Pages:
Author

Topic: [ARCHIVE] Bitcoin challenge discusion - page 33. (Read 29427 times)

legendary
Activity: 3472
Merit: 10611
July 21, 2019, 12:01:04 AM
#26
By the way, isn't it kinda scary that a few keys in 80 and 90 bit ranges were already found? Many users have passwords with less bits of security, and passwords also aren't random, so bruteforce can be optimized. Or am I missing something, and those keys were cracked with some algorithm rather than brute force?
you are missing the difference between Asymmetric (elliptic curve) cryptography and Encryption (like Block ciphers). i am not an expert but the algorithms are very different. for example in this topic's case the algorithm (when starting from a certain private key like 2^90) can be simplified to a very simple single point addition but in breaking something like AES you still need to brute force the whole thing.

if you want to have fun, you can program something. i did that a while ago in c# for small ones as a "challenge" to my skills knowing there is no other reward.

So, I did it and it takes 2.5 ms for me to calculate an address from a raw private key  Cry

doesn't seem that bad. my normal point multiplication takes 42 ms using BigIntegers...
that's not the whole thing though, it is all about the LOOP where you have to repeat the same thing, and  you shouldn't work with raw private key and addresses. you start with the bytes and end with hash bytes and skip any unnecessary conversions.

It is unfortunate that challenges like these are so complicated and that only a few people with specialized hardware and knowledge can take part in this. We need challenges like this that can give open participation to a lot more people, without specialized knowledge to garner a lot more publicity for Bitcoin.

I know it is difficult to create something that would be more accessible for the average guy on the street, but it can be something that can be done by a group of people with different knowledge on several topics and something where groups can all benefit from the rewards. We had something like this before, but the prize was not this big.  Roll Eyes
this is not a giveaway. i believe it is more like a test of the security of a 256 bit elliptic curve, and the incentive is the way to keep an eye on it. the conclusion so far is that 256 is very safe since so far after years of work only ~90 bits of it is searched and the "rewards" were claimed. because of that it is not for the "average guy" while that average guy can still start learning more about ECC and gets his hands dirty...
member
Activity: 245
Merit: 17
July 20, 2019, 08:53:55 PM
#25
For my certainty: what range applies to address 105 (this is the first of the unused, which has the output and pubkey transactions). Something I have to check, high compartment, and it's time to waste a pity :-) According to my calculations, the beginning is 0000000000000000000000000000000000000100000000000000000000000000?
Correct me if I'm wrong but start: 100000000000000000000000000 2^104
                                          end: 1ffffffffffffffffffffffffff 2^105 -1
Plz share if you get any luck

105 bits = 1 + 26x4bits,  so the  range is  obviously
100000000000000000000000000  to 1FFFFFFFFFFFFFFFFFFFFFFFFFF
good luck  Roll Eyes
newbie
Activity: 7
Merit: 0
July 20, 2019, 05:44:50 PM
#24
For my certainty: what range applies to address 105 (this is the first of the unused, which has the output and pubkey transactions). Something I have to check, high compartment, and it's time to waste a pity :-) According to my calculations, the beginning is 0000000000000000000000000000000000000100000000000000000000000000?
Correct me if I'm wrong but start: 100000000000000000000000000 2^104
                                          end: 1ffffffffffffffffffffffffff 2^105 -1
Plz share if you get any luck
full member
Activity: 282
Merit: 114
July 20, 2019, 05:22:53 PM
#23
For my certainty: what range applies to address 105 (this is the first of the unused, which has the output and pubkey transactions). Something I have to check, high compartment, and it's time to waste a pity :-) According to my calculations, the beginning is 0000000000000000000000000000000000000100000000000000000000000000?
legendary
Activity: 3472
Merit: 1722
July 20, 2019, 06:44:19 AM
#22
It is unfortunate that challenges like these are so complicated and that only a few people with specialized hardware and knowledge can take part in this. We need challenges like this that can give open participation to a lot more people, without specialized knowledge to garner a lot more publicity for Bitcoin.

Earlier on the puzzle was accessible to everyone with a cheap computer, if it was any easier a single person could have quickly snagged the whole prize. Making each key progressively more difficult to find ensures the challenge will remain open to all for a very long time.
legendary
Activity: 3542
Merit: 1965
Leading Crypto Sports Betting & Casino Platform
July 20, 2019, 06:37:29 AM
#21
It is unfortunate that challenges like these are so complicated and that only a few people with specialized hardware and knowledge can take part in this. We need challenges like this that can give open participation to a lot more people, without specialized knowledge to garner a lot more publicity for Bitcoin.

