup.com / bitmixlist.org


View Profile WWW
September 22, 2021, 08:07:04 AM
 #2201

Very good explanation, also I did post the whole Quantpy Beta thing as a joke, obviously its infeasible to simulate anything close to 63 Qubits with a classical computer.

You did manage to fool a good number of people apparently Cheesy, it made for an entertaining read.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
The block chain is the main innovation of Bitcoin. It is the first distributed timestamping system.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714483251
Hero Member
*
Offline Offline

Posts: 1714483251

View Profile Personal Message (Offline)

Ignore
1714483251
Reply with quote  #2

1714483251
Report to moderator
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
September 24, 2021, 09:11:37 AM
 #2202


Hi, Now still no anybody solve puzzle #120

Did anyone try using kangaroo for solve puzzle #120 ?


wedom
Jr. Member
*
Offline Offline

Activity: 48
Merit: 11


View Profile
September 24, 2021, 09:48:08 AM
 #2203


Hi, Now still no anybody solve puzzle #120

Did anyone try using kangaroo for solve puzzle #120 ?



I think a lot of people in this thread have tried to solve puzzle 120 with a kangaroo. But since bitcoins are still in place, it means no one has solved it. Brainless somehow found a way to reduce the number of keys to search and if I understand the translation correctly, solved the puzzle 120, but did not withdraw funds. I could be wrong.
PrivatePerson
Member
**
Offline Offline

Activity: 173
Merit: 12


View Profile
September 24, 2021, 11:08:37 AM
 #2204

solved the puzzle 120, but did not withdraw funds.

It is fantastic  Grin
COBRAS
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
September 24, 2021, 11:31:06 AM
 #2205


Hi, Now still no anybody solve puzzle #120

Did anyone try using kangaroo for solve puzzle #120 ?



I think a lot of people in this thread have tried to solve puzzle 120 with a kangaroo. But since bitcoins are still in place, it means no one has solved it. Brainless somehow found a way to reduce the number of keys to search and if I understand the translation correctly, solved the puzzle 120, but did not withdraw funds. I could be wrong.

I was reduce 120 public key, find a privkey, and we share 1.2 btc 50/50.


https://bitcointalk.org/index.php?topic=5358408.new#new

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
a.a
Member
**
Offline Offline

Activity: 126
Merit: 36


View Profile
September 24, 2021, 11:41:17 AM
 #2206

If I have the privatekey for your public key... why should i share it with you?
COBRAS
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
September 24, 2021, 11:51:08 AM
 #2207

If I have the privatekey for your public key... why should i share it with you?

Because you will have only partial private key. For getting funds you need provide private key to me in pm or simple through post message on phorum and I will get find after ad share 1.2 btc with you or any another person who will find a privkey.

P.s. I will find a privkey for myself if no one will be interested, but right now I too busy so, I will like any privkey solve from a phorum community.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
September 24, 2021, 12:30:25 PM
 #2208


I was reduce 120 public key, find a privkey, and we share 1.2 btc 50/50.


https://bitcointalk.org/index.php?topic=5358408.new#new

What you mean reduce 120 public key? Sorry I not yet back to read all information?

I busy and not follow thread over 5-6 month, What I miss, What new interesting?

I think may be some one running Pollard's kangaroo continue 6 month may be some one solve already but still not that mean nobody running continue too longer enough can solve puzzle.

I agree about fine other methods to can solve puzzle.

I forget a lot of knowledge, may be I need to re-learning again.
a.a
Member
**
Offline Offline

Activity: 126
Merit: 36


View Profile
September 27, 2021, 02:19:41 AM
 #2209

How do you generate these pubkeys?
COBRAS
Member
**
Offline Offline

Activity: 846
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
September 27, 2021, 02:45:28 AM
 #2210

How do you generate these pubkeys?

With my private formula. This is not a simple divide or substract.

Let’s go fin a key and we slit profit.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
a.a
Member
**
Offline Offline

Activity: 126
Merit: 36


View Profile
September 27, 2021, 03:33:32 AM
Merited by WanderingPhilospher (1)
 #2211

Please describe what you are doing. I mean, we should invest calculation power on the premise, that your key is resulting in a solution. But till now, you are lacking the proof, that it makes sense.

