Pages:
Author

Topic: [ARCHIVE] Bitcoin challenge discusion - page 11. (Read 28991 times)

member
Activity: 255
Merit: 27
October 21, 2019, 03:32:08 PM
I have been trying to solve the puzzle but every time I tried I got an headache. I dont know where to start and I keep on researching until I end up with nothing. I even ask some of my friends who are good with this things but I cannot understand fully their explanation. I guess I will stop doing the challenge and will focus on the signature campaign. Well good luck to you guys in solving the puzzle its hopeless for me.
Just a every day.
https://www.youtube.com/watch?v=im2VlRprLVc
sr. member
Activity: 443
Merit: 350
October 21, 2019, 12:37:36 PM
I will stop doing the challenge and will focus on the signature campaign. Well good luck to you guys in solving the puzzle its hopeless for me.

I don't have good material but keep trying  ;
So good luck to everyone

Hmm.. your both messages look like you are asking to increase the bounties again  Wink For example from 0.64BTC up to 6.4BTC for wallet #64 and so on
member
Activity: 142
Merit: 70
October 21, 2019, 09:22:25 AM
I have been trying to solve the puzzle but every time I tried I got an headache. I dont know where to start and I keep on researching until I end up with nothing. I even ask some of my friends who are good with this things but I cannot understand fully their explanation. I guess I will stop doing the challenge and will focus on the signature campaign. Well good luck to you guys in solving the puzzle its hopeless for me.
No just don't give up , we all know that is too hard, and all end up got an headache because its look like impossible, but if you have material so you can do it, I tried all this week from morning to night to find it but still nothing, because even minimze rang of search its still will take months to finish. I don't have good material but keep trying  ;
So good luck to everyone
sr. member
Activity: 644
Merit: 264
Aurox
October 21, 2019, 08:27:52 AM
I have been trying to solve the puzzle but every time I tried I got an headache. I dont know where to start and I keep on researching until I end up with nothing. I even ask some of my friends who are good with this things but I cannot understand fully their explanation. I guess I will stop doing the challenge and will focus on the signature campaign. Well good luck to you guys in solving the puzzle its hopeless for me.
sr. member
Activity: 443
Merit: 350
October 21, 2019, 07:04:32 AM
Why is 45% -55%? If you take the data from the table excluding the first ten keys. Then we get a minimum value of 31% and a maximum of 68%.

45-50% is my guess based on the analysis and statistic logics. The first keys are not representative due to higher dispersion, so it is better to exclude not 10 first keys but at least 15, of even 20.

The idea is that "the higher the bit --> the tighter dispersion". As the probability of 1 or 0 bit is always 50% for every bit, so the total quantity of "1"s (or "0"s) will tend to 50% in higher bits keys.

That is, the search difference will be in the range of 31% -69% of the bits set to 1 or 0.

Such "wide" range could be applicable only for low bit keys. But for higher bit keys the dispersion will be narrow.
Try to flip a coin 100 times --> more likely you will have at least 45 Heads but not more than 55 (the same for tails).
You can not take the results from the "10-15 times" coin flips and apply them to the random number where you flip the coin 100 times. No, the "heads" probability (number of "1"s) will tend to 50% while you increase the quantity of flips (bit value of the key).

Of course, everthing is possible, even the key with only 10% of "1"s, BUT morelikely for high bit keys the quantity of "1"s is within 45-55% range. Moreover, for keys higher than 140-150bit, i beleive that the quantity of "1"s is 46-54% or even 47-53%.

PS. All these calcualtions could be proved mathematically with the certain level of assurance.
member
Activity: 255
Merit: 27
October 21, 2019, 06:55:40 AM
member
Activity: 255
Merit: 27
October 21, 2019, 05:50:25 AM
newbie
Activity: 37
Merit: 0
October 20, 2019, 09:35:08 PM
 Wink
understand!
But either way, all tips should be tested;)

I use bitcrack, with this tip, I can create starting points.
sr. member
Activity: 443
Merit: 350
October 20, 2019, 09:13:50 PM
This script generates a binary value according to the tips of MrFreeDragon
he puts from 29 to 35 "1´s" in binary

But actually these tips are not very big help. Even if they are correct, the decrease in total number of combinations is not too much.