I know it is difficult to create something that would be more accessible for the average guy on the street, but it can be something that can be done by a group of people with different knowledge on several topics and something where groups can all benefit from the rewards. We had something like this before, but the prize was not this big.  Roll Eyes
newbie
Activity: 3
Merit: 0
July 20, 2019, 03:57:49 AM
#20
Could it be the formula is applied onto the address rather than the private keys? just a thought
member
Activity: 245
Merit: 17
July 19, 2019, 06:32:58 PM
#19
Some statistics

format #n x%    --> n is case #n and x is how far in % is the key from the lower bound of the corresponding keyspace.

#08 75% ,  #09 82% ,  #10 00% ,  #11 13% ,  #12 31% ,  #13 27% ,  #14 29% ,  #15 64% ,
#16 57% ,  #17 46% ,  #18 52% ,  #19 36% ,  #20 65% ,  #21 73% ,  #22 43% ,  #23 33% ,
#24 72% ,  #25 98% ,  #26 63% ,  #27 67% ,  #28 70% ,  #29 49% ,  #30 92% ,  #31 96% ,
#32 44% ,  #33 66% ,  #34 65% ,  #35 17% ,  #36 23% ,  #37 46% ,  #38 07% ,  #39 18% ,
#40 83% ,  #41 33% ,  #42 32% ,  #43 68% ,  #44 75% ,  #45 14% ,  #46 46% ,  #47 70% ,
#48 36% ,  #49 45% ,  #50 09% ,  #51 83% ,  #52 87% ,  #53 50% ,  #54 11% ,  #55 67% ,
#56 23% ,  #57 92% ,  #58 39% ,  #59 82% ,  #60 97% ,  #61 24% ,   

He is the resulting histogram (10 bins) which display how these keys are distributed

   0% -  10%        ∎∎∎
 10% -  20%        ∎∎∎∎∎
 20% -  30%        ∎∎∎∎∎
 30% -  40%        ∎∎∎∎∎∎∎
 40% -  50%        ∎∎∎∎∎∎∎
 50% -  60%        ∎∎∎
 60% -  70%        ∎∎∎∎∎∎∎∎
 70% -  80%        ∎∎∎∎∎∎
 80% -  90%        ∎∎∎∎∎
 90% - 100%       ∎∎∎∎∎

It looks pretty much uniform, as expected.

What do you think ?


Thanks for the info regarding the "challenge". I was not sure about the right form :-) As to the percentage ranges - I took them personally into account, but I do not plan to base them in my actions, because they would be shots on the basis of statistics, and again complicating my life. It is not known whether now there will be three subsequent addresses had their key in the range of 90-100% .... and maybe even the rest of the keys below 50% :-)

these numbers just show that there is "no pattern" as where the keys stand within their corresponding ranges.
full member
Activity: 282
Merit: 114
July 19, 2019, 06:13:44 PM
#18
Some statistics

format #n x%    --> n is case #n and x is how far in % is the key from the lower bound of the corresponding keyspace.

#08 75% ,  #09 82% ,  #10 00% ,  #11 13% ,  #12 31% ,  #13 27% ,  #14 29% ,  #15 64% ,
#16 57% ,  #17 46% ,  #18 52% ,  #19 36% ,  #20 65% ,  #21 73% ,  #22 43% ,  #23 33% ,
#24 72% ,  #25 98% ,  #26 63% ,  #27 67% ,  #28 70% ,  #29 49% ,  #30 92% ,  #31 96% ,
#32 44% ,  #33 66% ,  #34 65% ,  #35 17% ,  #36 23% ,  #37 46% ,  #38 07% ,  #39 18% ,
#40 83% ,  #41 33% ,  #42 32% ,  #43 68% ,  #44 75% ,  #45 14% ,  #46 46% ,  #47 70% ,
#48 36% ,  #49 45% ,  #50 09% ,  #51 83% ,  #52 87% ,  #53 50% ,  #54 11% ,  #55 67% ,
#56 23% ,  #57 92% ,  #58 39% ,  #59 82% ,  #60 97% ,  #61 24% ,   

He is the resulting histogram (10 bins) which display how these keys are distributed

   0% -  10%        ∎∎∎
 10% -  20%        ∎∎∎∎∎
 20% -  30%        ∎∎∎∎∎
 30% -  40%        ∎∎∎∎∎∎∎
 40% -  50%        ∎∎∎∎∎∎∎
 50% -  60%        ∎∎∎
 60% -  70%        ∎∎∎∎∎∎∎∎
 70% -  80%        ∎∎∎∎∎∎
 80% -  90%        ∎∎∎∎∎
 90% - 100%       ∎∎∎∎∎

It looks pretty much uniform, as expected.

What do you think ?


Thanks for the info regarding the "challenge". I was not sure about the right form :-) As to the percentage ranges - I took them personally into account, but I do not plan to base them in my actions, because they would be shots on the basis of statistics, and again complicating my life. It is not known whether now there will be three subsequent addresses had their key in the range of 90-100% .... and maybe even the rest of the keys below 50% :-)
newbie
Activity: 7
Merit: 0
July 19, 2019, 03:22:36 PM
#17
By the way, isn't it kinda scary that a few keys in 80 and 90 bit ranges were already found? Many users have passwords with less bits of security, and passwords also aren't random, so bruteforce can be optimized. Or am I missing something, and those keys were cracked with some algorithm rather than brute force?

if you want to have fun, you can program something. i did that a while ago in c# for small ones as a "challenge" to my skills knowing there is no other reward.

So, I did it and it takes 2.5 ms for me to calculate an address from a raw private key  Cry

They were bruteforced it just so happened that they were found, it's luck, just someone started close enought. There are different algos for password cracking words-list attacks for example. There's a way this puzzle is usefull, for one it proves there's no time travelers, for two it shows how secure bitcoin and other 256 bit keys are. I would choose not to generate addresses at all just sweep all the range that you go by, it would save time.
legendary
Activity: 3024
Merit: 2148
July 19, 2019, 03:08:23 PM
#16
By the way, isn't it kinda scary that a few keys in 80 and 90 bit ranges were already found? Many users have passwords with less bits of security, and passwords also aren't random, so bruteforce can be optimized. Or am I missing something, and those keys were cracked with some algorithm rather than brute force?

if you want to have fun, you can program something. i did that a while ago in c# for small ones as a "challenge" to my skills knowing there is no other reward.

So, I did it and it takes 2.5 ms for me to calculate an address from a raw private key  Cry
newbie
Activity: 7
Merit: 0
July 19, 2019, 01:27:39 PM
#15
It's funny and irony, a programmer offers their services or software to crack bitcoins with some money. So why don't they crack Bitcoin themselves, I'm sure those crack software makers will get more profits.

They might not have enough hardware (or money for said hardware, don't you need in the order of terabytes of memory at this point?) to grab the remaining keys so they're better off selling the software.
Isn't it better to just give the code but have some % of the profit? Even so, when you get a code for finding private keys you gotta check it a few times to not get dumped, cuz it might be listening for you to find it, and then sweep the key to the maker of the software before you manage to do it. This "challenge" might be a great opportunity for making a botnet search for keys.
legendary
Activity: 3472
Merit: 1722
July 19, 2019, 01:19:25 PM
#14
It's funny and irony, a programmer offers their services or software to crack bitcoins with some money. So why don't they crack Bitcoin themselves, I'm sure those crack software makers will get more profits.

They might not have enough hardware (or money for said hardware, don't you need in the order of terabytes of memory at this point?) to grab the remaining keys so they're better off selling the software.
newbie
Activity: 43
Merit: 0
July 19, 2019, 06:24:04 AM
#13
This code is so valuable I doubt anyone will just opensource it. And it's far from easy to write, as someone said there is probably only a handful working ones out there.

The same could be said about bruteforce code. Many years there was only crappy and slow LBC, then I payed a rather modest $450 to freelancer to fund opensource vanitygen fork.
In the same time Bitcrack was already done and also opensource, just not popular.

In result, as I can see, author of Bitcrack was donated several times with 0.1 BTC. That's better than nothing (a doubt he could use same resources as zielar)

There are few people involved in the puzzle that have resources, knowledge in programming and also "cracked" more or less puzzle addresses, so they have also money but they don`t want to share the tools like Pollard kangaroo script or other.
Like our world works, the power is in the hands of the few.