And why dont you reduce it further and further?

ssxb
Jr. Member
*
Offline Offline

Activity: 81
Merit: 2


View Profile
September 27, 2021, 04:22:21 AM
 #2212

This is a “subtracted” 120 puzzle public key:

0368c52337698581d2509522b7e0cbeb500bb613b6ad0c27cda7e86988c796ee90



Keyrange 2: 1000000000000000000000000000

With who will find a private key we share 1.2 btc 50/50%

Find a privkey and post privkey in this thread.

ASAP privkey needed !!!

Regard

WonderPhilosofer, try find this puzzle ? We share 1.2 btc 50/50 ? You have so many keyrate power, help solve the this please Huh

i dont want to reply your foolish things but you pushed me in limit ~ let me give you bad news and please stop your childish acts


lets say if 120 is in 8..... range and you will subtract  900000...... or even f00000..... you will end up with higher range than the orignal key range and big lol. you try more by flipping (02 with 03 or 03 with 02) the key you will never know which bit you have to search. assume you flip the key and its come in 119 and you start searching in 118 or in some other range. well good luck to you

you need to be so precise and in other word should know private key of lower range  Kiss

and remember what you are trying to do here i cover this shit million of time so its waster of time. rather than going with your so call one key i will prefer to go with divisor 32 keys as at least i know they are in 115.

now stop this shit and talk about math first . show us your calculation with any other key etc. i know already what you are doing . you are flipping the key and assuming this is in this range but let me tell you .

its all wrong what you are doing ~ wasting your time and our time as well.

fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
September 27, 2021, 04:27:56 AM
 #2213

This is a “subtracted” 120 puzzle public key:

0368c52337698581d2509522b7e0cbeb500bb613b6ad0c27cda7e86988c796ee90



Keyrange 2: 1000000000000000000000000000


How I begin to read about how to use “subtracted” ?
I try to read up to date from 6 month I missing update all knowledge (unfortune some knowledge I forget between un used, now try to understand again it is very complex)
ssxb
Jr. Member
*
Offline Offline

Activity: 81
Merit: 2


View Profile
September 27, 2021, 04:33:21 AM
 #2214

This is a “subtracted” 120 puzzle public key:

0368c52337698581d2509522b7e0cbeb500bb613b6ad0c27cda7e86988c796ee90



Keyrange 2: 1000000000000000000000000000


How I begin to read about how to use “subtracted” ?
I try to read up to date from 6 month I missing update all knowledge (unfortune some knowledge I forget between un used, now try to understand again it is very complex)


https://bitcointalk.org/index.php?topic=5244940.1920 start from this page toward end page  ~ you will know many things just for your understanding  Grin
ssxb
Jr. Member
*
Offline Offline

Activity: 81
Merit: 2


View Profile
September 27, 2021, 04:47:29 AM
 #2215

How do you generate these pubkeys?

he learnt recently about 02 and 03 relation and he is trying to jump between them but i covered that million times in most advance way which he only can dream. but no luck ~~

let me tell you guys if you are trying to do some math things keep in mind they called it curve (with logarithm problem) and no matter what calculations you will do. there will be always blockage and relationship of keys with each other which will puzzle you. so just try your luck dont try to defeat it with math.


simple thing let me tell you how they solved up to 115 .

assume you calculation power is 100 and you are trying to find 50 ~ in blink you can find (like 40 or 60 bits)
assume your calculation power is 100 and you are trying to find 50000000000000000000 ~ still you gonna over come it as its some how possible over some period of time x. (like he solved 115 in 2 month i guess)
assume your calculation power is 100 and you are trying to find 5000000000000.........000000 . well good news you still able to find it but bad news you grand grand grand grand grand grand child will find that key and will enjoy that money while your body will be just a dust.(120 is that thing)


but luck game is on ~~

NotATether
Legendary
*
Online Online

Activity: 1582
Merit: 6715


bitcoincleanup.com / bitmixlist.org


View Profile WWW
September 27, 2021, 11:16:02 AM
 #2216

I think a lot of people in this thread have tried to solve puzzle 120 with a kangaroo. But since bitcoins are still in place, it means no one has solved it. Brainless somehow found a way to reduce the number of keys to search and if I understand the translation correctly, solved the puzzle 120, but did not withdraw funds. I could be wrong.

I am telling you, brainless' method is baloney. (I reverse engineered his script and I can share it right here if you want - it is useless).

