Bitcoin Forum
September 17, 2025, 04:13:26 AM *
News: Latest Bitcoin Core release: 29.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4] 5 »  All
  Print  
Author Topic: I found a method to reverse public keys to private keys  (Read 2178 times)
De_to4ka
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
February 11, 2025, 11:21:36 PM
 #61

There have already been examples, what other proof do you need?

Reviewing their code, just to clarify, the trick seems to be that the signed message includes the nonce concatenated as part of the string. Somehow, the OP extracts the nonce from here, which allows them to derive the private key. In short, their code generates vulnerable signatures. The nonce should never be included in the message of a signature because it is a catastrophic vulnerability.

Code:
    def generate_signatures(self, priv, num_signatures=10):
        sigs = []
        for _ in range(num_signatures):
            nonce = random.randrange(1, 2**BIT_RANGE)
            note = str(os.urandom(25)) + str(nonce)
            msg = bytes(note, 'utf-8')
            private_key, public_key = self.make_keypair(priv)
            r, s, z = self.sign_message(priv, msg, nonce)
            sigs.append((z, r, s))
        return sigs
Yes, Hello I have already seen similar codes, where when generating fake signatures, a nonce is also generated. By the way, Bitcoined has shown several times that its code outputs the correct value of the private key, I have seen it myself.

nonce too smal:

nonce = random.randrange(1, 2**BIT_RANGE)
Hi Cobras, have you talked to him, maybe you learned something interesting about this code? His code is interesting, he needs a maximum of 10 signatures and it doesn't matter if they are fake or from the blockchain and the whole work takes about 10 minutes and I think so and he doesn't need CPU, GPU, it's just some kind of happiness
COBRAS
Member
**
Offline Offline

Activity: 1131
Merit: 25


View Profile
February 12, 2025, 12:00:52 AM
Last edit: February 12, 2025, 12:42:32 AM by COBRAS
 #62

There have already been examples, what other proof do you need?

Reviewing their code, just to clarify, the trick seems to be that the signed message includes the nonce concatenated as part of the string. Somehow, the OP extracts the nonce from here, which allows them to derive the private key. In short, their code generates vulnerable signatures. The nonce should never be included in the message of a signature because it is a catastrophic vulnerability.

Code:
    def generate_signatures(self, priv, num_signatures=10):
        sigs = []
        for _ in range(num_signatures):
            nonce = random.randrange(1, 2**BIT_RANGE)
            note = str(os.urandom(25)) + str(nonce)
            msg = bytes(note, 'utf-8')
            private_key, public_key = self.make_keypair(priv)
            r, s, z = self.sign_message(priv, msg, nonce)
            sigs.append((z, r, s))
        return sigs
Yes, Hello I have already seen similar codes, where when generating fake signatures, a nonce is also generated. By the way, Bitcoined has shown several times that its code outputs the correct value of the private key, I have seen it myself.

nonce too smal:

nonce = random.randrange(1, 2**BIT_RANGE)
Hi Cobras, have you talked to him, maybe you learned something interesting about this code? His code is interesting, he needs a maximum of 10 signatures and it doesn't matter if they are fake or from the blockchain and the whole work takes about 10 minutes and I think so and he doesn't need CPU, GPU, it's just some kind of happiness


he tell this in groop chat in tg:

Code:
Ok fine

we want to solve

d = (s*r)-z * k mod p.

i only know s, r, z and p

Can you rearange that so that we need to solve for z?

z = (s * r - d) / k mod p

Ok


nothing more


Quote
Renloi:
[['0x51d65b53e0c05560ec8d8a8a26a15a5967aa642af0f5dc7ddd89d4478bc3e971', '0xaf4de1b694cd4622ffe8d8cdf5329a31c7f818c9320af86163abe8ac1600b3a8', '0xaf4de1b694cd4622ffe8d8cdf5329a31c7f818c9320af86163abe8ac1600b3a8']]

signature for puzzle 135
z, r, s is the order

S:
So u solved puzzle 135  yes ?


he start generate "valid" or real valud "sighnatures without peivkey. Maybe sach sigh work for transfer btc without orivkey

maybe someone can briadcast this rsz to blockchain and try transfer 135  bit puzzle?

[
mcdouglasx
Sr. Member
****
Offline Offline

Activity: 756
Merit: 408



View Profile WWW
February 12, 2025, 01:04:04 AM
 #63

There have already been examples, what other proof do you need?

Reviewing their code, just to clarify, the trick seems to be that the signed message includes the nonce concatenated as part of the string. Somehow, the OP extracts the nonce from here, which allows them to derive the private key. In short, their code generates vulnerable signatures. The nonce should never be included in the message of a signature because it is a catastrophic vulnerability.

Code:
    def generate_signatures(self, priv, num_signatures=10):
        sigs = []
        for _ in range(num_signatures):
            nonce = random.randrange(1, 2**BIT_RANGE)
            note = str(os.urandom(25)) + str(nonce)
            msg = bytes(note, 'utf-8')
            private_key, public_key = self.make_keypair(priv)
            r, s, z = self.sign_message(priv, msg, nonce)
            sigs.append((z, r, s))
        return sigs

Nice observation,
You are correct,
But my trick works with also 256 bit random nonce if we have enough signatures

There is no such trick, if I create a script in a vulnerable way I can obviously take advantage of it for my own case and context, but it is useless for bitcoin. Consequently, if you need these conditions to be met for your method to work, then no, you are not violating bitcoin, you are just checking the vulnerabilities of your own implementation of custom signatures where the nonce is concatenated to the message and uses Mersenne Twister which is well known to be cryptographically unsafe due to its ability to be predicted.

A real test would be to work on signatures created using processes that comply with security standards. To start with, you can limit the nonce to 200 bits, but only that, without any other strange modifications.

▄▄█████████████████▄▄
▄█████████████████████▄
███▀▀█████▀▀░░▀▀███████

██▄░░▀▀░░▄▄██▄░░█████
█████░░░████████░░█████
████▌░▄░░█████▀░░██████
███▌░▐█▌░░▀▀▀▀░░▄██████
███░░▌██░░▄░░▄█████████
███▌░▀▄▀░░█▄░░█████████
████▄░░░▄███▄░░▀▀█▀▀███
██████████████▄▄░░░▄███
▀█████████████████████▀
▀▀█████████████████▀▀
Rainbet.com
CRYPTO CASINO & SPORTSBOOK
|
█▄█▄█▄███████▄█▄█▄█
███████████████████
███████████████████
███████████████████
█████▀█▀▀▄▄▄▀██████
█████▀▄▀████░██████
█████░██░█▀▄███████
████▄▀▀▄▄▀███████
█████████▄▀▄███
█████████████████
███████████████████
██████████████████
███████████████████
 
 $20,000 
WEEKLY RAFFLE
|



█████████
█████████ ██
▄▄█░▄░▄█▄░▄░█▄▄
▀██░▐█████▌░██▀
▄█▄░▀▀▀▀▀░▄█▄
▀▀▀█▄▄░▄▄█▀▀▀
▀█▀░▀█▀
10K
WEEKLY
RACE
100K
MONTHLY
RACE
|

██









█████
███████
███████
█▄
██████
████▄▄
█████████████▄
███████████████▄
░▄████████████████▄
▄██████████████████▄
███████████████▀████
██████████▀██████████
██████████████████
░█████████████████▀
░░▀███████████████▀
████▀▀███
███████▀▀
████████████████████   ██
 
[..►PLAY..]
 
████████   ██████████████
bitcoinend (OP)
Newbie
*
Offline Offline

Activity: 26
Merit: 0


View Profile
February 12, 2025, 09:30:49 AM
 #64

There have already been examples, what other proof do you need?

Reviewing their code, just to clarify, the trick seems to be that the signed message includes the nonce concatenated as part of the string. Somehow, the OP extracts the nonce from here, which allows them to derive the private key. In short, their code generates vulnerable signatures. The nonce should never be included in the message of a signature because it is a catastrophic vulnerability.

Code:
    def generate_signatures(self, priv, num_signatures=10):
        sigs = []
        for _ in range(num_signatures):
            nonce = random.randrange(1, 2**BIT_RANGE)
            note = str(os.urandom(25)) + str(nonce)
            msg = bytes(note, 'utf-8')
            private_key, public_key = self.make_keypair(priv)
            r, s, z = self.sign_message(priv, msg, nonce)
            sigs.append((z, r, s))
        return sigs

Nice observation,
You are correct,
But my trick works with also 256 bit random nonce if we have enough signatures

There is no such trick, if I create a script in a vulnerable way I can obviously take advantage of it for my own case and context, but it is useless for bitcoin. Consequently, if you need these conditions to be met for your method to work, then no, you are not violating bitcoin, you are just checking the vulnerabilities of your own implementation of custom signatures where the nonce is concatenated to the message and uses Mersenne Twister which is well known to be cryptographically unsafe due to its ability to be predicted.