Later EDIT: Some guy asked me 0.30BTC for Pollard gpu script. Is more expensive than my car so I'll say pas Smiley
jr. member
Activity: 115
Merit: 1
July 19, 2019, 01:47:06 AM
#12
This code is so valuable I doubt anyone will just opensource it. And it's far from easy to write, as someone said there is probably only a handful working ones out there.

The same could be said about bruteforce code. Many years there was only crappy and slow LBC, then I payed a rather modest $450 to freelancer to fund opensource vanitygen fork.
In the same time Bitcrack was already done and also opensource, just not popular.

In result, as I can see, author of Bitcrack was donated several times with 0.1 BTC. That's better than nothing (a doubt he could use same resources as zielar)
member
Activity: 245
Merit: 17
July 18, 2019, 06:00:23 PM
#11
Some statistics

format #n x%    --> n is case #n and x is how far in % is the key from the lower bound of the corresponding keyspace.

#08 75% ,  #09 82% ,  #10 00% ,  #11 13% ,  #12 31% ,  #13 27% ,  #14 29% ,  #15 64% ,
#16 57% ,  #17 46% ,  #18 52% ,  #19 36% ,  #20 65% ,  #21 73% ,  #22 43% ,  #23 33% ,
#24 72% ,  #25 98% ,  #26 63% ,  #27 67% ,  #28 70% ,  #29 49% ,  #30 92% ,  #31 96% ,
#32 44% ,  #33 66% ,  #34 65% ,  #35 17% ,  #36 23% ,  #37 46% ,  #38 07% ,  #39 18% ,
#40 83% ,  #41 33% ,  #42 32% ,  #43 68% ,  #44 75% ,  #45 14% ,  #46 46% ,  #47 70% ,
#48 36% ,  #49 45% ,  #50 09% ,  #51 83% ,  #52 87% ,  #53 50% ,  #54 11% ,  #55 67% ,
#56 23% ,  #57 92% ,  #58 39% ,  #59 82% ,  #60 97% ,  #61 24% ,   

He is the resulting histogram (10 bins) which display how these keys are distributed

   0% -  10%        ∎∎∎
 10% -  20%        ∎∎∎∎∎
 20% -  30%        ∎∎∎∎∎
 30% -  40%        ∎∎∎∎∎∎∎
 40% -  50%        ∎∎∎∎∎∎∎
 50% -  60%        ∎∎∎
 60% -  70%        ∎∎∎∎∎∎∎∎
 70% -  80%        ∎∎∎∎∎∎
 80% -  90%        ∎∎∎∎∎
 90% - 100%       ∎∎∎∎∎

It looks pretty much uniform, as expected.

What do you think ?

member
Activity: 245
Merit: 17
July 18, 2019, 04:12:40 PM
#10
 Hi zielar  is it too late for correctly spelling  "challange" , which should be "challenge" Smiley
legendary
Activity: 2646
Merit: 1137
All paid signature campaigns should be banned.
July 18, 2019, 11:26:49 AM
#9
Well, unfortunately - options to delete posts in their own topics are missing.
Yes, unfortunately you have to select "moderated topic" at the time you create the thread and you cannot change it after the tread is created.
full member
Activity: 282
Merit: 114
July 18, 2019, 11:01:41 AM
#8
Thanks for starting and maintaining this thread.  Too bad you did not make it moderated so you could remove all the crap posts.  +Merit

Note you could switch your "table" in the OP to a fixed width font so it will all line up better by putting it in a "code" block like this:

Code:
This is a fixed width font
So everything will line up
nicely

Also, to avoid confusion I would remove the word "prize" from your subject and all references in the OP.

Thanks for your positive opinion about my work. I made a few changes based on your suggestions. Well, unfortunately - options to delete posts in their own topics are missing.
legendary
Activity: 2646
Merit: 1137
All paid signature campaigns should be banned.
July 18, 2019, 08:51:27 AM
#7
Thanks for starting and maintaining this thread.  Too bad you did not make it moderated so you could remove all the crap posts.  +Merit

Note you could switch your "table" in the OP to a fixed width font so it will all line up better by putting it in a "code" block like this:

Code:
This is a fixed width font
So everything will line up
nicely

Also, to avoid confusion I would remove the word "prize" from your subject and all references in the OP.
Pages:
Jump to: