Pages:
Author

Topic: [ARCHIVE] Bitcoin challenge discusion - page 22. (Read 29427 times)

full member
Activity: 282
Merit: 114
September 01, 2019, 01:31:29 PM
Thanks for making this table, i've just tested one of my kids' GTX 770 2GB card and its capable of doing 120MKey/sec

How could you manage this? Are you really sure in 120 Mkey/sec with GTX 770? This card GTX 770 cost not so much, and in comparison with GTX 1080ti you can need 3 cards GTX 770 and for the the same (or more) Key/sec rate. But the cost will be 2 times less.

GTX 770 = price ~$80-90
GTX 980 = price ~$150-160
GTX 1060 = price ~$240-260
GTX 1070Ti = price ~$280-300
GT 640 = price ~$10-15

Tesla V100 16GB - 1570-1600 Mkey/s = price ~$10000
sr. member
Activity: 443
Merit: 350
September 01, 2019, 01:19:36 PM
Thanks for making this table, i've just tested one of my kids' GTX 770 2GB card and its capable of doing 120MKey/sec

How could you manage this? Are you really sure in 120 Mkey/sec with GTX 770? This card GTX 770 cost not so much, and in comparison with GTX 1080ti you can need 3 cards GTX 770 and for the the same (or more) Key/sec rate. But the cost will be 2 times less.
sr. member
Activity: 443
Merit: 350
September 01, 2019, 01:09:39 PM
Table update with bitcrack key/rate per sec:

Code:
1. RTX 2080ti     1,200-1,300 Mkey/sec  (price $1,200-1,500)
2. GTX 2070ti     805 MMkey/sec
2. GTX 1080ti     345 Mkey/sec          (price $700-1,000)
3. GTX 1080       130 Mkey/sec          (price $500)
3. GTX 1070ti     100 Mkey/sec
3. GTX 1070       80-90 Mkey/sec        (price $450-550)
3. GTX 1060       69 Mkey/sec
4. GTX 1050ti     64 Mkey/sec           (price $150-200)
4. GTX 980        70-80 Mkey/sec
4. GTX 770(2Gb)   120 MKey/sec
4. GTX 680        109 Mkey/sec          (price $150)
4. GT 640         9 Mkey/sec     
5. RX 480         107 Mkey/sec          (price $130-150)
6. RX 470         105 Mkey/sec          (price $150-300)
7. RX 580         89 Mkey/sec           (price $200-250)
8. RX 560         50 Mkey/sec           (price $100-150)
9. R9 280/290x    20 Mkey/sec           (price $50)
jr. member
Activity: 85
Merit: 1
September 01, 2019, 10:04:56 AM
I read again most of the results posted here, and collected them to one table. Of corse results could differ from card to card depending on the settings. I also add the price of the CUDA. I tried to collect some benchmark. If you have some other device - pls, do not hesitate to add  Roll Eyes

Code:
1. RTX 2080ti    1,200-1,300M key/sec  (price $1,200-1,500)
2. GTX 1070      250 Mkey/sec          (price $450-550)
3. GTX 1080ti    150 Mkey/sec          (price $700-1,000)
4. GTX 680       109 Mkey/sec          (price $150)
5. RX 480        107 Mkey/sec          (price $130-150)
6. RX 470        105 Mkey/sec          (price $150-300)
7. RX 580        89 Mkey/sec           (price $200-250)
8. RX 560        50 Mkey/sec           (price $100-150)
9. R9 280/290x   20 Mkey/sec           (price $50)


Thanks for making this table, i've just tested one of my kids' GTX 770 2GB card and its capable of doing 120MKey/sec
member
Activity: 245
Merit: 17
August 31, 2019, 06:33:33 PM

.......................
multicore in process, wait..

to be continue..

Maybe you can split equally the search range among threads ...
sr. member
Activity: 443
Merit: 350
August 31, 2019, 07:56:56 AM
multicore in process, wait..

to be continue..

Thak you! Nice job :-) By the way, can you explain why do you need 10 Ntimeit? It actually finds the key from the 1st time, and the 2nd, 3d, etc finds the same key (for #32 as i tested). So, what is the reason for doing the same 10 times?

And also, can you confirm that in this Kangaroo method the luck also is important (for high order pubkeys)?
jr. member
Activity: 38
Merit: 18
August 31, 2019, 05:12:18 AM
origin link
https://fe57.org/forum/thread.php?board=4&thema=1#1

..Let's discuss the Pollard's kangaroo script from 57fe since it is not possible to register on its forum. Has anyone managed to increase the speed above 150k?..
Let's!

I will conduct a lot of tests and update this post.
Last update at Oct 09 2019, edit#34

#################
Notice, about power, it is the same

2123 == 2^(123) == 2**(123) == pow(2,123) == pow2(123) == 1<<123
sqrt(2) == 21/2 == 2**0.5

2123 - only this forum, outside of quote/code tags
2** - its python specific
pow() - popularity in many programm langs
2^ - classic old standart math text format, so i use it in 99%, not beautiful but it works

here x^y is math text format of power as xy and not bit operation xor as [x xor y], do not confuse!
#################
# gmpy2

When I ported the code to coincurve lib, I was surprised to find that gmpy2 is faster.
Until this moment, I have not seen an implementation faster than in coincurve, my respect!
1core i5-2540 python37x64 win7x64
Code:
coincurve:	30528.2 j/s
coincurve+cffi: 41165.6 j/s
gmpy2: 90194.8 j/s
(with python27x64 -10%)
(on linux +20% and more!)

how to install gmpy2 on windows
 1) download file .whl from https://www.lfd.uci.edu/~gohlke/pythonlibs/
 2) put to root dir of python
 3) install
Python27>python -m pip install gmpy2-2.0.8-cp27-cp27m-win_amd64.whl
Python37>python -m pip install gmpy2-2.0.8-cp37-cp37m-win_amd64.whl

#################
# speed cpu

Why does the work suddenly increase (by a factor of about 8 to 10, depending on time or jumps)
Tank, I need a pilot program for a V-212 helicopter cuda/opencl.. Let’s go.

https://bitcointalksearch.org/topic/m.51796187
https://imgur.com/a/f3zTmTa
thank you, it helped a lot

i imagine how j2002ba2 read topic and thinks
..they don`t want to share the tools like Pollard kangaroo script..

Quote from: BENDER
..Well, I’m gonna go build my own theme park, with blackjack and hookers!..

#################

why not use endomorphism for pollard-rho?
point after multiplying by beta is enough pseudo random?
if I'm right, this will be a new superfast method to calculate pollard-rho at the cost of 1M per 1 point
didn’t it occur to anyone before me, I need to test

#################

to be continued..
newbie
Activity: 17
Merit: 1
August 30, 2019, 08:41:32 PM
Distributed Random Brute Force

I don't have the GPU power to make any progress with sequential brute force.
I also found, by experiment, that guessing random numbers can take much longer.

So, to maximize the fun, I am doing both. 
I distribute the scan over the 20-3F keyspace, pick 3 random bytes, and brute force the rest.

My ranges look like this: (where XXXXXX is 3 random bytes)

[20-3F][XXXXXX]00000000 - [20-3F][XXXXXX]FFFFFFFF

My old card can try fifteen 3-byte randoms per scan, every 13 hours, at 44Mkey/s.  Plus about 2 million really random randoms with the leftover starting points.

What does that get me?

