Bitcoin Forum
July 01, 2024, 03:14:23 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Someone know how more easy ?  (Read 129 times)
COBRAS (OP)
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
June 29, 2024, 05:43:40 PM
 #1

Good day.

Someone know how to find privkey more easy at curve with k not k = 7, but with any other k , for ex k = 1, k= 2, k =.... n ?


Thank you

[
OcTradism
Hero Member
*****
Offline Offline

Activity: 1792
Merit: 827



View Profile WWW
June 30, 2024, 02:09:08 AM
 #2

Someone know how to find privkey more easy at curve with k not k = 7, but with any other k , for ex k = 1, k= 2, k =.... n ?
Finding a private key of a given address is like finding an atom in the universe by which I mean it's impossible.

If it is possible, Bitcoin blockchain is useless and very risky to use, hence I believe nobody will have belief in Bitcoin and use it to store money.

Combinations of Bitcoin private keys is 1077 and the universe has 1080 atoms. You can not find an atom in the universe so neither find a Bitcoin private key to hijack a wallet of someone else.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
..........UNLEASH..........
THE ULTIMATE
GAMING EXPERIENCE
DUELBITS
FANTASY
SPORTS
████▄▄█████▄▄
░▄████
███████████▄
▐███
███████████████▄
███
████████████████
███
████████████████▌
███
██████████████████
████████████████▀▀▀
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
.
▬▬
VS
▬▬
████▄▄▄█████▄▄▄
░▄████████████████▄
▐██████████████████▄
████████████████████
████████████████████▌
█████████████████████
███████████████████
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
/// PLAY FOR  FREE  ///
WIN FOR REAL
..PLAY NOW..
COBRAS (OP)
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
June 30, 2024, 05:06:04 AM
 #3

Someone know how to find privkey more easy at curve with k not k = 7, but with any other k , for ex k = 1, k= 2, k =.... n ?
Finding a private key of a given address is like finding an atom in the universe by which I mean it's impossible.

If it is possible, Bitcoin blockchain is useless and very risky to use, hence I believe nobody will have belief in Bitcoin and use it to store money.

Combinations of Bitcoin private keys is 1077 and the universe has 1080 atoms. You can not find an atom in the universe so neither find a Bitcoin private key to hijack a wallet of someone else.


Idea from this code of Krashfire, but hi not on connection now...

https://github.com/KrashKrash/Twist-Attack-Sub-Group-Attack

Looks like hi find something for change points order

[
COBRAS (OP)
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
June 30, 2024, 04:35:04 PM
 #4

Someone know how to find privkey more easy at curve with k not k = 7, but with any other k , for ex k = 1, k= 2, k =.... n ?
Finding a private key of a given address is like finding an atom in the universe by which I mean it's impossible.

If it is possible, Bitcoin blockchain is useless and very risky to use, hence I believe nobody will have belief in Bitcoin and use it to store money.

Combinations of Bitcoin private keys is 1077 and the universe has 1080 atoms. You can not find an atom in the universe so neither find a Bitcoin private key to hijack a wallet of someone else.


Krashfire finds something what looks like a privatekeys in subgroups, but code need to be  midified and verified.


Output reult of his sceypt:

(privkey,order), (privkey,order)....


Partial private keys for {name}
[(0, 3), (6, 13), (1502, 3319), (8892, 22639)]
-------------------------------------------------


so for reconstruct final privkey need additional work, but, I think he is MAKE INTERESTING SCRYPT,I try to do the same with subgroups, but I take any privkeys..... Many thanks Krashfire for his scrypt


So, have someone any ideas how to modify Krashfire scrypt for take result ?

[
COBRAS (OP)
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
June 30, 2024, 04:58:59 PM
 #5

scrypt output:


Final private key found using CRT:
26824948988
xman@localhost:~$


Code:
Provided Public Key: (115780575977492633039504758427830329241728645270042306223540962614150928364886, 78735063515800386211891312544505775871260717697865196436804966483607426560663)
The provided public key is valid on the secp256k1 curve.




-------------------------------------------------
Twist Curve 1:
Order: 57896044618658097711785492504343953926299326406578432197819248705606044722122
Sub Groups: 2 * 3 * 20412485227 * 83380711482738671590122559 * 5669387787833452836421905244327672652059
Small subgroups: [2, 3, 20412485227]
-------------------------------------------------

