Bitcoin Forum
May 13, 2024, 02:25:13 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3] 4 »  All
  Print  
Author Topic: Let test my scrypt for find a privkey ?  (Read 1389 times)
stilichovandal
Newbie
*
Offline Offline

Activity: 28
Merit: 5


View Profile
October 25, 2021, 08:23:26 PM
 #41

so YODA?

any  answer about my taks -> privatekey?

it is 236 bit Smiley

tra1= 1
pub1x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub1y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P1 = E.point( (pub1x, pub1y) )
z1= 112323818011444308532154156809791512490481409328487377578658798184939273365753
r1= 90937764429714181091518576954784497381123753886576264887848415721161268263325
s1= 32301773972298712856167522581835852952363404020702604124031703051653475276885

tra2= 2
pub2x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub2y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P2 = E.point( (pub2x, pub2y) )
z2= 63411750104378216106268069909600790451706028461203456737824525370631845328318
r2= 86346150910137509609344625691599542535918568842055530411731320679899147085087
s2= 4268945849575439948632718326171397033773861929869244843748630668533369222459

tra3= 3
pub3x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub3y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P3 = E.point( (pub3x, pub3y) )
z3= 79349320560799676563200310034840814874240057254321858269232326144300293024337
r3= 17527396478512552536838095497662531293473312719074902415474332336063038520883
s3= 1671086020812206913314822827788093121970071457555990962314488521750031778348

tra4= 4
pub4x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub4y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P4 = E.point( (pub4x, pub4y) )
z4= 111719407542708627765406496929766523417674769638494346343617935212775064712492
r4= 29924894305911993971700689926582623154606975873466877427514213965666352295789
s4= 21981255311504029252979084394556501113150570806366735255642359545289593453509

tra5= 5
pub5x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub5y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P5 = E.point( (pub5x, pub5y) )
z5= 69076318301948576252908653750751030641098462381295895398198246556556305709667
r5= 35853472164935290410520861945617816820817694765156371040066672386028198756245
s5= 44140947380041473199446770734677178553251520307452000438635125756091954802847

tra6= 6
pub6x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub6y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P6 = E.point( (pub6x, pub6y) )
z6= 87525281104793248555223962753932102474091353245616358894220342137591065648795
r6= 89534910675379598084426240944960884675142967536453203977482074273337524935469
s6= 5350576882548184285107132822746894553839456649519356490152422985208823848543

tra7= 7
pub7x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub7y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P7 = E.point( (pub7x, pub7y) )
z7= 95154703799470404948889839708281614422210985157462320787309126126493711238454
r7= 10775530465875143628733301317249144070875689297140563589176512846977330663836
s7= 1107971449980930012886449289371213158640444298743499432700140060040278154625

tra8= 8
pub8x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub8y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P8 = E.point( (pub8x, pub8y) )
z8= 110297984137336887794534618636891464624414782506677071251915312211039779947200
r8= 102857886285610163920553573747206657882523095308544812605465441040956132906749
s8= 34652899766470849191428673246386046253608995660442342723959267794555071724709

tra9= 9
pub9x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub9y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P9 = E.point( (pub9x, pub9y) )
z9= 101136862093088071135619001641654061024696125299802677020023914291291699874740
r9= 46023516006578146309179116894598082725309041773116316861858192938740182959154
s9= 19891325783813369953760125498837483480602547846597004555509645284209518427843

tra10= 10
pub10x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub10y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P10 = E.point( (pub10x, pub10y) )
z10= 80283304551230692096705107162165636851582354186724160938325034740970194443177
r10= 105686457221516425581405664247289208618482746662391728170105454277713940179807
s10= 47799421689155557861152960464456039875212287576265789366024969637118423238926

tra11= 11
pub11x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub11y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P11 = E.point( (pub11x, pub11y) )
z11= 76140262367232740107525887002986367458233406162495221138952531809352128558978
r11= 45348056768983801149761165185703075512814820550286816087723438606638135265199
s11= 38095791640553240055871336715264903859554980744832998730617923320799279282180

