Bitcoin Forum
April 28, 2024, 08:44:09 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Did you already break the Elliptic Curve, Satoshi, you there?  (Read 260 times)
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 18, 2024, 12:37:10 AM
Last edit: January 18, 2024, 12:47:14 AM by omnicreor
 #1

I have been exploring the intricacies of Elliptic Curve Cryptography (ECC) for several years. My interest stems from a skepticism about the ubiquitous use of ECC, which, while currently deemed secure, is susceptible to the relentless advancement of time and technology that historically challenges cryptographic methods.

During my research, I analyzed a collection of public keys attributed to Satoshi Nakamoto. Upon plotting these keys on an elliptic curve, I observed a curious pattern, as shown here: https://ibb.co/zrsDy6c

What struck me as extraordinary was the apparent orderly generation of these public keys. They seem to follow a sequential arrangement along the X-axis, with corresponding values on the Y-axis that collectively form a discernible shape on the curve. This discovery is baffling, as generating public keys in such a precise and ordered manner on an elliptic curve is, to my knowledge, an incredibly challenging, if not impossible feat. I have thoroughly investigated this phenomenon but have yet to find an explanation.

This pattern has led me to ponder several possibilities:
- Could it be possible that Satoshi had found a way to 'break' the elliptic curve as early as 2009?
- Is there a chance that these public keys represent a puzzle, intentionally designed by Satoshi, awaiting a solution?

As of today, these public keys are associated with an estimated value of $72 billion, adding another layer of intrigue to this cryptographic enigma.
1714293849
Hero Member
*
Offline Offline

Posts: 1714293849

View Profile Personal Message (Offline)

Ignore
1714293849
Reply with quote  #2

1714293849
Report to moderator
1714293849
Hero Member
*
Offline Offline

Posts: 1714293849

View Profile Personal Message (Offline)

Ignore
1714293849
Reply with quote  #2

1714293849
Report to moderator
1714293849
Hero Member
*
Offline Offline

Posts: 1714293849

View Profile Personal Message (Offline)

Ignore
1714293849
Reply with quote  #2

1714293849
Report to moderator
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714293849
Hero Member
*
Offline Offline

Posts: 1714293849

View Profile Personal Message (Offline)

Ignore
1714293849
Reply with quote  #2

1714293849
Report to moderator
TamariskDigitalAssetRecov
Newbie
*
Offline Offline

Activity: 6
Merit: 2


View Profile
January 18, 2024, 01:27:53 AM
 #2

Do you have the data behind this plot available? Are the clusters by date? If so, do you know what are the date ranges for each cluster and are the clusters plotted in a sequential order?
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 18, 2024, 11:59:32 AM
 #3

I've attached the data related to our discussion here: https://file.io/yG3ub34oQqTB.

Regarding the elliptic curve model, it's interesting to note its similarity to models used in the telecom industry, particularly in the context of public key distribution on elliptic curves. This approach focuses on extracting relevant data by targeting the center of each cluster.

This method's resemblance to techniques used in companies like Ericsson leads me to wonder if Satoshi might have a background in the telecom sector. 😊
NotATether
Legendary
*
Offline Offline

Activity: 1582
Merit: 6696


bitcoincleanup.com / bitmixlist.org


View Profile WWW
January 18, 2024, 12:08:06 PM
 #4

I don't think it's part of any larger "puzzle" but that he's just damn good at math. Wink

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
moonie
Jr. Member
*
Offline Offline

Activity: 30
Merit: 11


View Profile WWW
January 18, 2024, 12:11:50 PM
 #5

The distribution of public keys on an elliptic curve might naturally exhibit certain patterns or clusters. This is not indicative of any weakness or manipulation but rather a consequence of how these keys are mathematically generated and distributed across the curve. The specific characteristics of the elliptic curve used in ECC (e.g., curve parameters) might influence the distribution of public keys in a certain manner. This influence might manifest as an observable pattern when a large set of keys is plotted graphically.

In any large set of data, especially cryptographic data, there can be statistical anomalies that appear significant but are actually coincidental.
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 18, 2024, 01:16:57 PM
Last edit: February 05, 2024, 11:16:28 AM by omnicreor
 #6

...
snuffman8
Jr. Member
*
Offline Offline

Activity: 37
Merit: 1


View Profile
January 18, 2024, 03:47:00 PM
 #7

Whoa, this is some next-level crypto detective work! Plotting Satoshi's public keys on an elliptic curve and spotting that sequential pattern is mind-blowing. The puzzle aspect has me hooked – could it be Satoshi's way of leaving a trail for future cryptographers? $72 billion worth of intrigue right there. Any fellow crypto sleuths here with thoughts on cracking this enigma?
jpbh81
Newbie
*
Offline Offline

Activity: 28
Merit: 5


View Profile
January 18, 2024, 06:35:20 PM
 #8

Jack the Ripper in person.

i hope you solve it.
citb0in
Hero Member
*****
Offline Offline

Activity: 658
Merit: 656


Bitcoin g33k


View Profile
January 18, 2024, 09:21:01 PM
 #9

...
Let me give you an example, just try it on normal calculator, subtract 1 from the following and then
...

Digaran, stop creating mass fake accounts and spreading around. You're even using your signature ~dig OMG
This is really getting ridiculous.


In a bid to keep my research and efforts transparent and accessible, I have decided to share the GitHub repository containing my work on elliptic curve cryptography (ECC). Here's the link to the repository:
https://github.com/ecc-r/ECC-Vulnerability-Research

your python program yields following error:
Quote
line 122, in is_point_odd
    point_exponent = point_exponent(point, scalar)
                     ^^^^^^^^^^^^^^
UnboundLocalError: cannot access local variable 'point_exponent' where it is not associated with a value

The name of the function is used as a variable in the function itself, which leads to an UnboundLocalError. To fix that bug, here's a patch...

Create a new file bugfix.patch inside your local git folder with following content:
Code:
diff --git a/ecc_analysis.py b/ecc_analysis.py
index d216974..7307f5a 100644
--- a/ecc_analysis.py
+++ b/ecc_analysis.py
@@ -119,7 +119,7 @@ def is_point_odd(point):
 
     scalar = CURVE_MAX - 2
 
-    point_exponent = point_exponent(point, scalar)
+    result = point_exponent(point, scalar)
     modulo_2_result = point_multiplication(point, point_exponent)
 
     if modulo_2_result == get_first_point():

and then apply the patch
Code:
git apply bugfix.patch

or just merge in your branch, I created a pull-request in your git repo, feel free to check and update. I have included the patch in the forked repository here.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 18, 2024, 09:56:13 PM
Last edit: February 05, 2024, 11:17:02 AM by omnicreor
 #10

...
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 18, 2024, 11:09:53 PM
Last edit: February 05, 2024, 11:17:09 AM by omnicreor
 #11

...
jpbh81
Newbie
*
Offline Offline

Activity: 28
Merit: 5


View Profile
January 18, 2024, 11:15:52 PM
 #12

Thank you for your insights and the shared script. Firstly, the assertion that "we can not multiply a point by another point" in ECC is contextually accurate in the realm of today's cryptographic applications. However, we must remember that the field of mathematics and cryptography is in a constant state of evolution. What we "currently can not do" is precisely what paves the way for future breakthroughs. My work is dedicated to investigating these unexplored potentials.

By sharing my research on GitHub, I aim to open the doors to collaborative innovation, inviting others to join in pushing the boundaries of ECC. This is not just about challenging the status quo but about expanding our collective understanding and capabilities in cryptography.

Let’s continue to advance the field, keeping in mind that today's theoretical explorations could be the foundation of tomorrow's cryptographic realities.

Props, dont listen to  the Karens theres quite of them over here!!

The ecc its so intresting and mind-blowing at te same time
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 19, 2024, 02:30:50 PM
Last edit: February 05, 2024, 11:16:52 AM by omnicreor
 #13

...
vjudeu
Hero Member
*****
Offline Offline

Activity: 664
Merit: 1527



View Profile
January 19, 2024, 02:50:17 PM
 #14

Quote
My main problem is not "It can't be done", I clearly see it can be done, I just could not realized it yet..
What about this topic? https://bitcointalk.org/index.php?topic=5460766.0

I think this proof is sufficient to say, that it cannot be done, if you use only one public key as your argument. You actually need two public keys: the one you want to reveal the private key for, and the generator. Then, the distance between them is unique. But if you work on your public key alone, without thinking about the generator, then you won't get the proper answer, which was well explained by Garlo Nicon in the topic above.

And I think if you want to break any keys, then you should start with lower numbers, before trying secp256k1 directly. Just to confirm, that your method is "mathematically correct".

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
mamuu
Member
**
Offline Offline

Activity: 71
Merit: 19


View Profile
January 27, 2024, 10:07:45 PM
 #15

- Is there a chance that these public keys represent a puzzle, intentionally designed by Satoshi, awaiting a solution?

Hello

Can a public key be generated without knowing the private key? yes

https://doc.sagemath.org/html/en/reference/arithmetic_curves/sage/schemes/elliptic_curves/ell_generic.html#

Can the coordinate of a desired number in the curve be generated pubkey at the same time? yes.

After creating the curve, it is possible to create it with the "lift_x" function.
If the source you mentioned has private keys
and if the diagram you show is produced, we can talk about a security vulnerability.
However, it is possible to calculate the points that will form this diagram without private keys.

Thank you.

1DWA3Sa8i6eHVWV4AG4UP2SBhYB2XrfiHW
omnicreor (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
January 28, 2024, 11:30:23 AM
Last edit: February 05, 2024, 11:16:43 AM by omnicreor
 #16

...
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!