15 random blocks of 4.3 billion keys in each of 32 sub-ranges [20-3F] per scan = 2 trillion.  4T/day.  Pffft.

so, every 26-hour day, scanning the following:
128 B keys in 20XXXXXX00000000-20XXXXXXFFFFFFFF
128 B keys in 21XXXXXX00000000-21XXXXXXFFFFFFFF
128 B keys in 22XXXXXX00000000-22XXXXXXFFFFFFFF
.
.
.
128 B keys in 3DXXXXXX00000000-3DXXXXXXFFFFFFFF
128 B keys in 3EXXXXXX00000000-3EXXXXXXFFFFFFFF
128 B keys in 3FXXXXXX00000000-3FXXXXXXFFFFFFFF


i just need to get lucky with 3 bytes.  how hard can that be?Huh
or, get lucky with 2 bytes, but wait a week to find out.  that shouldn't take much more than 65535 weeks.




So, speaking of case 61:

In my case, what I do is mix randomness with full range scan. I keep the range small enough to get reasonable waiting time (say 10 min) .
This is an example:

1) generate all possibles 5 bits number: 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F 

2) pick a random 5 hex digit number (20bit) : for instance CADE9
we have now 16 possibles header for our key

10CADE9
11CADE9
12CADE9
13CADE9
14CADE9
15CADE9
16CADE9
17CADE9
18CADE9
19CADE9
1ACADE9
1BCADE9
1CCADE9
1DCADE9
1ECADE9
1FCADE9

3) call 16 instances of Bitcrack fully scanning following 16 ranges

10CADE9000000000:10CADE9FFFFFFFFF
11CADE9000000000:11CADE9FFFFFFFFF
12CADE9000000000:12CADE9FFFFFFFFF
13CADE9000000000:13CADE9FFFFFFFFF
14CADE9000000000:14CADE9FFFFFFFFF
15CADE9000000000:15CADE9FFFFFFFFF
16CADE9000000000:16CADE9FFFFFFFFF
17CADE9000000000:17CADE9FFFFFFFFF
18CADE9000000000:18CADE9FFFFFFFFF
19CADE9000000000:19CADE9FFFFFFFFF
1ACADE9000000000:1ACADE9FFFFFFFFF
1BCADE9000000000:1BCADE9FFFFFFFFF
1CCADE9000000000:1CCADE9FFFFFFFFF
1DCADE9000000000:1DCADE9FFFFFFFFF
1ECADE9000000000:1ECADE9FFFFFFFFF
1FCADE9000000000:1FCADE9FFFFFFFFF
 
goto step 2 and repeat.

each cycle will take 16*10min = 160 min if you have one GPU.

This trick will increase your likelihood in finding the key as times increases and not wait 180 years (1GPU) or 5 years (36GPUs). LOL
   
a random 5 hex digit is one of 1,048,575  if you get it right, you have the key in 160 min with only one GPU Wink

 


This looks like a suggestion I've made a while ago  Wink


hahaha cool.  i made some tweaks to BitCrack so i can set whatever starting points i want.  I have it count to FFFF and restart with a new batch of points.  it writes everything it has tried to a file.  It has not picked the same random 3 bytes yet, nor has any scan overlapped any ranges posted here.  i will be lazy and wait until it does before coding anything to prevent that. Tongue
sr. member
Activity: 443
Merit: 350
August 30, 2019, 03:15:34 PM
if I want to look for any other bitcoin key (I guess it takes a very long time), I do not need to change these lines? Only lines 168-176 and 178?

These are the constant numbers. They are always the same for bitcoin.
member
Activity: 174
Merit: 12
August 30, 2019, 10:49:30 AM
Let's discuss the Pollard's kangaroo script from 57fe since it is not possible to register on its forum. Has anyone managed to increase the speed above 150k? And who understands, explain what the lines mean 5-8:

modulo = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F
order  = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798
Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8


This is the easiest part  Grin All these integers are determined by bitcoin mathematics in ECDSA. Gx and Gy are x, y coordinates of the base point (G) which is used to produce private key. Modulo is the mod of the field (like border). Order is the order of the fiels, i.e the total number of points of ECDSA curve.


if I want to look for any other bitcoin key (I guess it takes a very long time), I do not need to change these lines? Only lines 168-176 and 178?
jr. member
Activity: 114
Merit: 5
August 30, 2019, 08:44:54 AM
I am at 1080ti maximum reached 380 Mkey / s. This is probably normal relative to 1070 and AMD. I wonder why 2080ti is more powerful in ~ 3 times than 1080ti, it should be about ~ 30% (500 Mkey / s). Due to what such a gap, have thoughts?

Can you please tell your configuration for 1080ti? (b, t, p and any other relevant info). What CUDA do you use? (9.2 or the newest 10.1).
I tried on the week to test 1080ti (Gigabyte Gaming OC 11Gb) and received thr result 150 Mkey/sec (as another guy posted earlier) with -b 56 -t 512 -p 2048.
experiments. I think you need to gradually increase the parameter -b. You can also raise the parameter -p (this uses the memory of your card).try for example like this  -b 80 -t 512 -p 4000 or  -b 88 -t 256 -p 4500 or  -b 60 -t 512 -p 6000  etc. change the parameters and...experiments....experiments....experiments....

Just want to add that you should increase -p in multiples of 512
jr. member
Activity: 37
Merit: 1
August 30, 2019, 06:28:39 AM
I am at 1080ti maximum reached 380 Mkey / s. This is probably normal relative to 1070 and AMD. I wonder why 2080ti is more powerful in ~ 3 times than 1080ti, it should be about ~ 30% (500 Mkey / s). Due to what such a gap, have thoughts?

Can you please tell your configuration for 1080ti? (b, t, p and any other relevant info). What CUDA do you use? (9.2 or the newest 10.1).
I tried on the week to test 1080ti (Gigabyte Gaming OC 11Gb) and received thr result 150 Mkey/sec (as another guy posted earlier) with -b 56 -t 512 -p 2048.
experiments. I think you need to gradually increase the parameter -b. You can also raise the parameter -p (this uses the memory of your card).try for example like this  -b 80 -t 512 -p 4000 or  -b 88 -t 256 -p 4500 or  -b 60 -t 512 -p 6000  etc. change the parameters and...experiments....experiments....experiments....
sr. member
Activity: 443
Merit: 350
August 29, 2019, 06:15:04 PM
I am at 1080ti maximum reached 380 Mkey / s. This is probably normal relative to 1070 and AMD. I wonder why 2080ti is more powerful in ~ 3 times than 1080ti, it should be about ~ 30% (500 Mkey / s). Due to what such a gap, have thoughts?

Can you please tell your configuration for 1080ti? (b, t, p and any other relevant info). What CUDA do you use? (9.2 or the newest 10.1).
I tried on the week to test 1080ti (Gigabyte Gaming OC 11Gb) and received thr result 150 Mkey/sec (as another guy posted earlier) with -b 56 -t 512 -p 2048.
sr. member
Activity: 443
Merit: 350
August 29, 2019, 02:33:02 PM
Let's discuss the Pollard's kangaroo script from 57fe since it is not possible to register on its forum. Has anyone managed to increase the speed above 150k? And who understands, explain what the lines mean 5-8:

modulo = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F
order  = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798
Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8


This is the easiest part  Grin All these integers are determined by bitcoin mathematics in ECDSA. Gx and Gy are x, y coordinates of the base point (G) which is used to produce private key. Modulo is the mod of the field (like border). Order is the order of the fiels, i.e the total number of points of ECDSA curve.
member
Activity: 174
Merit: 12
August 29, 2019, 02:17:40 PM
Let's discuss the Pollard's kangaroo script from 57fe since it is not possible to register on its forum. Has anyone managed to increase the speed above 150k? And who understands, explain what the lines mean 5-8:

modulo = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F
order  = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
Gx = 0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798
Gy = 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8



Who knows for bitcrack is it important to have Visual Studio 2017 and CUDA Toolkit 9.2? Will it work with Visual Studio 2019 and CUDA Toolkit 10.1 (newest vesrions)?