A real test would be to work on signatures created using processes that comply with security standards. To start with, you can limit the nonce to 200 bits, but only that, without any other strange modifications.


Ok sure, use your own script and send me the signatures.
cyncra
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
February 12, 2025, 12:31:02 PM
 #65

Is this nonsensical charade still ongoing?
COBRAS
Member
**
Offline Offline

Activity: 1131
Merit: 25


View Profile
February 12, 2025, 12:55:40 PM
 #66

200 bit with 200 bit nonce is a not real rsz ! No secp256k1 sighnatures with this parameters

I have lattice scrypt what can crack 250 bit priv/nonce with 70 sighnatures, but he is nothing too

[
iceland2k14
Member
**
Offline Offline

Activity: 70
Merit: 86


View Profile
February 12, 2025, 01:13:14 PM
Merited by ABCbits (1), mcdouglasx (1)
 #67

How is it different than Lattice Reduction method. Where for 200 bit Nonce we can solve using 7 or 8 Signatures.

Code:
Leakage: 5 bit.    Sigs Needed:71
Leakage:10 bit.    Sigs Needed:36
Leakage:15 bit.    Sigs Needed:24
Leakage:20 bit.    Sigs Needed:18
Leakage:25 bit.    Sigs Needed:15
Leakage:30 bit.    Sigs Needed:12
Leakage:56 bit.    Sigs Needed:7
bitcoinend (OP)
Newbie
*
Offline Offline

Activity: 26
Merit: 0


View Profile
February 12, 2025, 01:17:11 PM
 #68

How is it different than Lattice Reduction method. Where for 200 bit Nonce we can solve using 7 or 8 Signatures.

Code:
Leakage: 5 bit.    Sigs Needed:71
Leakage:10 bit.    Sigs Needed:36
Leakage:15 bit.    Sigs Needed:24
Leakage:20 bit.    Sigs Needed:18
Leakage:25 bit.    Sigs Needed:15
Leakage:30 bit.    Sigs Needed:12
Leakage:56 bit.    Sigs Needed:7

I can do 240 bits using 10 signatures. Can lattice do that?
COBRAS
Member
**
Offline Offline

Activity: 1131
Merit: 25


View Profile
February 12, 2025, 01:36:53 PM
Last edit: February 12, 2025, 01:57:20 PM by COBRAS
 #69

How is it different than Lattice Reduction method. Where for 200 bit Nonce we can solve using 7 or 8 Signatures.

Code:
Leakage: 5 bit.    Sigs Needed:71
Leakage:10 bit.    Sigs Needed:36
Leakage:15 bit.    Sigs Needed:24
Leakage:20 bit.    Sigs Needed:18
Leakage:25 bit.    Sigs Needed:15
Leakage:30 bit.    Sigs Needed:12
Leakage:56 bit.    Sigs Needed:7

I can do 240 bits using 10 signatures. Can lattice do that?

make 256 bit with 100 sighnatures ?)

and idea make transaction hash from generated rsz without privkey and send coin, mo like me.
?

and generate fake rsz and find privkey for 125 bit, will solve 135 puzle with 2^10 tryings.

[
mcdouglasx
Sr. Member
****
Offline Offline

Activity: 756
Merit: 408



View Profile WWW
February 12, 2025, 07:40:06 PM
Last edit: February 12, 2025, 07:51:18 PM by mcdouglasx
 #70

Ok sure, use your own script and send me the signatures.

private key and nonces capped at 200 bits

cPub: 03b7e8a7bae909fd36da465e9998aaa569fed5c28c08adee43e8d5ff9533467b5e
uPub: 04b7e8a7bae909fd36da465e9998aaa569fed5c28c08adee43e8d5ff9533467b5eda2eb2c4e51e0 d8b5f9a17e6ab4dd84ea691dd12c9de48313a825e9fa792bce5



