Bitcoin Forum
May 08, 2024, 08:38:02 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Found a nice pubkey collision  (Read 149 times)
Jason Brendon (OP)
Member
**
Offline Offline

Activity: 160
Merit: 65


View Profile
January 19, 2023, 06:57:42 AM
 #1

was it that easy? Your opinions here.

Source: https://twitter.com/PortlandHODL/status/1609113255477407748

Found a nice pubkey collision with SECP256K1

0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140

and

0x0000000000000000000000000000000000000000000000000000000000000001

Give the same pubkey of

79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
1715157482
Hero Member
*
Offline Offline

Posts: 1715157482

View Profile Personal Message (Offline)

Ignore
1715157482
Reply with quote  #2

1715157482
Report to moderator
1715157482
Hero Member
*
Offline Offline

Posts: 1715157482

View Profile Personal Message (Offline)

Ignore
1715157482
Reply with quote  #2

1715157482
Report to moderator
Once a transaction has 6 confirmations, it is extremely unlikely that an attacker without at least 50% of the network's computation power would be able to reverse it.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
crwth
Copper Member
Legendary
*
Offline Offline

Activity: 2758
Merit: 1251


Try Gunbot for a month go to -> https://gunbot.ph


View Profile WWW
January 19, 2023, 07:21:09 AM
 #2

That is only with the pubkey right? This would be fine since it's pub keys.

It's a nice find too. Is this the first time ever?

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
hatshepsut93
Legendary
*
Offline Offline

Activity: 2968
Merit: 2145



View Profile
January 19, 2023, 07:45:08 AM
 #3

was it that easy? Your opinions here.

Quote from: Rijndael@rot13maxi
Not surprising! The first key is the order of G (the generator point) minus 1. And the other one is 1. What happens when you “multiply” 1 by G? You get G. Which is your pubkey Smiley your pibkey there is the x only coordinate of the generator point of secp256k1

Sounds like the author just constructed a pair of keys that collide, rather than taking a random public key and finding a collision through some algorithm, which would have been pretty bad. Basically this is just FUD to scare noobs.

.BEST.CHANGE..███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
odolvlobo
Legendary
*
Offline Offline

Activity: 4298
Merit: 3214



View Profile
January 19, 2023, 08:28:40 AM
Merited by Welsh (6), ABCbits (5), o_e_l_e_o (4), BlackHatCoiner (4)
 #4

Found a nice pubkey collision with SECP256K1

0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140
and
0x0000000000000000000000000000000000000000000000000000000000000001

That is false.

The public key for the first is 0479BE667...16F81798B7C5258...04EF2777

The public key for the second is 0479BE667...16F81798483ADA77...FB10D4B8

The compressed public keys are also different. One is 0279BE667...16F81798 and the other is 0379BE667...16F81798

Also as noted by @Prime9973 (although he should clarify that he means the x coordinate and not the entire public key)

Any two privKey's that sum to the order 'n' of the generator point 'G' will have same pubKey (0<privKey<n).
n for SECP256K1 = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
If you know 1 privKey, you know the other.

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
franky1
Legendary
*
Offline Offline

Activity: 4214
Merit: 4475



View Profile
January 19, 2023, 08:36:23 AM
Merited by hugeblack (4), o_e_l_e_o (4), Welsh (3), NeuroticFish (2), ABCbits (2), DdmrDdmr (1)
 #5

its easy math
its like in very simplified explainer(very dumbed down)
max number -1 vs min number of +1= cancel each other out to same result

its not like the guy brute forced numbers for centuries. its just basic maths of knowing how the generator point is made
thus not a true collision

I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER.
Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
January 19, 2023, 10:15:15 AM
Last edit: January 19, 2023, 12:06:31 PM by o_e_l_e_o
Merited by hugeblack (4), BlackHatCoiner (4), Welsh (2), ABCbits (2)
 #6

This is not a collision, it is not the first time ever, nor is it in any way difficult to do. It is an inherent property of the secp256k1 curve that bitcoin uses. Taking the negation of any private key modulo n is the same as negating the resulting public key across the x axis. As such, the two private keys which OP has given, which are modular negations of each other, produce public keys with the same x coordinate but different y coordinates.

Here's another pair:
Code:
0000000000000000000000000000000000000000000000000000000000000002
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD036413F

which give the following two public keys:
04c6047f9441ed7d6d3045406e95c07cd85c778e4b8cef3ca7abac09b95c709ee51ae168fea63dc339a3c58419466ceaeef7f632653266d0e1236431a950cfe52a
04c6047f9441ed7d6d3045406e95c07cd85c778e4b8cef3ca7abac09b95c709ee5e51e970159c23cc65c3a7be6b99315110809cd9acd992f1edc9bce55af301705
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!