Bitcoin Forum
May 06, 2024, 02:14:14 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: relationship between two nonces  (Read 239 times)
Bglhn (OP)
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
March 29, 2024, 12:04:44 PM
 #1

Hello friends.
How can we solve the relationship between the two nonces used in the bitcoin transfer signature? Does anyone have information about this? Or what formulas do you use to find the K value?
1714961654
Hero Member
*
Offline Offline

Posts: 1714961654

View Profile Personal Message (Offline)

Ignore
1714961654
Reply with quote  #2

1714961654
Report to moderator
Even if you use Bitcoin through Tor, the way transactions are handled by the network makes anonymity difficult to achieve. Do not expect your transactions to be anonymous unless you really know what you're doing.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
iceland2k14
Jr. Member
*
Offline Offline

Activity: 31
Merit: 52


View Profile
March 30, 2024, 05:37:41 AM
Merited by ABCbits (2)
 #2

K values used in Signature are kept secret as privatkeys. To find the relationship between 2 nonces the only possibility is to try bruteforce.
I had a sript in my rsz repo which extracts all Tx for an address and tries to solve for K and PrivatKeys if the distance between any 2 K values are small (ex. less than 2 billion).
pooya87
Legendary
*
Offline Offline

Activity: 3444
Merit: 10549



View Profile
March 30, 2024, 06:17:36 AM
 #3

Nonce or k is an ephemeral private key in signing that should be created randomly which means there shouldn't be any kind of relationships between any two k values that were created correctly.

The only way you would ever find any relationship is if you already know nonce values (you created them yourself) or the implementation used to create them is broken which is a very rare case.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Bglhn (OP)
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
March 30, 2024, 07:42:48 AM
 #4

iceland2k14 I can't believe you're here. Very pleased to meet you.
You said in one of your articles, "There are several ways to find a nonce." Is there anything else you can suggest?
iceland2k14
Jr. Member
*
Offline Offline

Activity: 31
Merit: 52


View Profile
March 31, 2024, 05:04:00 AM
Merited by ABCbits (3), vapourminer (2)
 #5

Yes there are several ways.
1. When same K is used 2 times either in same or different Transaction, its trivial to calculate PVK. Its already extensively exploited.
2. When K values are closeby so that difference can be bruteforced quickly, then also PVK can be calculated.
3. When you somehow know the mathematical relationship between 2 K, like K2 =K1/2 or K2 = K1 + 1637737337373738373729826362936, whatever, then also PVK can be calculated.
4. When you have several Tx and there may be few bits common, either LSB or MSB, then also it's possible to calculate PVK through Lattice reduction. (Check minimum required Tx for Bit Leakage).
5. If the number of Tx is not sufficient for Lattice reduction but there is info about sufficient bit leakage, we could use the same Kangaroo solver approach on the Rvalue of Tx to get K.
6. We could mathematically generate Tx for known Leakage in Privatkeys and then try to bruteforce. For example Puzzle 130 is know to have a 126 bits Leakage in PVK. So several derived Tx from it can be considered for bruteforce.
7. There could be more which I am not aware of yet.

The main point is, there is no 100% sureshot method which will work on generic Tx. All different approaches either need some vulnerability or prior info or some bruteforce.
bvazx
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
March 31, 2024, 09:31:36 PM
 #6

3. When you somehow know the mathematical relationship between 2 K, like K2 =K1/2 or K2 = K1 + 1637737337373738373729826362936, whatever, then also PVK can be calculated.
There are cases when the differences between public keys and (or) nonce are known, but it is impossible to calculate k due to a phenomenon known as “perfect linear dependence”.
Bglhn (OP)
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
April 01, 2024, 07:54:31 PM
 #7

So how to find nonce leak?
iceland2k14
Jr. Member
*
Offline Offline

Activity: 31
Merit: 52


View Profile
April 02, 2024, 03:57:27 AM
 #8

There are cases when the differences between public keys and (or) nonce are known, but it is impossible to calculate k due to a phenomenon known as “perfect linear dependence”.
Are these cases from an existing Tx on blockchain or it's from mathematical Tx ?
bvazx
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
April 10, 2024, 08:37:28 PM
 #9

Are these cases from an existing Tx on blockchain or it's from mathematical Tx ?
So far, such a thing has not come across in the transaction, as the field is huge and the probability of getting this result is very small. But, with the correct creation of signatures, this can be easily obtained. And it's even easier to get it by artificially creating signatures, using the formula R = ur * Q + uz * G. For example, for calculation from two public keys and two nonce private keys. The calculation will go to 0. But, as soon as you introduce a little chaos into the ideal, everything will be calculated immediately.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!