If I understand correctly, then there is a new version with Upgrade to Visual Studio 2019 / CUDA 10.1, but it is not in releases
https://github.com/brichard19/BitCrack
sr. member
Activity: 443
Merit: 350
August 29, 2019, 01:11:19 PM
Who knows for bitcrack is it important to have Visual Studio 2017 and CUDA Toolkit 9.2? Will it work with Visual Studio 2019 and CUDA Toolkit 10.1 (newest vesrions)?
jr. member
Activity: 85
Merit: 1
August 29, 2019, 12:55:44 PM
yeah... being the one that claims this and the following wallets requires some luck (besides GPU power) , but sticking to a plan is never a bad idea  Wink
member
Activity: 245
Merit: 17
August 29, 2019, 12:33:43 PM
Distributed Random Brute Force

I don't have the GPU power to make any progress with sequential brute force.
I also found, by experiment, that guessing random numbers can take much longer.

So, to maximize the fun, I am doing both. 
I distribute the scan over the 20-3F keyspace, pick 3 random bytes, and brute force the rest.

My ranges look like this: (where XXXXXX is 3 random bytes)

[20-3F][XXXXXX]00000000 - [20-3F][XXXXXX]FFFFFFFF

My old card can try fifteen 3-byte randoms per scan, every 13 hours, at 44Mkey/s.  Plus about 2 million really random randoms with the leftover starting points.

What does that get me?

15 random blocks of 4.3 billion keys in each of 32 sub-ranges [20-3F] per scan = 2 trillion.  4T/day.  Pffft.

so, every 26-hour day, scanning the following:
128 B keys in 20XXXXXX00000000-20XXXXXXFFFFFFFF
128 B keys in 21XXXXXX00000000-21XXXXXXFFFFFFFF
128 B keys in 22XXXXXX00000000-22XXXXXXFFFFFFFF
.
.
.
128 B keys in 3DXXXXXX00000000-3DXXXXXXFFFFFFFF
128 B keys in 3EXXXXXX00000000-3EXXXXXXFFFFFFFF
128 B keys in 3FXXXXXX00000000-3FXXXXXXFFFFFFFF


i just need to get lucky with 3 bytes.  how hard can that be?Huh
or, get lucky with 2 bytes, but wait a week to find out.  that shouldn't take much more than 65535 weeks.




So, speaking of case 61:

In my case, what I do is mix randomness with full range scan. I keep the range small enough to get reasonable waiting time (say 10 min) .
This is an example:

1) generate all possibles 5 bits number: 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F 

2) pick a random 5 hex digit number (20bit) : for instance CADE9
we have now 16 possibles header for our key

10CADE9
11CADE9
12CADE9
13CADE9
14CADE9
15CADE9
16CADE9
17CADE9
18CADE9
19CADE9
1ACADE9
1BCADE9
1CCADE9
1DCADE9
1ECADE9
1FCADE9

3) call 16 instances of Bitcrack fully scanning following 16 ranges

10CADE9000000000:10CADE9FFFFFFFFF
11CADE9000000000:11CADE9FFFFFFFFF
12CADE9000000000:12CADE9FFFFFFFFF
13CADE9000000000:13CADE9FFFFFFFFF
14CADE9000000000:14CADE9FFFFFFFFF
15CADE9000000000:15CADE9FFFFFFFFF
16CADE9000000000:16CADE9FFFFFFFFF
17CADE9000000000:17CADE9FFFFFFFFF
18CADE9000000000:18CADE9FFFFFFFFF
19CADE9000000000:19CADE9FFFFFFFFF
1ACADE9000000000:1ACADE9FFFFFFFFF
1BCADE9000000000:1BCADE9FFFFFFFFF
1CCADE9000000000:1CCADE9FFFFFFFFF
1DCADE9000000000:1DCADE9FFFFFFFFF
1ECADE9000000000:1ECADE9FFFFFFFFF
1FCADE9000000000:1FCADE9FFFFFFFFF
 
goto step 2 and repeat.

each cycle will take 16*10min = 160 min if you have one GPU.

This trick will increase your likelihood in finding the key as times increases and not wait 180 years (1GPU) or 5 years (36GPUs). LOL
   
a random 5 hex digit is one of 1,048,575  if you get it right, you have the key in 160 min with only one GPU Wink
 
 


This looks like a suggestion I've made a while ago  Wink



newbie
Activity: 17
Merit: 1
August 29, 2019, 08:34:37 AM
Distributed Random Brute Force

I don't have the GPU power to make any progress with sequential brute force.
I also found, by experiment, that guessing random numbers can take much longer.

So, to maximize the fun, I am doing both. 
I distribute the scan over the 20-3F keyspace, pick 3 random bytes, and brute force the rest.

My ranges look like this: (where XXXXXX is 3 random bytes)

[20-3F][XXXXXX]00000000 - [20-3F][XXXXXX]FFFFFFFF

My old card can try fifteen 3-byte randoms per scan, every 13 hours, at 44Mkey/s.  Plus about 2 million really random randoms with the leftover starting points.

What does that get me?

15 random blocks of 4.3 billion keys in each of 32 sub-ranges [20-3F] per scan = 2 trillion.  4T/day.  Pffft.

so, every 26-hour day, scanning the following:
128 B keys in 20XXXXXX00000000-20XXXXXXFFFFFFFF
128 B keys in 21XXXXXX00000000-21XXXXXXFFFFFFFF
128 B keys in 22XXXXXX00000000-22XXXXXXFFFFFFFF
.
.
.
128 B keys in 3DXXXXXX00000000-3DXXXXXXFFFFFFFF
128 B keys in 3EXXXXXX00000000-3EXXXXXXFFFFFFFF
128 B keys in 3FXXXXXX00000000-3FXXXXXXFFFFFFFF


i just need to get lucky with 3 bytes.  how hard can that be?Huh
or, get lucky with 2 bytes, but wait a week to find out.  that shouldn't take much more than 65535 weeks.
newbie
Activity: 49
Merit: 0
August 29, 2019, 04:35:12 AM
IMHO
ranges should go from blah...blah...00000000 to blah...blah...FFFFFFFF
just to keep things neat and tidy.  maybe i am OCD.

why are all these bizarre ranges being scanned?
like 2b87eefd01e43a40 - 2b87f0798ea43a40
it makes no sense to me.

is something being converted from decimal?
that makes even less sense.

i just don't get it.  enlighten me.

Yeah so that range is within the 62-bit range, what is the problem?

i am just saying that, for me, for reasons of accounting and clarity, in my messed up mind (and probably in the perfectly good minds of others), i prefer a block to start on a 00 and end on FF.  

for example:
A600000000 - A6FFFFFFFF
3B92C70000000000 - 3B92C7FFFFFFFFFF
0000 - FFFF

like that.  it makes sense to me and is easy to understand.

what i do not understand, is how people come up with these ranges with some arbitrary collection of least significant bytes.
(no example given)

and i wonder where these come from.  are hands mashed down on a hex keyboard?  is it somebody's birthday?  their name in ascii?  is it just random?  is it some nice round decimal number that converts to god-awful looking hex.  Why is decimal even mentioned in this forum?

just wondering why.  not saying it is right or wrong.  it just does not align with my thought process.


Well the way I have been getting my starting points is by taking #61 hex key, converting it to decimal, multiplying it by anything from 1.1 to 2.9 and then converting it back to hex, then the ending key is the original decimal value plus how many addresses I've searched then converted back to hex.

But now I won't be posting any more ranges because I'm using random..

i was testing bitcrack in random...it will never find nothing as i decided...  he was looking to find 1 add in 3mlrd range ...6 hours)) lol
Pages:
Jump to: