Bitcoin Forum
March 15, 2026, 07:02:23 AM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Mini-puzzle #6  (Read 137 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
RetiredCoder (OP)
Full Member
***
Offline Offline

Activity: 157
Merit: 141


No pain, no gain!


View Profile WWW
March 14, 2026, 05:14:11 PM
Merited by Ykra (1)
 #1

Guys, let's have some fun again, I have one more mini-puzzle for you  Smiley
There is 0.01 BTC on that address, so hurry up!

03BBF1AFF1B753DFA4C58835C2C135D7D2C7CEA8635D483D37A8997B666CC1FA61
Hint: private key is 1BA27FB025xxxxxxxxxx6F34348EE6B14E9D8A3581C0B01xxxxxxxxxxA90D587

PS. No BS here please, I will remove it.
PPS. For history, previous mini-puzzle is here: https://bitcointalk.org/index.php?topic=5538285

I've solved #120, #125, #130. How: https://github.com/RetiredC
Ykra
Newbie
*
Offline Offline

Activity: 12
Merit: 2


View Profile
March 14, 2026, 08:49:18 PM
 #2

Hey cool puzzle, just want to confirm I got this.

I only saw it 20 minutes ago so thought I was probably late to the party or maybe no participants?
HolyMenty
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
March 14, 2026, 09:40:52 PM
 #3

The Base58 address is: 1LsusxaEiGpTvWcXJA9ACRDKva8REjMokr
 
and it has been withdrawn.
I didn’t expect it to be solved this quickly. apparently a hunter waiting for RetiredCode’s mini puzzle was on high alert. Congratulations to the winner.
roostam.aksenov
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
March 14, 2026, 10:35:14 PM
 #4

PRIVATE KEY: 1BA27FB025BAF482573F6F34348EE6B14E9D8A3581C0B018DBECC642FA90D587

Let's break down the results:
- Gap 1 (positions 10-19): BAF482573F
- Gap 2 (positions 47-56): 8DBECC642F

The diagnosis shows:
- A total of 15 DB matches: 10 TT, 5 WW, 0 TW directly
- 5 REJECTS (WW collisions with invalid g1/g2)
- The solution was found in about 15 minutes.
Verification:
- Template: 1BA27FB025xxxxxxxxxx6F34348EE6B14E9D8A3581C0B01xxxxxxxxxxxxA90D587
- Found: 1BA27FB025BAF482573F6F34348EE6B14E9D8A3581C0B018DBECC642FA90D587
- g1 = BAF482573F (hex), g2 = 8DBECC642F (hex) — gap2 has the suffix A90D587 → hexes 8DBECC642F + A90D587 = positions 47-63 in the key ✓
- K = 5.191 (good, within the expected range of 1.5-11)
- The program itself Verified: ec.MultiplyG(pk_found) == gPubKey ✓
Total for the modification:
- Speed: ~7.5 GK/s (same as the original)
- Solving time: ~15 min (K=5.19, range 40 per gap)
- Jump table: 256 gap1 jumps (×2^176) + 256 gap2 jumps (×2^28)
- Distance tracking: d1/d2 as separate i64s in the kernel
- Collision: g1 = d1_tame - d1_wild, g2 = d2_tame - d2_wild
RetiredCoder (OP)
Full Member
***
Offline Offline

Activity: 157
Merit: 141


No pain, no gain!


View Profile WWW
Today at 06:07:12 AM
 #5

As we can see, kangaroos can be used easily for cases like this, see my post for details:
https://bitcointalk.org/index.php?topic=5517607.msg66508168#msg66508168
Congrats to the winner!  Smiley

I've solved #120, #125, #130. How: https://github.com/RetiredC
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!