Code:
[
  {
    "message": "33cbe63c2159ac0b82c8ef1c57636af715ab56d4639347be913ff4109eb12db8",
    "r": "0x8acd71ead2616deda377fd78f8ba6f21ec899ad42ac7b5b1ca6988f0cf1e46da",
    "s": "0xbee2e73f1d630963a98a97bdc622daaaa043bd50b4e44b925699c07a7f0c1549"
  },
  {
    "message": "dd638972895045617dd8e677fee6f1738d7b08b097d53500a30251633cde122b",
    "r": "0x448d6c1a42249d6cb4d790ddbb0693334198fb3d0cb9492383c9f3b1a4a93aaf",
    "s": "0x3b65a88fb4c7964ee0de847fdf4fbb767f3e0e84927b8661dead02612fc3e975"
  },
  {
    "message": "cfdff646a02dcb2393e1905d8231fcbe8b1cc7afee6f96044ecc08691a864031",
    "r": "0x7975f783e33df3f429cb84c349768be9c092f8f7ad3f27034e8984233ddb6aa",
    "s": "0x774246df6ce98d5ef9d3ecce44b2b4d92b5fe6f0cf7306bac36720255bab7df0"
  },
  {
    "message": "fc1cf652696f28b52b05c833aacc7ba55ebdccf75c50b1ba575a95c24219b349",
    "r": "0xa3f8aeb7969ccefe03ded5fc2083c894d02ac8522dc92cb7fa0fb3e7730d24cf",
    "s": "0x6210bb3514a3803833d7a35e6d6bcc88f35e588ea49877b8553db5cdc22898aa"
  },
  {
    "message": "e24ce8806f84f5a04bab5e264d51fc4ee0a234c58edd8ee3b9bcbe99499fa6d2",
    "r": "0xd7768fe940bc3bf647ae9122f6b78d87bed705214b0a2152439456b616bf8aa9",
    "s": "0x7efb25c1450292935acfe38890a9d47aa7a72271eeaf258f52478d9e58aae624"
  },
  {
    "message": "bc1b617e402e934b5b45ee12d05d39f296b0160df0f96b1ba854707941023e78",
    "r": "0x68077c36779261cba349e2a02e86ab3a2ec0b518a49c230379f0bc552cc45f7c",
    "s": "0xcb96ce79e6a7e31059310cd2a8d0f6f46a80e742bbb24eca2d1e722ed42477c9"
  },
  {
    "message": "97f65b6b9b13db18b290d8cb99605faae5ea01fe426959dbb76f899bf409438d",
    "r": "0x49f7ddd51698ec98c533cbebe58e29f5580b057c153ca0c42e5ff27928954fe7",
    "s": "0x5460481e0563eeb47519cb044a433d29f905a65ca6f6e2d8da50a2b7f8b226d5"
  },
  {
    "message": "ab1439a2d29e1b8087cbe779227c8cd65892cd20240541c86da83cfbd85e2a95",
    "r": "0x84ada69c8c5b387d61f816b39d65e3e4c97c1736c0164f880ce484f5f1aca949",
    "s": "0x9685a56047f5695be5e79caad362adcd67cdbd3251878259340e857c19b94938"
  },
  {
    "message": "d93cdcf3ee322661ba654266ce1bad75e0563ca6ba56534c491a1488fc980b43",
    "r": "0x286c2df9b566cd00268ac094890ae176b304ed9648221841639612238ad6f5bf",
    "s": "0x685154b6059e5139ee1333ab119f53c8b30520d96bcd2ca100c658ea263be25e"
  },
  {
    "message": "ee68c2aa8d9ba4e005ee78429e80a26f3e9035fab4b938bfbd5e47c6ea042855",
    "r": "0x13f0f8deb44a26472dc72f056475d4b2ce05bed1196f62751348d10ab49424ec",
    "s": "0xa09f127b451160dc64a01f712a4d7ed3c6f77ea4871a57f9c84efc2a431b65b9"
  }
]

It should be noted that this is just a test, the Lattice attack can do this in minutes, the idea is to then make it more complicated for the op.

I can do 240 bits using 10 signatures. Can lattice do that?

▄▄█████████████████▄▄
▄█████████████████████▄
███▀▀█████▀▀░░▀▀███████

██▄░░▀▀░░▄▄██▄░░█████
█████░░░████████░░█████
████▌░▄░░█████▀░░██████
███▌░▐█▌░░▀▀▀▀░░▄██████
███░░▌██░░▄░░▄█████████
███▌░▀▄▀░░█▄░░█████████
████▄░░░▄███▄░░▀▀█▀▀███
██████████████▄▄░░░▄███
▀█████████████████████▀
▀▀█████████████████▀▀
Rainbet.com
CRYPTO CASINO & SPORTSBOOK
|
█▄█▄█▄███████▄█▄█▄█
███████████████████
███████████████████
███████████████████
█████▀█▀▀▄▄▄▀██████
█████▀▄▀████░██████
█████░██░█▀▄███████
████▄▀▀▄▄▀███████
█████████▄▀▄███
█████████████████
███████████████████
██████████████████
███████████████████
 
 $20,000 
WEEKLY RAFFLE
|



█████████
█████████ ██
▄▄█░▄░▄█▄░▄░█▄▄
▀██░▐█████▌░██▀
▄█▄░▀▀▀▀▀░▄█▄
▀▀▀█▄▄░▄▄█▀▀▀
▀█▀░▀█▀
10K
WEEKLY
RACE
100K
MONTHLY
RACE
|

██









█████
███████
███████
█▄
██████
████▄▄
█████████████▄
███████████████▄
░▄████████████████▄
▄██████████████████▄
███████████████▀████
██████████▀██████████
██████████████████
░█████████████████▀
░░▀███████████████▀
████▀▀███
███████▀▀
████████████████████   ██
 
[..►PLAY..]
 
████████   ██████████████
De_to4ka
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
February 13, 2025, 07:16:18 AM
 #71

How is it different than Lattice Reduction method. Where for 200 bit Nonce we can solve using 7 or 8 Signatures.

Code:
Leakage: 5 bit.    Sigs Needed:71
Leakage:10 bit.    Sigs Needed:36
Leakage:15 bit.    Sigs Needed:24
Leakage:20 bit.    Sigs Needed:18
Leakage:25 bit.    Sigs Needed:15
Leakage:30 bit.    Sigs Needed:12
Leakage:56 bit.    Sigs Needed:7

I can do 240 bits using 10 signatures. Can lattice do that?
I'm just curious that you wrote that you use fake signatures and a lattice, then you wrote that you have some other code and the lattice doesn't work here.they're definitely confusing me
AbadomRSZ
Newbie
*
Offline Offline

Activity: 32
Merit: 0


View Profile
February 24, 2025, 07:45:12 PM
 #72

I decided to join in the fun as well, private key and k nonce 200 bits but they were generated with my script!

Code:
 public_key: (100294193921211249051138660251652642324139747863533407083596980561416295326134 : 88248257669731470714700196852673878038781216985954649158849096031930923409205 : 1)

r = 0xa7a485bf6453503e924d52985c2762fca0afc214d44a15412d95baea55eae063
s = 0xe0022cc19a011734f436d7ba316003989aeab58eccf1795d407c758e820b5e91
z = 0x49a5e79978dfad44c33b7e8dc8e092ac9a0a80b01e70034f72836489988e8294

r = 0xceb399fc671d814aee808626dd5ae8f3ef0f3856741ce2d516be1b59042d0e0
s = 0x1f7c68cc3c5fc13d089e9f734581029f8fd32ab8fe8b8ee3db3f564ed59c9ae9
z = 0x131287092adc402875864067c996d676fc7230c6e240e8e3aaab4cebdc48dc3f

r = 0x6c723a1e3bec228fba03b1bfb413c2161f9d06d04f18322abba7dfe12d6dc71e
s = 0x8e728c485417c937ea98bcc6dc740b307d932971bbe3e9123754abaa98b040b3
z = 0xf2b4b224af793c82273956a8c176a1888feac39b66a5fe13b6737c8de1aed323

r = 0xcf26c301b9883ce8c5ff73d4b4ebf1433d9e8968dddd835ae6b12186621e376e
s = 0xcfe55d8ef6031233be7a7717b0789085c3dbf8360c3cf4bab42cf9b049a41c8
z = 0x31f843dfa96949027ff06458643c40cbfb08bb783058d88d995fa145f96c1587

r = 0x9b732053ed98c72dfd3c88a71355e21c69c7aa31c3f2c1557730921d2f91d778
s = 0x4a85505d27bc5558ffe972e879918da87ca04c0275008aade7e42deea90cbf30
z = 0x15b1e3f8bc4ec7825c76dc998ff3ce89e483004e807cd40022726295153c30eb

r = 0xc5602039d6a8c2b1ecd9beb528c22a4940bf803d2c58df035ec6e5ef386ea19a
s = 0x82aaae7b148dcaa2fa33faec008766d260cd6c3596ca827dc7ea7bf8b7e3d36
z = 0xd57f7ccd9c0ccb2e61f71b7840682c4d5573a9d4110a318bd8d79572c11491c5

r = 0x827607246fcb2cfed407c75da0377b47f48b2d7c0bbe37a09d01e1263589cbc8
s = 0xcc2b1abf5a80e47d4b8c56d23b9fa74f806a601e48f41fdab89912c69f89cf31
z = 0x62d9a63c3a246817dd9b0ad1ec05111456f8b84b76d74b6a1bdc2416ee19ee94

r = 0x2fbb4916bfd36e09ef9d7258db007992f0fe4d9d53042db9a2e0548b2e61a874
s = 0xd44d679ce9fe431674b0a168a396911634180e9483b5f49810905657f3c7834d
z = 0x5061314ee75e75d5ba8c63f755b1ef3862bc7055759a76b45ec519f539a2f031

r = 0x66cb13fc296eaf010366fbe23f9f326ea9c9d6ef4feae1fbd529d97473ee0178
s = 0x15d6ff2c6af8e5783abe75d95ba0a9afa5d70be23a2e055c9034ca87ec3f673f
z = 0x93acf23e800208a3dc27fcf70fae39f2a19334a3d2e8b64da1c30970f234628

r = 0xa0e5e2b6c0de6fad31c269ae8e8bbbe199496cfae68e27a7f43a9da93156c6f7
s = 0x5991555003749fee4e06c98a9578ff3bb027dd7abf8206472743e11fe663b6b1
z = 0x276489be17a33e261cd422800d39f76ccb0ace2991ac6b3635a8d1d9d0ea6c0f
mcdouglasx
Sr. Member
****
Offline Offline

Activity: 756
Merit: 408



View Profile WWW
February 24, 2025, 10:18:55 PM
 #73

I decided to join in the fun as well, private key and k nonce 200 bits but they were generated with my script!

I think the OP abandoned the topic. I'm still waiting for the results from a few days ago. I believe their technique was based on the vulnerabilities of their own script, which isn't correct, because it would be as believable as a magic trick. The OP has created a different topic; I think I've seen it.

▄▄█████████████████▄▄
▄█████████████████████▄
███▀▀█████▀▀░░▀▀███████

██▄░░▀▀░░▄▄██▄░░█████
█████░░░████████░░█████
████▌░▄░░█████▀░░██████
███▌░▐█▌░░▀▀▀▀░░▄██████
███░░▌██░░▄░░▄█████████
███▌░▀▄▀░░█▄░░█████████
████▄░░░▄███▄░░▀▀█▀▀███
██████████████▄▄░░░▄███
▀█████████████████████▀
▀▀█████████████████▀▀
Rainbet.com
CRYPTO CASINO & SPORTSBOOK
|
█▄█▄█▄███████▄█▄█▄█
███████████████████
███████████████████
███████████████████
█████▀█▀▀▄▄▄▀██████
█████▀▄▀████░██████
█████░██░█▀▄███████
████▄▀▀▄▄▀███████
█████████▄▀▄███
█████████████████
███████████████████
██████████████████
███████████████████
 
 $20,000 
WEEKLY RAFFLE
|



█████████
█████████ ██
▄▄█░▄░▄█▄░▄░█▄▄
▀██░▐█████▌░██▀
▄█▄░▀▀▀▀▀░▄█▄
▀▀▀█▄▄░▄▄█▀▀▀
▀█▀░▀█▀
10K
WEEKLY
RACE
100K
MONTHLY
RACE
|

██









█████
███████
███████
█▄
██████
████▄▄
█████████████▄
███████████████▄
░▄████████████████▄
▄██████████████████▄
███████████████▀████
██████████▀██████████
██████████████████
░█████████████████▀
░░▀███████████████▀
████▀▀███
███████▀▀
████████████████████   ██
 
[..►PLAY..]
 
████████   ██████████████
AbadomRSZ
Newbie
*
Offline Offline

Activity: 32
Merit: 0


View Profile
February 25, 2025, 12:35:40 AM
 #74

I hope he comes back and proves he's capable! Grin
mjojo
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
March 03, 2025, 10:47:46 AM
 #75

First of all, I'd like to say that I have a different account on the forum, and I'm creating this one just to stay anonymous.
I know how this sounds. but here me out.
All i need is one of you to generate a public key with a private key which is below 200 bits (just to note, I already done this method on 256 bit keys. I didn't touch any funds).
Sign at least two messages with that public key.
Include your bitcointalk username in one of them.
The more signatures you provide the faster it'll take my computer to compute it.
10 is well more than enough.

I also have a script to generate these, if you want to save time on that, but i recommend not trusting what i say and write your own script.

Edit: when you send the signatures, send them in this format:

R = 0xHexValue
S = 0xHexValue
Z = 0xHexValue

Note: both the nonce and the private key needs to be below 200 bits.
Just speechless if true
bozalic
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
March 05, 2025, 07:42:06 AM
 #76

I guess in your specific code, if a weak or repeated nonce  is used, an attacker can compute it from  values and recover the private key. This is a well-known vulnerability in ECDSA when nonces are not generated securely.

However, Bitcoin does not use a random nonce for signing transactions. Instead, it employs RFC 6979, which ensures that the nonce is deterministically derived from the private key and the message hash. This prevents reuse and eliminates the risk of private key leakage due to nonce repetition or poor randomness.

If someone claims to have derived the private key from , they likely exploited a flawed nonce generation process. To verify this, one would need multiple signatures using the same nonce or a predictable nonce pattern. In Bitcoin, this should never happen under normal circumstances.


Can you share your code, so i want to check.


First of all, I'd like to say that I have a different account on the forum, and I'm creating this one just to stay anonymous.
I know how this sounds. but here me out.
All i need is one of you to generate a public key with a private key which is below 200 bits (just to note, I already done this method on 256 bit keys. I didn't touch any funds).
Sign at least two messages with that public key.
Include your bitcointalk username in one of them.
The more signatures you provide the faster it'll take my computer to compute it.
10 is well more than enough.

I also have a script to generate these, if you want to save time on that, but i recommend not trusting what i say and write your own script.

Edit: when you send the signatures, send them in this format:

R = 0xHexValue
S = 0xHexValue
Z = 0xHexValue

Note: both the nonce and the private key needs to be below 200 bits.
dexizer7799
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
March 05, 2025, 08:40:34 AM
Last edit: March 05, 2025, 09:11:40 AM by dexizer7799
 #77

Test this script, it created by me, this can recover up to 249 bits for up to 256 private key.

https://github.com/dexizer7799/lattice-attack-secp256k1
nikolayspb
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 30, 2025, 03:58:35 PM
 #78

Test this script, it created by me, this can recover up to 249 bits for up to 256 private key.

https://github.com/dexizer7799/lattice-attack-secp256k1


Hello. Looks like topic deleted. Nothing to try. Can you provide script for testing?
dexizer7799
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
May 01, 2025, 03:30:19 PM
 #79

Test this script, it created by me, this can recover up to 249 bits for up to 256 private key.

https://github.com/dexizer7799/lattice-attack-secp256k1


Hello. Looks like topic deleted. Nothing to try. Can you provide script for testing?


Hi yes I can provide that script write to me personal message.
sdfasdf
Newbie
*
Offline Offline

Activity: 13
Merit: 2


View Profile
May 01, 2025, 04:36:51 PM
 #80

Test this script, it created by me, this can recover up to 249 bits for up to 256 private key.

https://github.com/dexizer7799/lattice-attack-secp256k1


Hello. Looks like topic deleted. Nothing to try. Can you provide script for testing?


Hi yes I can provide that script write to me personal message.

Hi ,

I hope this message finds you well. I came across your project that involves recovering up to 249 bits for a 256-bit private key. Unfortunately, I found that the GitHub link you provided is not working.

Would you be able to share the script with me directly? I would really appreciate it, as I’m very interested in your work.

Thank you for your time!

Best regards,

fix this >>>User 'dexizer7799' has not chosen to allow messages from newbies. You should post in their relevant thread to remind them to enable this setting. 
Pages: « 1 2 3 [4] 5 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!