tra12= 12
pub12x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub12y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P12 = E.point( (pub12x, pub12y) )
z12= 60257785799524921311274429022105648366660637649238490144652133000794141844645
r12= 103656988377335599225818665595591545611294317291646647074969142528172991113325
s12= 10525626476774003458944943852994282003423265631210717927939879129516368879782

tra13= 13
pub13x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub13y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P13 = E.point( (pub13x, pub13y) )
z13= 58747953750937722457540535386074118582083718187792382051999147199706267645083
r13= 108563762891357698413857806573341350065561933367103292526880876467583951078221
s13= 777953126996477196917829783802846459733193065817709018291251315733698606670

tra14= 14
pub14x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub14y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P14 = E.point( (pub14x, pub14y) )
z14= 63756554271606490276232988732865881640604490071182994203641010731164236465123
r14= 35412754309711787837106357563296019605036467059184878081814799897633761540746
s14= 17444874267423315657964674752777832930946249718935840056475015046994286231023

tra15= 15
pub15x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub15y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P15 = E.point( (pub15x, pub15y) )
z15= 113624661584996837072531045236663748558335606629088436046554784054141586754165
r15= 78162809131088648799374076511285143187027593517489080668251454937016388028838
s15= 43220564322852749858292804613420793711709437674012790254465429311628515208012

tra16= 16
pub16x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub16y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P16 = E.point( (pub16x, pub16y) )
z16= 109386006454769776063864662037037460004371946202455095215564020072522130152878
r16= 19179491292102179995134524825344517110947416685081306492251802805882050890545
s16= 16719439493629962807287213336882291089819640328067335061156185379217571795163

tra17= 17
pub17x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub17y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P17 = E.point( (pub17x, pub17y) )
z17= 91070825179001828174525622157088306224668730349720431920265232817535187512108
r17= 76433730639038018834830128737808969537623238891870881356776356209041927042512
s17= 6105336249226231674347594641915320835093020836337496757685119957748940354544

tra18= 18
pub18x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub18y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P18 = E.point( (pub18x, pub18y) )
z18= 75755253450858911439222751211157287339974235291969172236999379569161006949422
r18= 76133060109729952153985167080548176544825604633529851409455092529720299251030
s18= 2420254492265318522910249870523612142287763641470314437912963906809420673955

tra19= 19
pub19x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub19y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P19 = E.point( (pub19x, pub19y) )
z19= 72942487766515545431049659873024728592988806404657970872558543560101686934761
r19= 4230009160127237103853402184829164992674977691996442718508498741187537403121
s19= 19756701990927602422191787089714828426196633002602739453061827662943200642981

tra20= 20
pub20x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub20y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P20 = E.point( (pub20x, pub20y) )
z20= 113292041920222707396601933367121838673925519878141449677291973804955653854339
r20= 83714532253348048820318334130415761065486524516862054108229046085289547400313
s20= 21826492645758597883884296843008445677500948799261289333324041943144336807182

tra21= 21
pub21x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub21y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P21 = E.point( (pub21x, pub21y) )
z21= 108484387579126728798913853832786563548436194873079940686190708601623660717214
r21= 53067875014287403230149181012786993834860635760289402736620213913767333654167
s21= 7725847764008568659029968818844964736040544448918001678027635161238194905529

tra22= 22
pub22x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub22y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P22 = E.point( (pub22x, pub22y) )
z22= 80614533734184592814229292370668269317864725988923218554228478216830991980034
r22= 44944229275906746716119169967774680611090983810442473244586848819916268162446
s22= 29326687031461128858219676854906230640622309017213289670253103186261440427722

tra23= 23
pub23x= 41410712512756123527524891867241337141497973098366908445751911466733228645149
pub23y= 17809486533361797082340940054389290600359863940578760851643056854741173003162
P23 = E.point( (pub23x, pub23y) )
z23= 85204499010668241275189171914405140558152901911509187103403110457370568237474
r23= 10108401786393784241009871694432520809686452475290329590541599110891118332950
s23= 25030493248505762691691473402601971394982702380438856813113576966447968187906






why do you tamper with the signature once it's generated?

copy paste of your code.

        if s> half_mod:
            s=curve.n -s
        if s<0:
            s=s%curve.n

"The nature of Bitcoin is such that once version 0.1 was released, the core design was set in stone for the rest of its lifetime." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
ymgve2
Full Member
***
Offline Offline

Activity: 161
Merit: 230


View Profile
October 26, 2021, 12:11:29 AM
 #42

So are you all just using lattices to find private keys like in this paper? https://eprint.iacr.org/2019/023
COBRAS (OP)
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
October 26, 2021, 12:26:35 AM
 #43

So are you all just using lattices to find private keys like in this paper? https://eprint.iacr.org/2019/023

https://github.com/bitlogik/lattice-attack

https://github.com/meowmeowxw/lattice-based-attacks

Hi is not know a nonce, if hi will know nonce is not need 100 pubkey examples....

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
_Counselor
Member
**
Offline Offline

Activity: 107
Merit: 61


View Profile
October 26, 2021, 04:58:02 AM
 #44

now my is stable up to 252 bit. and yours? Ps. of course you have script, becouse it is math, the problem is with precision , and it depends form kind of algo you will use, sometimes must be somethng changing, but you have not ansered, what kind algo? if you don;t know then you have use one of google scipt.
 my task:)
Did you write something about algorithm in your own script? Why I have to uncover my mathematical poetry?  Wink

But ok, this is not secret - algorithm is well known lattice reduction, as was already mentioned on this forum. It works perfectly with only 4 known bits of nonces (yes, up to 252 bit nonces) and any private key length. I don't know why you also required reduced private keys.

Also I don't understand what a problem you mentioned with different nonce sizes. If all of nonces is beetween 2**1 and 2**240 then it is obviously that we know that at least first 16 bits are zeroes - this is enough for construct the matrices, and other 240 bits do not matter whether there are zeros or not.


This code is very close to my own.
COBRAS (OP)
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
October 26, 2021, 06:42:06 AM
 #45

now my is stable up to 252 bit. and yours? Ps. of course you have script, becouse it is math, the problem is with precision , and it depends form kind of algo you will use, sometimes must be somethng changing, but you have not ansered, what kind algo? if you don;t know then you have use one of google scipt.
 my task:)
Did you write something about algorithm in your own script? Why I have to uncover my mathematical poetry?  Wink

But ok, this is not secret - algorithm is well known lattice reduction, as was already mentioned on this forum. It works perfectly with only 4 known bits of nonces (yes, up to 252 bit nonces) and any private key length. I don't know why you also required reduced private keys.

Also I don't understand what a problem you mentioned with different nonce sizes. If all of nonces is beetween 2**1 and 2**240 then it is obviously that we know that at least first 16 bits are zeroes - this is enough for construct the matrices, and other 240 bits do not matter whether there are zeros or not.


This code is very close to my own.

Thank you Bro, I already found same codes but not tested(try make simple test in the days). But, I not seen what lattice can find a nonces, I find codes what only for private keys... What is wring in my knolage ?

Thx !


$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
NotATether
Legendary
*
Offline Offline

Activity: 1596
Merit: 6739


bitcoincleanup.com / bitmixlist.org


View Profile WWW
October 28, 2021, 04:14:47 PM
 #46


Not sure if you thought posting TEX here would actually render it, lol.

But we really need to have some sort of rule in relation to posting large dumps. It becomes very annoying to follow threads when you have to wade through hundreds of lines of points, tx signatures and pubkeys (and all the people mindlessly quoting that stuff does not help).

Like, literally nuking all posts with huge line dumps unless they post it in a pastebin and just post the link to it.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
October 28, 2021, 06:16:49 PM
 #47

sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
COBRAS (OP)
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
October 28, 2021, 08:42:40 PM
 #48

sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx
Yes, the show has to go on, show us how you can find some private key for the show to go on? And then many are trying to understand your algorithm, but they did not succeed. Yes, the script selling thread randomly generated several revelations and allowed the show to continue reviving this forum, which spends electricity searching for private keys comparable to the amount of energy spent on mining ...

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
a.a
Member
**
Offline Offline

Activity: 126
Merit: 36


View Profile
October 28, 2021, 09:23:14 PM
 #49

Here you give COBRAS just the Parameters  r s z h and nonce and COBRAS gives you Privet.

Its like
a = b + c where he gives you c when you give him a and b. Very hard math.
COBRAS (OP)
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
October 29, 2021, 12:10:32 AM
 #50

Here you give COBRAS just the Parameters  r s z h and nonce and COBRAS gives you Privet.

Its like
a = b + c where he gives you c when you give him a and b. Very hard math.

Yeas, if all be good you will be my r,s,z calculator tester Bro )))) and I will pay you 1 privkey for your pubkey for your work. Grin Grin Grin Grin

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
COBRAS (OP)
Member
**
Offline Offline

Activity: 850
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
October 29, 2021, 12:17:50 AM
 #51

sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx

Show not end, but using shit generated data of r,z,s is a bad idea... Then paste this data to scrypt, only God, can help make scrypt working(I'm serious)...because generated data not on the curve f##k...God is great.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
October 29, 2021, 03:17:25 AM
 #52


I would like to learning an understand this method  use R S Z value?
What good article document or youtube to can read and learn easy explain about it , please advice?

if I have private key can I calculate R S Z value?
What is formula for calculate R S Z how to calculate none?
brainless
Member
**
Offline Offline

Activity: 316
Merit: 34


View Profile
October 30, 2021, 07:13:54 AM
 #53


I would like to learning an understand this method  use R S Z value?
What good article document or youtube to can read and learn easy explain about it , please advice?

if I have private key can I calculate R S Z value?
What is formula for calculate R S Z how to calculate none?
study here
https://www.koreascience.or.kr/article/JAKO202011161035971.jsp-kj=SSMHB4&py=2012&vnc=v27n6&sp=588

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
October 31, 2021, 11:41:58 AM
 #54


Thank a lot
mausuv
Jr. Member
*
Offline Offline

Activity: 70
Merit: 1


View Profile
December 21, 2021, 06:30:28 AM
 #55

iknow r s1s2  value
i need z1z2 how to calculate
i read this post explain testnet ,i am not understad https://bitcointalk.org/index.php?topic=5327054.msg56686056#msg56686056
https://bitcointalk.org/index.php?topic=977070.msg10669517#msg10669517 #read 1,3page

please explain stepy by step calulate z1z2  from bitcoin mainet or write code #mybadenglish

run this script https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
output : show r s1s2 z1,z2
but i got error what my mistake

https://tbtc.bitaps.com/raw/transaction/ff948290ff332aed8f0e5d767118a02e8671578c6775a333bb4ee4d6ccfcf639
i am enter raw tx i got error https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
Code:
Traceback (most recent call last):
File "RawTX_RSZ.py", line 13, in
s = keyUtils.derSigToHexSig(m[1][:-2])
File "/home/runner/btc-rsz/keyUtils.py", line 32, in derSigToHexSig
x, s = ecdsa.der.remove_integer(s)
File "/usr/local/lib/python2.7/dist-packages/ecdsa/der.py", line 218, in remove_integer
raise UnexpectedDER("Negative integers are not supported")
ecdsa.der.UnexpectedDER: Negative integers are not supported
i know r s1s2
i need z1z2 value please how to get z1z2 #mybadenglish
stanner.austin
Member
**
Offline Offline

Activity: 67
Merit: 53


View Profile
December 21, 2021, 08:06:58 AM
 #56

@mausuv
Hi
Your raw data for that tx is decoded this ways.
Code:
01000000 //message version
01 //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422 // PROV HASH
01000000 // PROV HASH INDEX
6A4730440220 //SCRIPT LEN 0x6A + SCRIPT DATA 0x47 WITH R,S,X point compressed or full pub key
503434F27F0D5DC23C01A5D2B2B2ABB902E2816987515DAFA619FFDED8FC2EC6 // R
0220
4C30C0B82C9AFD623E140BF2D6BADFA2F02414EF3FFC603E83F2F65A264CE2B8 // S
0121
0355D77643F9BBCCDE7A1F05D8FA72C0B6C53075CDC299753242320EF9C6611233 //PUB KEY X POINT
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 // OUTPUT AMOUNT
1976A914
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000

details of input and output address need for Z
Code:
OUTPUT ADDRESS mxR3WHpKxCjgYvoh5VS72HF2y8HHfhZfKG
6F //TEST NET
B95BFE11C932408AE44DA26872B3C8CD5D61691A //ADDRESS
D05ED3BB //CHECKSUM

INPUT ADDRESS mpPQhMr2CuRn1AQJgCmcMhH8PgrYaKknSa
6F //TEST NET
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //ADDRESS
7A6D71D7 //CHECKSUM

data for Z making for DOUBLE SHA2 (2 time SHA2 used )
Code:
01000000      //message version
01          //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422    // PROV HASH
01000000     // PROV HASH INDEX
1976A914
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //INPUT ADDRESS
88AC
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 //OUTPUT AMOUNT
1976A914 // SCRIPT DATA
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000 //LOCK TIME
01000000 //SHA2

result
C340C9ECE755E54BF99C34386EB8E19BEFD76CB3DDD5B47A4D52BE65FEA05B6D

if you have more then 01 input you have to add more data after first SEQ
if you have more then 01 output you have to add each output in each Z data calculation after first output data.
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
December 22, 2021, 12:41:55 PM
 #57


I use same script just copy Bitcoin testnet raw transaction to
I got result

('THE R VALUE is  :', '503434f27f0d5dc23c01a5d2b2b2abb902e2816987515dafa619ffded8fc2ec6')
('THE S VALUE is  :', '4c30c0b82c9afd623e140bf2d6badfa2f02414ef3ffc603e83f2f65a264ce2b8')
('THE Z VALUE is  :', 'c340c9ece755e54bf99c34386eb8e19befd76cb3ddd5b47a4d52be65fea05b6d')
('THE PUBKEY is :', '0355d77643f9bbccde7a1f05d8fa72c0b6c53075cdc299753242320ef9c6611233')


if I know Key how I can calculate and got result same on testnet
mausuv
Jr. Member
*
Offline Offline

Activity: 70
Merit: 1


View Profile
December 23, 2021, 12:23:11 PM
 #58

@all
@stanner.austin
@fxsniper
@Cryptosirr
hi guys Wink solve this math example 9cbdfb599ed0100
problem: how to remove last digit zero,,
i know [:-1] this method use remove the last digit,but i need mathematically steps like + - * /

why i am post this topic  Smiley mathbehind crack ecdsa Wink

example input:
9cbdfb599ed0100
ce5efdaccf68080
1cbdfb599ed0100
397bf6b33da0200

i need output:
9cbdfb599ed010
ce5efdaccf6808
1cbdfb599ed010
397bf6b33da020
solve the math write here... :Note only last digits remove #mybadandgoodenglish
TheArchaeologist
Sr. Member
****
Offline Offline

Activity: 310
Merit: 727


---------> 1231006505


View Profile WWW
December 25, 2021, 10:54:00 AM
 #59

i know [:-1] this method use remove the last digit,but i need mathematically steps like + - * /

why i am post this topic  Smiley mathbehind crack ecdsa Wink

example input:
9cbdfb599ed0100
ce5efdaccf68080
1cbdfb599ed0100
397bf6b33da0200

i need output:
9cbdfb599ed010
ce5efdaccf6808
1cbdfb599ed010
397bf6b33da020
solve the math write here... :Note only last digits remove #mybadandgoodenglish
Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.

Sooner or later you're going to realize, just as I did, that there's a difference between knowing the path and walking the path
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
December 25, 2021, 12:00:09 PM
 #60


Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
TheArchaeologist  correct

python
>>> hex(int(0x9cbdfb599ed0100/10))[2:]
'fac99228fe19b0'


mausuv, What is that number?
Pages: « 1 2 [3] 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!