Bitcoin Forum
May 22, 2024, 06:29:23 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Lattice attack example with nonce finder.  (Read 305 times)
COBRAS (OP)
Member
**
Offline Offline

Activity: 861
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
December 24, 2021, 06:52:03 AM
 #1

https://blog.cryptohack.org/ecdsa-side-channel-attack-projective-signatures-donjon-ctf-writeup

P.s.Codes  need a 1 file for run, but file unavailable .

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
ymgve2
Full Member
***
Offline Offline

Activity: 161
Merit: 230


View Profile
December 27, 2021, 10:49:27 PM
Last edit: December 27, 2021, 11:01:33 PM by ymgve2
 #2

I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.
COBRAS (OP)
Member
**
Offline Offline

Activity: 861
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
December 28, 2021, 04:21:45 AM
 #3

I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
December 31, 2021, 03:12:34 AM
Last edit: December 31, 2021, 04:37:34 PM by achow101
 #4


you need to try create file h5py by using that algorithm new one again using python generate that serial binary file



I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

that method is may be on theory only because that script it generate itself both private key and public key it is complete run on script
it not work in real
for improve or testing you need to try spilt generate part and LLL method part and test it

function ecdsa.ecdsa.Public_key can not easy to put manual public key proint for test it need to modify to can use easy

sorry I am not coder pro, I just try testing it but can not apply to advance
how every I think method we found on internet it never work with high bit puzzle may be need some complex method
COBRAS (OP)
Member
**
Offline Offline

Activity: 861
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
December 31, 2021, 06:17:41 AM
 #5

I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

that method is may be on theory only because that script it generate itself both private key and public key it is complete run on script
it not work in real
for improve or testing you need to try spilt generate part and LLL method part and test it

function ecdsa.ecdsa.Public_key can not easy to put manual public key proint for test it need to modify to can use easy

sorry I am not coder pro, I just try testing it but can not apply to advance
how every I think method we found on internet it never work with high bit puzzle may be need some complex method

Another method what work on real eth daa. Research some pdf's eth nonce id static and = p/2etc...


https://medium.com/@pierreia/quick-tour-on-ethereum-private-keys-attacks-3082846b7632

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
COBRAS (OP)
Member
**
Offline Offline

Activity: 861
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
December 31, 2021, 06:18:26 AM
 #6

I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

that method is may be on theory only because that script it generate itself both private key and public key it is complete run on script
it not work in real
for improve or testing you need to try spilt generate part and LLL method part and test it

function ecdsa.ecdsa.Public_key can not easy to put manual public key proint for test it need to modify to can use easy

sorry I am not coder pro, I just try testing it but can not apply to advance
how every I think method we found on internet it never work with high bit puzzle may be need some complex method

Another method what work on real eth daa. Research some pdf's eth nonce id static and = p/2etc...


https://medium.com/@pierreia/quick-tour-on-ethereum-private-keys-attacks-3082846b7632



Soft for attack awaliable on github.

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
December 31, 2021, 02:45:33 PM
 #7


I am not sure I am right or not just guess
about nonce on signature I think should check at
https://asecuritysite.com/signatures/ecd5

and use with sample at
https://hackernoon.com/hacking-a-bitcoin-wallet-642u36sa
https://allprivatekeys.com/random-vulnerability

r  = 0xd47ce4c025c35ec440bc81d99834a624875161a26bf56ef7fdc0f5d52f843ad1
s1 = 0x44e1ff2dfd8102cf7a47c21d5c9fd5701610d04953c6836596b4fe9dd2f53e3e
s2 = 0x9a5f1c75e461d7ceb1cf3cab9013eb2dc85b6d0da8c3c6e27e3a5a5b3faa5bab
z1 = 0xc0e2d0a89a348de88fda08211c70d1d7e52ccef2eb9459911bf977d587784c6e
z2 = 0x17b0f41c8c337ac1e18c98759e83a8cccbc368dd9d89e5f03cb633c265fd0ddc

will get result  k(nonce) = 55228977394393414412853003502097247104908965897402951232160234933662925082798
I not sure I calculate wrong or not I don't know  some  good code on python for check it

I think all signature nonce is 256 bit not 128 bit   (it not same bitcoin block is a 32-bit (4-byte) _
so it not easy to crack it for high 256 bit nonce

mynonce
Full Member
***
Offline Offline

Activity: 233
Merit: 253


View Profile
December 31, 2021, 07:29:53 PM
Merited by ABCbits (2)
 #8

r  = 0xd47ce4c025c35ec440bc81d99834a624875161a26bf56ef7fdc0f5d52f843ad1
s1 = 0x44e1ff2dfd8102cf7a47c21d5c9fd5701610d04953c6836596b4fe9dd2f53e3e
s2 = 0x9a5f1c75e461d7ceb1cf3cab9013eb2dc85b6d0da8c3c6e27e3a5a5b3faa5bab
z1 = 0xc0e2d0a89a348de88fda08211c70d1d7e52ccef2eb9459911bf977d587784c6e
z2 = 0x17b0f41c8c337ac1e18c98759e83a8cccbc368dd9d89e5f03cb633c265fd0ddc

No wallet uses the same r value for transactions / signatures. So our transactions / signatures are safe.

If you can solve it for 2 different r (r1 and r2), then you can post it here and will get thousands of merits  Smiley  Happy new year!
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 45


View Profile
January 01, 2022, 12:40:56 AM
 #9


No wallet uses the same r value for transactions / signatures. So our transactions / signatures are safe.

If you can solve it for 2 different r (r1 and r2), then you can post it here and will get thousands of merits  Smiley  Happy new year!

I don't know inside  deep Signature algorithm calculate how to generate R but if nonce use create is 256 bit, that mean you need to find private key 256 bit number for can find out


 Happy new year!
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!