Using point Q = (115780575977492633039504758427830329241728645270042306223540962614150928364886, 82819662124937935997075446159954026797130066030109643165115590880297915075689) on Twist Curve 1
Subgroup order: 2, h: 57896044618658097711785492504343953926299326406578432197819248705606044722122
hQ: (0 : 1 : 0), hg: (0 : 1 : 0)
Partial private key 0 for subgroup order 2 verified.
Subgroup order: 3, h: 38597363079105398474523661669562635950866217604385621465212832470404029814748
hQ: (0 : 1 : 1), hg: (0 : 115792089237316195423570985008687907853269984665640564039457584007908834671662 : 1)
Partial private key 2 for subgroup order 3 verified.
Subgroup order: 20412485227, h: 5672611049053238118165717313941446991284509739582081922436484387772
hQ: (102218623567426629329170973803598621676466125927972955899785028094234925400756 : 10275639806470513332621139348343609399199069146984122993948453123597067431471 : 1), hg: (57403726249745638709437015689634972945292420467185304877641206038021905035097 : 51356004507451930866420493249993099104434141640844744013335860694616740266963 : 1)
Partial private key 6412463761 for subgroup order 20412485227 verified.
Partial private keys for Twist Curve 1
[(0, 2), (2, 3), (6412463761, 20412485227)]
-------------------------------------------------

-------------------------------------------------
Twist Curve -7:
Order: 38597363079105398474523661669562635951234135017402074565436668291433169282997
Sub Groups: 3 * 13^2 * 3319 * 22639 * 1013176677300131846900870239606035638738100997248092069256697437031
Small subgroups: [3, 13, 3319, 22639]
-------------------------------------------------

Could not find a valid y-coordinate on Twist Curve -7
-------------------------------------------------
Twist Curve 2:
Order: 38597363079105398474523661669562635951234135017402074565436668291433169282997
Sub Groups: 3 * 13^2 * 3319 * 22639 * 1013176677300131846900870239606035638738100997248092069256697437031
Small subgroups: [3, 13, 3319, 22639]
-------------------------------------------------

Could not find a valid y-coordinate on Twist Curve 2
All orders are pairwise coprime.

Final private key found using CRT:
26824948988
xman@localhost:~$



[
Kamoheapohea
Jr. Member
*
Offline Offline

Activity: 35
Merit: 11


View Profile
Today at 02:14:54 AM
Last edit: Today at 02:30:47 AM by Kamoheapohea
 #6

scrypt output:


Final private key found using CRT:
26824948988
xman@localhost:~$



We know you and Krashfire want to steal some good money but this won't help you.
Why? Because you take X of a valid point on secp256k1 and use it to get Y on a different curve (twisted or not).
This new point represents a totally different privatekey on this new curve.
Whatever those fancy algorithms, that you and me don't understand, spit out, won't give you and Krashfire anything to steal bitcoins.

Krashfire uses this method to create some mysterious uncertainty for some reason (likely malicious).
COBRAS (OP)
Member
**
Offline Offline

Activity: 895
Merit: 22


View Profile
Today at 04:14:54 AM
 #7

scrypt output:


Final private key found using CRT:
26824948988
xman@localhost:~$



We know you and Krashfire want to steal some good money but this won't help you.
Why? Because you take X of a valid point on secp256k1 and use it to get Y on a different curve (twisted or not).
This new point represents a totally different privatekey on this new curve.
Whatever those fancy algorithms, that you and me don't understand, spit out, won't give you and Krashfire anything to steal bitcoins.

Krashfire uses this method to create some mysterious uncertainty for some reason (likely malicious).



eustion for Krash points is:


Уpaвнeниe эллиптичecкoй кpивoй, пpoxoдящeй чepeз тoчки P и Q: Elliptic Curve defined by y^2 = x^3 + 5*x - 496083217762525229200448345979197619411513160320101887952589222190456726748741 over Rational Field
H


you can try fund eqation of curve yoursek :

replace Q P coirdinates,tgey mast was from one curve


Code:
from sage.rings.integer_ring import ZZ
from sage.schemes.elliptic_curves.constructor import EllipticCurve

# Зaдaнныe кoopдинaты двyx тoчeк
P = (115780575977492633039504758427830329241728645270042306223540962614150928364886, 82819662124937935997075446159954026797130066030109643165115590880297915075689)
Q = (102218623567426629329170973803598621676466125927972955899785028094234925400756, 10275639806470513332621139348343609399199069146984122993948453123597067431471)

# Bычиcлeниe кoэффициeнтoв для ypaвнeния кpивoй
x1, y1 = P
x2, y2 = Q

# Кoэффициeнты для ypaвнeния кpивoй y^2 = x^3 + ax + b
a = ZZ(round((y2 - y1) / (x2 - x1)))
b = ZZ(round(y1 - a * x1))

# Coздaниe кpивoй
curve = EllipticCurve([a, b])

# Bывoд ypaвнeния кpивoй
print(f"Уpaвнeниe эллиптичecкoй кpивoй, пpoxoдящeй чepeз тoчки P и Q: {curve}")



[
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!