For example, for 64bit key the total range is 2^63, if we take only the keys with 29-35 quantity of "1"s , so the total combinations to test is 2^62.23 (total decrease of the range less than twice).
If we limit our range to exact 32 "1"s (32 "1"s and 32 "0"s), so the total amount of combinations will be 2^59.58 (decrease approx. by 10 times)


newbie
Activity: 37
Merit: 0
October 20, 2019, 07:02:31 PM
29-35 is the amount of 1´s in a binary number.

member
Activity: 142
Merit: 70
October 20, 2019, 06:15:41 PM
This script generates a binary value according to the tips of MrFreeDragon

he puts from 29 to 35 "1´s" in binary
those are intervals to search in ? because didn't really understand about 29 and 35
newbie
Activity: 37
Merit: 0
October 20, 2019, 05:33:01 PM
This script generates a binary value according to the tips of MrFreeDragon

he puts from 29 to 35 "1´s" in binary
jr. member
Activity: 119
Merit: 1
October 20, 2019, 02:52:54 PM

netlakesI made a php script to generate these results

What to do with your script?
What good is it?
How can he help us to find new keys?
newbie
Activity: 37
Merit: 0
October 20, 2019, 12:13:11 PM
member
Activity: 142
Merit: 70
October 16, 2019, 07:45:44 PM
This is the result after using Kangaroo ..

Please any one know how can I use Kangaroo ? is it bruteforcing ?
Please someone can poste just easy tuto of using it to bruteforce, and thanks

bounty0z, there was no some pattern. All the keys were random.
However, i made some analysis of all the private keys for the "opened" wallets, and can say that more likely the key has the following property:

the only pattern that I get, is after 4 privatekey ,the 5th start with 1
and always and at Hex (A,B,C,D,E,F) ,more time of F and E
but its not something the was sure to use as basic
sr. member
Activity: 443
Merit: 350
October 16, 2019, 09:26:22 AM
bounty0z, there was no some pattern. All the keys were random.
However, i made some analysis of all the private keys for the "opened" wallets, and can say that more likely the key has the following property:

Quantity on bit "1" in the key is 45%-55% from the total bit quantity

This means that for the wallet #64 the total quantity of "1"s in the key is from 29 to 35 with the leading first bit "1" (first bit is always "1" for all keys in the puzzle). To increase your chances youl should take 29-35 "1"s, randomly mix them with the remaining "0"s and you will receieve the key. The key consists from let's say 10 "1"s bit and 54 "0"s bit is not the key for #64, as here only 15% are "1"s and the majority are "0"s.

How did I receieve this? I had a look at all the private keys in BIN format, and found that the average quantity of "1" in all the keys is 51%, the total range is 40-60%, but the most likely is 45-55%. Please have a look at all the known private keys in BIN formmat and the calculation of "1"s and "0"s in them.

Code:
No. K%rng 1's 0's %1's Private Key in BIN
01   100,00% 1 0 100% 1
02   100,00% 2 0 100% 11
03   100,00% 3 0 100% 111
04   0,00% 1 3 25% 1000
05   40,00% 3 2 60% 10101
06   58,06% 3 3 50% 110001
07   20,63% 3 4 43% 1001100
08   76,38% 3 5 38% 11100000
09   83,14% 6 3 67% 111010011
10   0,59% 2 8 20% 1000000010
11   12,90% 4 7 36% 10010000011
12   31,07% 8 4 67% 101001111011
13   27,37% 4 9 31% 1010001100000
14   28,73% 5 9 36% 10100100110000
15   63,99% 9 6 60% 110100011110011
16   57,20% 8 8 50% 1100100100110110
17   46,22% 11 6 65% 10111011001001111
18   51,57% 6 12 33% 110000100000001101
19   36,39% 12 7 63% 1010111010010011111
20   64,66% 10 10 50% 11010010110001010101
21   72,78% 11 10 52% 110111010010100110100
22   43,41% 12 10 55% 1011011110010000001111
23   33,49% 12 11 52% 10101010110111001010010
24   72,00% 9 15 38% 110111000010101000000100
25   97,80% 17 8 68% 1111110100101111011100101
26   62,54% 11 15 42% 11010000000011001001101110
27   66,82% 14 13 52% 110101011000011100001110101
28   69,60% 14 14 50% 1101100100010110110011101000
29   49,28% 16 13 55% 10111111000100101010100011110
30   92,44% 16 14 53% 111101100101001100110101100100
31   95,80% 21 10 68% 1111101010011111110011101000111
32   44,05% 15 17 47% 10111000011000101010011000101110
33   66,18% 16 17 48% 110101001011011001010100011011000
34   64,53% 16 18 47% 1101001010011001011001000100011101
35   17,07% 15 20 43% 10010101110110100100001000101110000
36   23,36% 17 19 47% 100111011110100000100000101001111100
37   45,89% 22 15 59% 1011101010111011101010110101010010011
38   6,94% 17 21 45% 10001000111000001011111010110011010000
39   17,77% 20 19 51% 100101101011111100000110000001111101001
40   82,56% 22 18 55% 1110100110101110010010010011001111010110
41   32,63% 21 20 51% 10101001110000110100110101100110001011011
42   31,67% 19 23 45% 101010001000100001110001011000110110001111
43   68,48% 24 19 56% 1101011110100111011001001111100010110010001
44   75,13% 22 22 50% 11100000001010110011010110100011010110001111
45   13,67% 19 26 42% 100100010111111001010000101000011110000000101
46   46,11% 19 27 41% 1011101100000110000011100010001101010101000100
47   70,06% 24 23 51% 11011001101011000010000101101010011110010111010
48   35,86% 31 17 65% 101011011110011011010111110011100011101110011011
49   45,35% 25 24 51% 1011101000001011101101011000000010101111101001101
50   8,56% 24 26 48% 10001010111101010000111100001011101001001101010100
51   82,86% 19 32 37% 111010100000111000010100001101000000000100111010100
52   87,25% 30 22 58% 1110111110101110000101100100110010111001111000111100
53   50,18% 24 29 45% 11000000001111000100011100100011111100011001001101100
54   10,74% 32 22 59% 100011011011111011011011010101101011010001111101000011
55   66,79% 31 24 56% 1101010101111100001111110011011011001111110000100010100
56   22,73% 34 22 61% 10011101000110001011011000111010110001001111111111011111
57   91,85% 29 28 51% 111101011001001011100100100000111100101011101011000011100
58   38,76% 25 33 43% 1011000110011101011011100001010010000110001001101000100001
59   82,17% 33 26 56% 11101001001011011001011101110000111110010101011010001001111
60   96,89% 32 28 53% 111111000000011110100001100000100101001101100111101110111110
61   23,67% 29 32 48% 1001111001001011010100011011101000010111101100100100100000110
62   69,49% 34 28 55% 11011000111101010101000001111010110110000100011010101111101110
63   95,01% 36 27 57% 111110011001110010111101111110110101100110011110110100000001000
65   65,71% 29 36 45% 11010100000111000101100010011010100000101101100100110100001100111
70   64,40% 34 36 49% 1101001001101110000100101101100100001100011010011011000100111011110001
75   19,32% 33 42 44% 100110001011100111000010001010001101000011010100001001100110110111000000111
80   82,89% 37 43 46% 11101010000110100101110001100110110111001100000100011011010110101101000110000000
85   9,03% 39 46 46% 1000101110010000011000100111100000001100011010101000110111000110011101011101110101000
90   40,23% 43 47 48% 101100111000000000101110110010000100110110101001000100010111000111000111101000010110111111
95   28,87% 48 47 51% 10100100111101001111001001010110001100000111100011111110110010010100000111010001011000111110100
100 36,98% 53 47 53% 1010111101010101111111000101100111000011001101011100100011101100011001111110110100100100100000100110

AVG 53% 51% Average for wallets > #15

Keep in mind that the fist 15 keys are not representative due to small length, so the average is  calcualted for wallets greater #15.
Additional analytics for information purposes (i did not find any patterns here): K%rng is the actual private key range point (in %%). It means where the actual private key was found in the context of total range (0% is the 1st point of the range, 100% is the last point of the range). K%rng for wallet #n is (PrivKey(n) - 2^(n-1)) / 2^(n-1) * 100%
jr. member
Activity: 84
Merit: 1
October 16, 2019, 07:36:58 AM
is there any way to expect some rang ?
and if there is any detailed tuto about using keyspace . like modify it to expect numbres

No the creator have stated it's random, so basicly what this means is that wallet64 key is to be found in the range = 0x8000000000000000:0x10000000000000000

I found this post from the author in the original thread:

This puzzle is very strange. If it's for measuring the world's brute forcing capacity, 161-256 are just a waste (RIPEMD160 entropy is filled by 160, and by all of P2PKH Bitcoin). The puzzle creator could improve the puzzle's utility without bringing in any extra funds from outside - just spend 161-256 across to the unsolved portion 51-160, and roughly treble the puzzle's content density.

If on the other hand there's a pattern to find... well... that's awfully open-ended... can we have a hint or two? Cheesy

I am the creator.

You are quite right, 161-256 are silly.  I honestly just did not think of this.  What is especially embarrassing, is this did not occur to me once, in two years.  By way of excuse, I was not really thinking much about the puzzle at all.

I will make up for two years of stupidity.  I will spend from 161-256 to the unsolved parts, as you suggest.  In addition, I intend to add further funds.  My aim is to boost the density by a factor of 10, from 0.001*length(key) to 0.01*length(key).  Probably in the next few weeks.  At any rate, when I next have an extended period of quiet and calm, to construct the new transaction carefully.

A few words about the puzzle.  There is no pattern.  It is just consecutive keys from a deterministic wallet (masked with leading 000...0001 to set difficulty).  It is simply a crude measuring instrument, of the cracking strength of the community.

Finally, I wish to express appreciation of the efforts of all developers of new cracking tools and technology.  The "large bitcoin collider" is especially innovative and interesting!
member
Activity: 142
Merit: 70
October 15, 2019, 08:10:27 PM
is there any way to expect some rang ?
and if there is any detailed tuto about using keyspace . like modify it to expect numbres
jr. member
Activity: 84
Merit: 1
October 14, 2019, 08:59:22 AM
My new =>STABLE<= record on BitCrack :-)



NV Tesla  || The unstable setting showed me 1615, but it jumps from 1585 every reading. ||


Hello, how do you launch bitreck on several cards at once?

I really don't think that is possible with the current releases, if so someone have their own build i think.

What I do is simply run another instance of Bitcrack in another CMD window, you need to run cudaInfo.exe before to know what ID each card have.
Running more instances requires some tweaking to your parameters, as the Bitcrack application sometimes (under initialising) can get an error, i think this is a memory issue, so you need to scale down parameters for each card a bit, and test that it runs properly Smiley
newbie
Activity: 13
Merit: 0
October 14, 2019, 07:47:56 AM
My new =>STABLE<= record on BitCrack :-)

https://i.ibb.co/vkmLrjy/DSC-0075.jpg

NV Tesla  || The unstable setting showed me 1615, but it jumps from 1585 every reading. ||


Hello, how do you launch bitreck on several cards at once?
Pages:
Jump to: