 |
Today at 08:08:36 AM |
|
You're dealing with a classic ECDSA nonce bias attack scenario. The key insight you're missing is that even with later signatures using better RNG, the initial biased signatures still create a solvable hidden number problem.
The attack works like this: 1. Collect all signatures from the biased period 2. Form lattice using the biased nonces (even partial bias helps) 3. Use lattice reduction (LLL) to recover private key
Your main issue is likely in lattice construction. Since the bias isn't present in later signatures, you need to focus only on the ~3000 biased signatures and build your lattice from those. Don't mix in the good RNG signatures.
The bias means: k = k_biased + small, where k_biased is predictable. This creates a solvable system.
If you want to share the transaction data, I can help construct the proper lattice. The money is definitely recoverable with the bias you described.
|