Brainless did not manage to reduce a 120 bit key to a smaller range (and he definitely did not solve #120). He made 2^20 zones, each of which are 2^20th the size of the 2^256 range. (He said that himself, read his posts again carefully).

Also see:

little bit more example
dec 33
hex 21
pubkey 021697ffa6fd9de627c077e3d2fe541084ce13300b0bec1146f95ae57f0d0bd6a5
use your program to get 32 keys of above pubkey

you will see 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 in your list
one step ahead pubkey is 1.03125 ( 03bb2228d3ea32cb3c1eb160cc824a4ba8115f9a7f415d18ddcaac8193defc2c47 + 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798  )

and in private key F7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFEC4D965FF79CE5B39E1D3CB9869B48F38
029eda0cebe3c594b59add6dccbff3347f06ad09e83e0b9279dd821cc94284c5d0

hope you will test each zone for your understand

Sorry to rain on this, but this method is useless.

I managed to decode how to split multiple keys using this method (I even made a script that reproduces your example, but it's private at the request of someone else, not that the results would be useful/practical to anyone here), and it turns out you're just using mod(32)-sized ranges.

Now as we all know, when you modinv a small number on secp256k1 you get a very large number (and modinv a "decimal number" is really just modinv(denominator) * numerator so this still holds for that)

This effectively means that the range becomes humungous, way bigger than 2^120 where we started.



The ranges look something like this (P = public key):

1*modinv(32) 2*modinv(32)     1P
2*modinv(32) 3*modinv(32)     2P
...
32*modinv(32) 33*modinv(32) (32*modinv(32) = 1)      32P

The ranges are much bigger than when you divide-and-split them down by a number.

Now of course you can replace 32 with an extremely huge number to make the ranges manageable/smaller but what's the point? Now you have an unmanageable amount of public keys.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
brainless
Member
**
Offline Offline

Activity: 318
Merit: 34


View Profile
September 27, 2021, 02:34:41 PM
 #2217

I think a lot of people in this thread have tried to solve puzzle 120 with a kangaroo. But since bitcoins are still in place, it means no one has solved it. Brainless somehow found a way to reduce the number of keys to search and if I understand the translation correctly, solved the puzzle 120, but did not withdraw funds. I could be wrong.

I am telling you, brainless' method is baloney. (I reverse engineered his script and I can share it right here if you want - it is useless).

Brainless did not manage to reduce a 120 bit key to a smaller range (and he definitely did not solve #120). He made 2^20 zones, each of which are 2^20th the size of the 2^256 range. (He said that himself, read his posts again carefully).

Also see:

little bit more example
dec 33
hex 21
pubkey 021697ffa6fd9de627c077e3d2fe541084ce13300b0bec1146f95ae57f0d0bd6a5
use your program to get 32 keys of above pubkey

you will see 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 in your list
one step ahead pubkey is 1.03125 ( 03bb2228d3ea32cb3c1eb160cc824a4ba8115f9a7f415d18ddcaac8193defc2c47 + 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798  )

and in private key F7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFEC4D965FF79CE5B39E1D3CB9869B48F38
029eda0cebe3c594b59add6dccbff3347f06ad09e83e0b9279dd821cc94284c5d0

hope you will test each zone for your understand

Sorry to rain on this, but this method is useless.

I managed to decode how to split multiple keys using this method (I even made a script that reproduces your example, but it's private at the request of someone else, not that the results would be useful/practical to anyone here), and it turns out you're just using mod(32)-sized ranges.

Now as we all know, when you modinv a small number on secp256k1 you get a very large number (and modinv a "decimal number" is really just modinv(denominator) * numerator so this still holds for that)

This effectively means that the range becomes humungous, way bigger than 2^120 where we started.



The ranges look something like this (P = public key):

1*modinv(32) 2*modinv(32)     1P
2*modinv(32) 3*modinv(32)     2P
...
32*modinv(32) 33*modinv(32) (32*modinv(32) = 1)      32P

The ranges are much bigger than when you divide-and-split them down by a number.

Now of course you can replace 32 with an extremely huge number to make the ranges manageable/smaller but what's the point? Now you have an unmanageable amount of public keys.
Please read Q and A and my explaination related to that Q start from here
https://bitcointalk.org/index.php?topic=5244940.msg57818498#msg57818498

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
NotATether
Legendary
*
Online Online

Activity: 1582
Merit: 6715


bitcoincleanup.com / bitmixlist.org


View Profile WWW
September 27, 2021, 03:26:24 PM
Last edit: September 27, 2021, 03:43:18 PM by NotATether
 #2218

Please read Q and A and my explaination related to that Q start from here
https://bitcointalk.org/index.php?topic=5244940.msg57818498#msg57818498

Your Q that you have just linked to says this:

guys lets say 32 divisors will return 32 keys , one of will be guaranteed for lower range but what about other all keys , i guess they all are also valid ~~ so my question is all other keys are random in 256 range or what?

Emphasis on "in 256 range"

This is what I reverse-engineered a month ago for someone who thought they can reduce 120-bit keys a N number of smaller keys, where N is a tiny number like 260: https://gist.github.com/ZenulAbidin/e8687d9e16189c99d192e97d37e71dbe

As you can see, this exactly reproduces the results of the post I quoted.

Start with this public key 03bb2228d3ea32cb3c1eb160cc824a4ba8115f9a7f415d18ddcaac8193defc2c47

Divide it into 32 "zones", where the first zone is from f7fffffffffffffffffffffffffffffec4d965ff79ce5b39e1d3cb9869b48f37 to effffffffffffffffffffffffffffffecf03ef184454163803d538a40332dd2d (this script spits it into two ranges so that you can actually load this into brute force programs).

Now you see the problem with this?

The generated range is already much bigger than the input range. (same for the other 31 zones - which all match your test output BTW). Instead of a <120-bit range now we have to do an impossible 256-bit search!

A script that reduces keys is supposed to make the range smaller, currently, the only known script that does this is the one by iceland.

And it does that well (at the expense of making an unmanageable amount of keys).

Now here's a method for reducing PKs (by guessing which ones are more likely to be the correct one) that actually reduces the range in the process - in fact it can be used to generate the most likely N keys (where N is any positive number - larger N = higher probability obviously):



You see, the number of keys you get from this can be drastically reduced not by splitting them up into "zones", but by using statistical analysis to see what bit patterns in OpenSSL private keys are more likely to appear in. Using birthday paradox, certain combinations of the private key bits account for a large percentage of the probability - and most importantly the lower PK bits can be used as an index to the array of millions of PKs generated (say length M) - because all of the divided pubkeys have been subtracted by M first.

Example:

I divide Public Key XYZ by 32 - this makes 32 public keys with each of them have been subtracted with numbers 0-31 first before dividing.

Say the results are: A, B, C, D, E, ... etc.

Put all of these in an array so that there are 31 elements in it.

Now you randomly generate about 1000 private keys using OpenSSL (Because let's face it, the puzzle creator would've found it convenient to create hex private keys only from OpenSSL command line) and measure how frequently the 1 and 0 bits appear in the lowest ceil(log2(32)) = 5 bits.

Then you use that info to create a table of the most frequent (likely) lowest ceil(log2(32)) = lowest 5 bits.

Now the kicker here, is that instead of using them as a guess for the PK, you use them as a guess for the index.

That is because when a private key is found, you will multiply it by 32 - and add the remainder back to it to get the same lower bits as in the frequency analysis.

Therefore, the index numbers directly correlate to the lower bits of the actual private key. And this is why this method works (script is not finished yet I'm still working on it).



Again, the problem with your method is that it makes the range bigger than what we started with in the first place.

So please make sure methods you make actually reduce the range before misleading people about them in the whole thread.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
brainless
Member
**
Offline Offline

Activity: 318
Merit: 34


View Profile
September 27, 2021, 03:44:16 PM
 #2219

Please read Q and A and my explaination related to that Q start from here
https://bitcointalk.org/index.php?topic=5244940.msg57818498#msg57818498

Your Q that you have just linked to says this:

guys lets say 32 divisors will return 32 keys , one of will be guaranteed for lower range but what about other all keys , i guess they all are also valid ~~ so my question is all other keys are random in 256 range or what?

from here, my answer were no random, and exact in all 256bit range, and what is exact location, i explain about how to calc exact range, simple, bro if you mislead by my those answers and explanation, i love to say SORRY

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
a.a
Member
**
Offline Offline

Activity: 126
Merit: 36


View Profile
September 27, 2021, 03:52:35 PM
 #2220

When openSSL uses /dev/urandom, then even the last 5 digits will be random.

What is the benefit of calculating it in zones? And how is it possible to determine which PubKey is in which Zone?
Pages: « 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 [111] 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!