Bitcoin Forum
May 11, 2024, 01:30:37 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 [44] 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 142 »
  Print  
Author Topic: Pollard's kangaroo ECDLP solver  (Read 55712 times)
BitCrack
Jr. Member
*
Offline Offline

Activity: 30
Merit: 122


View Profile
June 14, 2020, 12:56:06 PM
 #861

@mrxtraf
In the private key group (mod n) we can add, negate, and invert - this allows for multiplication and division.

In the public key group (elliptic curve mod p of size n) we can add, negate, and double only. This leads to multiplication by a scalar.

One public key corresponds to exactly one private key, and vice versa. The proof is very easy. Let G is the generator of secp256k1. Let P=k*G is a point on the curve. Let also P=k'*G. Then (k-k')*G=O => (k-k') divides n. But n is prime, hence k=k' (mod n).
That is, you can’t divide the public key by 10?
Give me any public key from which you know the private key, I will divide it by 10. And I will give in return the result in the form of a public key. And you yourself divide the private key by 10, get the public key from it and compare.

The multiplication (and division, which is multiplication with the inverse) is by scalar only. You cannot multiply two public keys without solving ECDLP first. And if you somehow can, then all coins are belong to you.

mrxtraf is saying they can "divide" the public key by 10 by multiplying the public key by the multiplicative inverse of 10 mod n.
1715391037
Hero Member
*
Offline Offline

Posts: 1715391037

View Profile Personal Message (Offline)

Ignore
1715391037
Reply with quote  #2

1715391037
Report to moderator
1715391037
Hero Member
*
Offline Offline

Posts: 1715391037

View Profile Personal Message (Offline)

Ignore
1715391037
Reply with quote  #2

1715391037
Report to moderator
1715391037
Hero Member
*
Offline Offline

Posts: 1715391037

View Profile Personal Message (Offline)

Ignore
1715391037
Reply with quote  #2

1715391037
Report to moderator
TalkImg was created especially for hosting images on bitcointalk.org: try it next time you want to post an image
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715391037
Hero Member
*
Offline Offline

Posts: 1715391037

View Profile Personal Message (Offline)

Ignore
1715391037
Reply with quote  #2

1715391037
Report to moderator
1715391037
Hero Member
*
Offline Offline

Posts: 1715391037

View Profile Personal Message (Offline)

Ignore
1715391037
Reply with quote  #2

1715391037
Report to moderator
1715391037
Hero Member
*
Offline Offline

Posts: 1715391037

View Profile Personal Message (Offline)

Ignore
1715391037
Reply with quote  #2

1715391037
Report to moderator
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
June 14, 2020, 04:32:35 PM
 #862

@mrxtraf
In the private key group (mod n) we can add, negate, and invert - this allows for multiplication and division.

In the public key group (elliptic curve mod p of size n) we can add, negate, and double only. This leads to multiplication by a scalar.

One public key corresponds to exactly one private key, and vice versa. The proof is very easy. Let G is the generator of secp256k1. Let P=k*G is a point on the curve. Let also P=k'*G. Then (k-k')*G=O => (k-k') divides n. But n is prime, hence k=k' (mod n).
That is, you can’t divide the public key by 10?
Give me any public key from which you know the private key, I will divide it by 10. And I will give in return the result in the form of a public key. And you yourself divide the private key by 10, get the public key from it and compare.

The multiplication (and division, which is multiplication with the inverse) is by scalar only. You cannot multiply two public keys without solving ECDLP first. And if you somehow can, then all coins are belong to you.

mrxtraf is saying they can "divide" the public key by 10 by multiplying the public key by the multiplicative inverse of 10 mod n.
BitCrack
apply your algo and show me pubkey div by 789 for
03D041CF467F485A96AB21EC0E1E1E26A344B28A12244320C4BDE48C123653D88F

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
Etar
Sr. Member
****
Offline Offline

Activity: 616
Merit: 312


View Profile
June 14, 2020, 04:48:21 PM
 #863

-snip-
BitCrack
apply your algo and show me pubkey div by 789 for
03D041CF467F485A96AB21EC0E1E1E26A344B28A12244320C4BDE48C123653D88F

035776b3684b6a5e9a6307aa53c3d484aabb90244e6371405c114cf8910a9a3bd0
And what is problem in division pub by 789?
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
June 14, 2020, 04:54:07 PM
 #864

-snip-
BitCrack
apply your algo and show me pubkey div by 789 for
03D041CF467F485A96AB21EC0E1E1E26A344B28A12244320C4BDE48C123653D88F

035776b3684b6a5e9a6307aa53c3d484aabb90244e6371405c114cf8910a9a3bd0
if need div 789.789 then ?

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
Etar
Sr. Member
****
Offline Offline

Activity: 616
Merit: 312


View Profile
June 14, 2020, 04:57:29 PM
 #865

-snip-
if need div 789.789 then ?
what you mean? you can devide point only by integer.
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
June 14, 2020, 05:00:04 PM
 #866

-snip-
if need div 789.789 then ?
what you mean? you can devide point only by integer.
mean 789.789 is value can u div pubkey by above value ?

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
Etar
Sr. Member
****
Offline Offline

Activity: 616
Merit: 312


View Profile
June 14, 2020, 05:01:51 PM
 #867

-snip-
mean 789.789 is value can u div pubkey by above value ?

Can`t and nobody can`t. devider must be integer not float. all pubkeys Q=k*G, where k - integer.
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
June 14, 2020, 05:11:21 PM
 #868

-snip-
mean 789.789 is value can u div pubkey by above value ?

devider must be integer not float. all pubkeys Q=k*G, where k - integer.
btw let me say,
highest value in ecc is 1
1 = 115792089237316195423570985008687907852837564279074904382605163141518161494337. 0
and above to 0 is
0.11579208923731619542357098500868790785283756427907490438260516314151816149433 7

so each and every digit have value, and i can div them in integar and float too actual low then 1 is called is fractional point,and i can play with each and every point Smiley

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
COBRAS
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
June 14, 2020, 05:24:37 PM
 #869

-snip-
mean 789.789 is value can u div pubkey by above value ?

devider must be integer not float. all pubkeys Q=k*G, where k - integer.
btw let me say,
highest value in ecc is 1
1 = 115792089237316195423570985008687907852837564279074904382605163141518161494337. 0
and above to 0 is
0.11579208923731619542357098500868790785283756427907490438260516314151816149433 7

so each and every digit have value, and i can div them in integar and float too actual low then 1 is called is fractional point,and i can play with each and every point Smiley

Good day. Do you know how get wright range for kangaroo search ? And how maybe manipulate pubkey for  so range ?

Thx

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
Etar
Sr. Member
****
Offline Offline

Activity: 616
Merit: 312


View Profile
June 14, 2020, 05:46:32 PM
 #870

-snip-
so each and every digit have value, and i can div them in integar and float too actual low then 1 is called is fractional point,and i can play with each and every point Smiley
each representation K like positive or negative or fraction is allways positive integer from 1 to n.
if you say me positive integer representation of 789.789 i can easy devide any pub key by this valus. Here no problem to do this.
mrxtraf
Member
**
Offline Offline

Activity: 255
Merit: 27


View Profile WWW
June 14, 2020, 06:15:47 PM
 #871

-snip-
so each and every digit have value, and i can div them in integar and float too actual low then 1 is called is fractional point,and i can play with each and every point Smiley
each representation K like positive or negative or fraction is allways positive integer from 1 to n.
if you say me positive integer representation of 789.789 i can easy devide any pub key by this valus. Here no problem to do this.

Кaк двa пaльцa oб acфaльт  Grin
Like two fingers on the asphalt.
K * 1000 = NK
f(NK / 1000) = MK
MrFreeDragon
Sr. Member
****
Offline Offline

Activity: 443
Merit: 350


View Profile
June 14, 2020, 08:29:15 PM
Merited by arulbero (2)
 #872

Are you guys still discussing the off-topic things?

It was said several times, that there is no division for public points. Our brains want to visualize the division process and we only imagine integers. But group field works under different principles.

The only thing we can do - is to multiply by the inverse scalar. That's it. But we still just multiplying a public point by the integer number, and divide it.

For every integer x we can find inverse y which is such a number where x*y%order = 1, where order if the order of the group.
No inverse exist for 0, and for order itself.

Easy explanation for the group of 7 elements (let's say week days from Monday to Sunday):
If you multiply Wednesday by 4, you will receive Friday (3*4%7 = 12%7 = 5)
For division, we also make multiplication by the inverse scalar. Here is the list of inverse scalars for every number:
inverse(1) = 1
inverse(2) = 4
inverse(3) = 5
inverse(4) = 2
inverse(5) = 3
inverse(6) = 6
inverse(7) does not exist

Now if you want to "divide" Friday by 4, you should multiply it by inverse(4) = 2. So, we have 5*2%7 = 10%7 = 3
You can see that equation is correct as it was in the 1st example (where we multiplied Wednesday by 4).

You should never divide 5 by 4 and imagine number 1.25, and so on. It is not correct.

All the elements in the group is a wheel, and repeating after reaching the order.
So, if we divide some number x by k within the group with finite order, we are searching such a number y, which will give us x if we multiply it by k: y * k = x
In order to find it, we calculate inverse k'=(1/k), and make the multiplication: y = x * (1/k)

BitCrack
Jr. Member
*
Offline Offline

Activity: 30
Merit: 122


View Profile
June 14, 2020, 09:57:07 PM
Last edit: June 15, 2020, 03:08:55 AM by BitCrack
 #873

@mrxtraf
In the private key group (mod n) we can add, negate, and invert - this allows for multiplication and division.

In the public key group (elliptic curve mod p of size n) we can add, negate, and double only. This leads to multiplication by a scalar.

One public key corresponds to exactly one private key, and vice versa. The proof is very easy. Let G is the generator of secp256k1. Let P=k*G is a point on the curve. Let also P=k'*G. Then (k-k')*G=O => (k-k') divides n. But n is prime, hence k=k' (mod n).
That is, you can’t divide the public key by 10?
Give me any public key from which you know the private key, I will divide it by 10. And I will give in return the result in the form of a public key. And you yourself divide the private key by 10, get the public key from it and compare.

The multiplication (and division, which is multiplication with the inverse) is by scalar only. You cannot multiply two public keys without solving ECDLP first. And if you somehow can, then all coins are belong to you.

mrxtraf is saying they can "divide" the public key by 10 by multiplying the public key by the multiplicative inverse of 10 mod n.
BitCrack
apply your algo and show me pubkey div by 789 for
03D041CF467F485A96AB21EC0E1E1E26A344B28A12244320C4BDE48C123653D88F


Sure.

The inverse of 789 mod n = 90549707299650307447836879278023370272751301850683416988678562304583910826370

Multiply your public key by that and you get:

035776B3684B6A5E9A6307AA53C3D484AABB90244E6371405C114CF8910A9A3BD0

Multiplying that point by 789 will result in the original public key. In otherwords, 789 * 90549707299650307447836879278023370272751301850683416988678562304583910826370 = 1 (mod n).
aplistir
Full Member
***
Offline Offline

Activity: 378
Merit: 197



View Profile
June 15, 2020, 11:33:10 AM
 #874

-snip-
mean 789.789 is value can u div pubkey by above value ?

Can`t and nobody can`t. devider must be integer not float. all pubkeys Q=k*G, where k - integer.

Sorry for continuing an off topic discussion, but:

Of course you can divide by 789.789 if you want.

because 789.789=789789/1000 , which doesn't have decimals in it AND you can divide and multiply by scalar numbers.

Don't know why would anyone want to divide by 789.789, but it s possible

My Address: 121f7zb2U4g9iM4MiJTDhEzqeZGHzq5wLh
COBRAS
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
June 15, 2020, 11:40:30 AM
 #875

-snip-
mean 789.789 is value can u div pubkey by above value ?

Can`t and nobody can`t. devider must be integer not float. all pubkeys Q=k*G, where k - integer.

Sorry for continuing an off topic discussion, but:

Of course you can divide by 789.789 if you want.

because 789.789=789789/1000 , which doesn't have decimals in it AND you can divide and multiply by scalar numbers.

Don't know why would anyone want to divide by 789.789, but it s possible


Sorry. Move talk about calculator to enother thread !!!

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
COBRAS
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
June 15, 2020, 05:03:27 PM
 #876

Help someone. Kangaroo not found dead kangaroo and privkeys. Were is a problem ? What can help to fined privkey ? In 10 pubkeys I have one with dead kangaroo ? Pubkey with dead kandagoo moree good then pubkey without kangaroo ? What to do Huh?

Thx

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1064
Merit: 219

Shooters Shoot...


View Profile
June 15, 2020, 07:23:38 PM
 #877

Help someone. Kangaroo not found dead kangaroo and privkeys. Were is a problem ? What can help to fined privkey ? In 10 pubkeys I have one with dead kangaroo ? Pubkey with dead kandagoo moree good then pubkey without kangaroo ? What to do Huh?

Thx
A dead kangaroo means there was a collision inside the same herd, either two wilds or two tames collided. The program automatically replaces the dead kangaroo with another kangaroo. so no worries.
Konstanting2
Newbie
*
Offline Offline

Activity: 27
Merit: 0


View Profile
June 15, 2020, 07:29:49 PM
 #878


Hello everybody! I have a question? On Windows7, the 65save.txt file opens and there are hieroglyphs. Is this a file with save.work right? On Windows7, everyone has a file that opens with hieroglyphs. I tried to open the file with different programs with transcoding, the result is incomprehensible. If you have Windows 10 there are no such problems? And does the Kangaroo.exe program work differently? If there are Russian-speaking users, dismount Konstanting266@gmail.com. I sorted it out in mining on my 1050Ti, but here it’s kind of complicated on Windows7 so far.
zielar
Full Member
***
Offline Offline

Activity: 277
Merit: 106


View Profile
June 15, 2020, 07:39:17 PM
 #879


Hello everybody! I have a question? On Windows7, the 65save.txt file opens and there are hieroglyphs. Is this a file with save.work right? On Windows7, everyone has a file that opens with hieroglyphs. I tried to open the file with different programs with transcoding, the result is incomprehensible. If you have Windows 10 there are no such problems? And does the Kangaroo.exe program work differently? If there are Russian-speaking users, dismount Konstanting266@gmail.com. I sorted it out in mining on my 1050Ti, but here it’s kind of complicated on Windows7 so far.

These are files that are written and recognized by the program that created them. You can see the same hieroglyphs by opening e.g. a picture or music in a notepad.

If you want - you can send me a donation to my BTC wallet address 31hgbukdkehcuxcedchkdbsrygegyefbvd
Konstanting2
Newbie
*
Offline Offline

Activity: 27
Merit: 0


View Profile
June 15, 2020, 07:47:53 PM
 #880

Thanks for the help. I was able to compile a file for your clients. The program helped fix the extension as needed bat and txt. I started it after 3 minutes at 1050 and got an answer in 65save.txt, but I could not read everything there in hieroglyphs. Help explain how further please.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 [44] 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 142 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!