Bitcoin Forum
March 16, 2026, 07:07:59 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22]  All
  Print  
Author Topic: Solving ECDLP with Kangaroos: Part 1 + 2 + RCKangaroo  (Read 16496 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (11 posts by 1+ user deleted.)
Ykra
Newbie
*
Offline Offline

Activity: 14
Merit: 2


View Profile
March 15, 2026, 09:27:51 PM
Last edit: March 15, 2026, 11:46:49 PM by Ykra
 #421

Thank you for the suggestion, but I described my own approach to solving it. I know it will probably take longer.

If I’m not mistaken, in your example you solved a private key with missing characters in raw HEX format, while mine is in WIF format, and the process is a bit different there. I’m also not sure that the same method can be applied in my case.

That small puzzle was actually very useful for me because it showed that this particular method probably won’t work for my situation.

So I will continue with my slower and more methodical approach: I will substitute the first 3 unknown characters one by one, and for the remaining unknown section I will simply define a range and check it.


I adjusted my solver to work with broken WIF's - different to the method used for Puzzle6. Puzzle6 made me realise it's possible to solve (with some complexity shift) on WIFs with gaps.

That is why I suggested you create a new WIF key on https://iancoleman.io/bip39/ or wherever, post the WIF with the broken parts only (same structure as yours: [26 known characters] + [3 unknown characters] + [5 known characters] + [10 unknown characters] + [8 known characters]) and the pubkey and I'll return you the full WIF.

If you are not interested, no worries and good luck!
farou9
Newbie
*
Offline Offline

Activity: 88
Merit: 0


View Profile
Today at 04:22:33 AM
 #422

the speds varies depending on the language and the libraries , on python using ecdsa its very slow i think 80k/s but if we used coincurve it goes up (114,956 EC additions/sec) , but on c++ the speed is better never tested it but i can predict it coincurve uses libsecp so if we used the 4threads we can achive 500-700k/s , just tested it it can reach Speed: 548779 EC additions/sec using 4 threads in  c++

BTW, you talk about knowledge and intelligence, but use slow python and its libs instead of writing own optimized lib in c. So optimizing is not a part of intelligence in you opinion?
Performance always matters here, if I had only CPU I would create heavy-optimized lib for it to be able to perform more tests and researches.

i only use python because it is eay and fast to write and easy-fast to fix if an error shows up. also i only use it to test my ideas.
for real tests i use c of course (i cant say i do build optemized libs too lazy for that) but i use every available optimization in math i can think of.
"Performance always matters here" that is if you know you have a chance "and damn good one too"
Bram24732
Member
**
Offline Offline

Activity: 308
Merit: 28


View Profile
Today at 05:18:52 AM
 #423

Thank you for the suggestion, but I described my own approach to solving it. I know it will probably take longer.

If I’m not mistaken, in your example you solved a private key with missing characters in raw HEX format, while mine is in WIF format, and the process is a bit different there. I’m also not sure that the same method can be applied in my case.

That small puzzle was actually very useful for me because it showed that this particular method probably won’t work for my situation.

So I will continue with my slower and more methodical approach: I will substitute the first 3 unknown characters one by one, and for the remaining unknown section I will simply define a range and check it.


I adjusted my solver to work with broken WIF's - different to the method used for Puzzle6. Puzzle6 made me realise it's possible to solve (with some complexity shift) on WIFs with gaps.

That is why I suggested you create a new WIF key on https://iancoleman.io/bip39/ or wherever, post the WIF with the broken parts only (same structure as yours: [26 known characters] + [3 unknown characters] + [5 known characters] + [10 unknown characters] + [8 known characters]) and the pubkey and I'll return you the full WIF.

If you are not interested, no worries and good luck!

I think the guy’s method will work even if slower.
A slow method and not sharing keys is always better than a faster one requiring to send your keys to a stranger.
Congrats on the mini puzzle win ! I was sleeping when it was posted so couldn’t compete sadly !

I solved 67 and 68 using custom software distributing the load across ~25k GPUs. 4090 stocks speeds : ~8.1Bkeys/sec. Don’t challenge me technically if you know shit about fuck, I’ll ignore you. Same goes if all you can do is LLM reply.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!