Pages:
Author

Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED== - page 19. (Read 47899 times)

jr. member
Activity: 50
Merit: 1
1 Ekeys/s (1021708069969158067 keys/s)

1.021.708.069.969.158.067 keys/s

128gb + 16 AMD Ryzen 7 5800X


Code:
ubuntu@:~/kknd/keyhunt$ ./keyhunt -m bsgs -f 125.pub -b 125 -R -q -S -n 0x400000000000 -k 4096 -t 15
[+] Version 0.2.230428 Satoshi Quest, developed by AlbertoBSD
[+] Random mode
[+] Quiet thread output
[+] K factor 4096
[+] Threads : 15
[+] Mode BSGS random
[+] Opening file 125.pub
[+] Added 1 points from file
[+] Bit Range 125
[+] -- from : 0x10000000000000000000000000000000 [+] -- to   : 0x20000000000000000000000000000000
[+] N = 0x400000000000
[+] Bloom filter for 34359738368 elements : 117781.20 MB
[+] Bloom filter for 1073741824 elements : 3680.66 MB
[+] Bloom filter for 33554432 elements : 115.02 MB
[+] Allocating 512.00 MB for 33554432 bP Points
[+] Reading bloom filter from file keyhunt_bsgs_4_34359738368.blm .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_6_1073741824.blm .... Done!
[+] Reading bP Table from file keyhunt_bsgs_2_33554432.tbl .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_7_33554432.blm .... Done!
[+] Total 82543794972808280276992 keys in 80790 seconds: ~1 Ekeys/s (1021708069969158067 keys/s)



Code:
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5800X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     enabled
    CPU max MHz:         3800.0000
    CPU min MHz:         2200.0000
    BogoMIPS:            7586.05


this is a rented gpu on vast running on cuda ubunto ?
full member
Activity: 1078
Merit: 219
Shooters Shoot...
Hello, I am new to the pool. Can you tell me why there are several addresses in the range txt file when searching in the ttd pool?
Those extra addresses are PoW addresses...Proof of Work addresses. It is to ensure your machine checked the range it was assigned/said it checked.

So in the file you will have the target address: 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so

And if you keep settings normal and just check 1 40-bit range at a time, you will have the target address and 1 PoW address.

If you check the max range at once, 44-bit range, you will have the target address plus 16 PoW addresses.
newbie
Activity: 2
Merit: 0
Hello, I am new to the pool. Can you tell me why there are several addresses in the range txt file when searching in the ttd pool?
full member
Activity: 1078
Merit: 219
Shooters Shoot...
Quote
  Results of RTX4090 is something of beautiful ! But, what do you mean when you say 7.7 Gkey/s?

Because what I understand is that you anaylize and execute 7.7 Ghash/sec of ripemd160(sha256(publickeycompressed(privatekey)), is it right?

No, I wish we could get that speed, then #66 would be in reach!

Remember, in Kangaroo, we are looking for distinguished points of the x point. So to keep it simple, it’s publickey(privatekey) and check for x amount of trailing distinguished points (could be leading DPs as well).
The more complicated are the jumps but really it’s a set stride(s) that all Kangaroos follow…a path of sorts, until a wild one lands on a tame one.

The wilds require one extra calculation but it’s either one more step of adding or subtracting, based on your version of Kangaroo.
legendary
Activity: 1582
Merit: 1196
Reputation first.
I always like numbers!
First, what is this modified kangaroo program?
Verified that a 3090 gets 4.8G Key/s

This is not JeanLucPons version of Kangaroo
this have a lot of unnecessary checks that slow down the process.

The plain cuda version of secp256k1 and several optimize changes have this speed.

RTX 3070 with power limit 170w 2.4 GKey/s  GPU Ram Usage 3.5GB
RTX 3090 with power limit 350w 4.8 GKey/s  GPU Ram Usage 8.0GB

And one dedicated server for check
have 32GB RAM ( 8gb+ ram need for bloom filters )
~140Gb of nvme used for kvrocks storage for store 2^31.10 of DP32
or 35Gb if use DP34

ps4all. Possibly I'll find time for compare if you have dp's (or work file fromJeanLucPons Kangaroo ) for still determine 120 and check wild/tame and later
(in compared dp's included buyed from zielar)

But i rarely come here.
This had me racking my brain and relooking at kangaroo code for the past week and a half.
But after many trials and errors, I have figured it out. Or at least one way to increase speed using kangaroo.

I'm not one to BS on here.

The speeds posted above could be true because my results are even better!!

RTX 3060 (non Ti) = 2,400 MKey/s (2.4GKey/s)
RTX 3600 Ti = 2,800 MKey/s (2.8GKey/s)
RTX 3070  = 3,100 MKey/s (3.1GKey/s)
RTX 3090 = 5,250 MKey/s (5.2GKey/s)

and

RTX 4090 = 7,750 MKey/s (7.7 GKey/s) (yes, you read that right lol)

But in the end, doesn't really matter lol. There is no community here to help break records and earn some coinage. Just a few people doing their own thing.
I plan on setting something up that members can participate in, but not a pool again...next time, if you want to play, you will pay. This cuts out a lot of people who aren't committed, try attacking your server, ect.
If no one participates, that's cool too...I will definitely keep on grinding.


Results of RTX4090 is something of beautiful ! But, what do you mean when you say 7.7 Gkey/s?

Because what I understand is that you anaylize and execute 7.7 Ghash/sec of ripemd160(sha256(publickeycompressed(privatekey)), is it right?

copper member
Activity: 1330
Merit: 899
🖤😏
So, I have had several discoveries while I was messing around the things I really don't understand "yet", and I would like to share them with you all, knowledge should be shared.

First, finding the k inverse, easy as subtracting your k from N, and distance between your k and your -k is 200% +1 or - 1, lol.
Subtracting your x from itself will actually double your k.
Adding to your -x is actually subtracting from your x.
Subtracting too much, a value greater than your k from your p will actually add the difference to your k, example: subtracting in decimal, 60 from p(k50) will add 10 to your k which in this case you will see p(k60), though this one is an exception, if you add 10 to your k and then subtract your k from this new k, you will see p(k10), which is totally useless  and disappointing. Lol.

*And snag! Sharing more than this is actually unwise as it will help breaking elliptic curve cryptography.


*= trying to sound knowledgeable while I understand 0.🤣
full member
Activity: 1078
Merit: 219
Shooters Shoot...
I always like numbers!
First, what is this modified kangaroo program?
Verified that a 3090 gets 4.8G Key/s

This is not JeanLucPons version of Kangaroo
this have a lot of unnecessary checks that slow down the process.

The plain cuda version of secp256k1 and several optimize changes have this speed.

RTX 3070 with power limit 170w 2.4 GKey/s  GPU Ram Usage 3.5GB
RTX 3090 with power limit 350w 4.8 GKey/s  GPU Ram Usage 8.0GB

And one dedicated server for check
have 32GB RAM ( 8gb+ ram need for bloom filters )
~140Gb of nvme used for kvrocks storage for store 2^31.10 of DP32
or 35Gb if use DP34

ps4all. Possibly I'll find time for compare if you have dp's (or work file fromJeanLucPons Kangaroo ) for still determine 120 and check wild/tame and later
(in compared dp's included buyed from zielar)

But i rarely come here.
This had me racking my brain and relooking at kangaroo code for the past week and a half.
But after many trials and errors, I have figured it out. Or at least one way to increase speed using kangaroo.

I'm not one to BS on here.

The speeds posted above could be true because my results are even better!!

RTX 3060 (non Ti) = 2,400 MKey/s (2.4GKey/s)
RTX 3600 Ti = 2,800 MKey/s (2.8GKey/s)
RTX 3070  = 3,100 MKey/s (3.1GKey/s)
RTX 3090 = 5,250 MKey/s (5.2GKey/s)

and

RTX 4090 = 7,750 MKey/s (7.7 GKey/s) (yes, you read that right lol)

But in the end, doesn't really matter lol. There is no community here to help break records and earn some coinage. Just a few people doing their own thing.
I plan on setting something up that members can participate in, but not a pool again...next time, if you want to play, you will pay. This cuts out a lot of people who aren't committed, try attacking your server, ect.
If no one participates, that's cool too...I will definitely keep on grinding.
jr. member
Activity: 59
Merit: 1
So I was thinking about a new method, I call it GPS tracking, it simply uses triangulation tactic to pinpoint the location of the key. The question though, how do I derive the key given not 3 but 9 interconnected values? I have the mutual distances between several keys, I have tried at least 50 combinations and all lead to dead end, but I know there is a way to estimate the closest location coordinates of the key I'm looking for.


For example, if I know the distances between 3 objects,  I should be able to determine the nearest point to at least one of them, right?

Nope, no pattern, so the "triangulation" method is useless, you can fin some collision with almost 10 chars, and guess what? in a near area of 2^40 or maybe more, you will fine nothing.

 Grin
copper member
Activity: 1330
Merit: 899
🖤😏
So I was thinking about a new method, I call it GPS tracking, it simply uses triangulation tactic to pinpoint the location of the key. The question though, how do I derive the key given not 3 but 9 interconnected values? I have the mutual distances between several keys, I have tried at least 50 combinations and all lead to dead end, but I know there is a way to estimate the closest location coordinates of the key I'm looking for.


For example, if I know the distances between 3 objects,  I should be able to determine the nearest point to at least one of them, right?
full member
Activity: 277
Merit: 106
-snip-
2023-04-16 - The creator of the challenge paid rounded amounts of BTC to the remaining unguessed addresses - thus increasing the value of the prizes by a total of over 900 BTC. From this moment, for example - the reward value for address 66 is not 0.66BTC but 6.6BTC
-snip-

How do you know the source of the latest 900 btc and say that it was made by the creator? The transaction potentially could lead to the stolen funds...  Huh

Puzzles are an interesting form of challenge from the very beginning. In the meantime, the prize pool has already been increased once... so I don't think anyone stole over 900 btc this time and donated it to raise the prize pool. It is not the purpose of spreading propaganda, but honest information about what is happening in this challenge. If you don't like it, then go elsewhere and don't come up with this nonsense.
member
Activity: 177
Merit: 14
How do you know the source of the latest 900 btc and say that it was made by the creator? The transaction potentially could lead to the stolen funds...  Huh

It was thought to be from the creator of the puzzle because in 2017 he himself promised to increase the puzzle prize by 10x, and yet now after 5 years, the puzzle prize was surprisingly unexpectable increased again by 10x. This should be from the creator himself Satoshi. Even though he didn't announce that himself, like what he did in 2017.
sr. member
Activity: 443
Merit: 350
-snip-
2023-04-16 - The creator of the challenge paid rounded amounts of BTC to the remaining unguessed addresses - thus increasing the value of the prizes by a total of over 900 BTC. From this moment, for example - the reward value for address 66 is not 0.66BTC but 6.6BTC
-snip-

How do you know the source of the latest 900 btc and say that it was made by the creator? The transaction potentially could lead to the stolen funds...  Huh
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
this is not 1 ExaKey/s  this like 1 Exa Compares per seconds

Compare benchmarks and stats are no big deal to be honest, because pretty much all hardware have dedicated paths in the transistors for performing numeric comparisons, so of course it will be much faster if you just measure how many times it runs CMP ... JNZ. Keys calculation on the other hand can not be hardware accelerated with general purpose hardware.

Which leads me to ask, Alberto what loop are you measuring as a key?
full member
Activity: 1078
Merit: 219
Shooters Shoot...

Since you are wanderer your self, you could understand others when they wonder, so I was wondering what happened to your newly improved version of kangaroo/bsgs tool? A good dev always shares the best of his work with the world😉, we'll keep on waiting!
I thought I had said what had happened was…I could not figure out the stride function for GPU. Then there was an injection of BTC for the challenge so I took a pause to go through files and search for the Red October. I mimicked it with bitcrack but you lose to much speed to be effective.
member
Activity: 242
Merit: 17

Since you are wanderer your self, you could understand others when they wonder, so I was wondering what happened to your newly improved version of kangaroo/bsgs tool? A good dev always shares the best of his work with the world😉, we'll keep on waiting!

Good point.
copper member
Activity: 1330
Merit: 899
🖤😏

Since you are wanderer your self, you could understand others when they wonder, so I was wondering what happened to your newly improved version of kangaroo/bsgs tool? A good dev always shares the best of his work with the world😉, we'll keep on waiting!
hero member
Activity: 862
Merit: 662
Compares per seconds

Interesting concept, i really like it

Thanks
newbie
Activity: 7
Merit: 5
I would like to understand how it is possible to get that quantity of keys. It is something of really amazing  Shocked
As I read, this software scan 1exakey/s with your hw?

this is not 1 ExaKey/s  this like 1 Exa Compares per seconds

in this screen's 28807259 Keys per seconds compared on 35 467 034 624 elements in bloom filters and have 1021708069969158067  compares/s
really key generate speed is 28.8 MKeys/sec
legendary
Activity: 1582
Merit: 1196
Reputation first.
1 Ekeys/s (1021708069969158067 keys/s)

1.021.708.069.969.158.067 keys/s

128gb + 16 AMD Ryzen 7 5800X


Code:
ubuntu@:~/kknd/keyhunt$ ./keyhunt -m bsgs -f 125.pub -b 125 -R -q -S -n 0x400000000000 -k 4096 -t 15
[+] Version 0.2.230428 Satoshi Quest, developed by AlbertoBSD
[+] Random mode
[+] Quiet thread output
[+] K factor 4096
[+] Threads : 15
[+] Mode BSGS random
[+] Opening file 125.pub
[+] Added 1 points from file
[+] Bit Range 125
[+] -- from : 0x10000000000000000000000000000000 [+] -- to   : 0x20000000000000000000000000000000
[+] N = 0x400000000000
[+] Bloom filter for 34359738368 elements : 117781.20 MB
[+] Bloom filter for 1073741824 elements : 3680.66 MB
[+] Bloom filter for 33554432 elements : 115.02 MB
[+] Allocating 512.00 MB for 33554432 bP Points
[+] Reading bloom filter from file keyhunt_bsgs_4_34359738368.blm .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_6_1073741824.blm .... Done!
[+] Reading bP Table from file keyhunt_bsgs_2_33554432.tbl .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_7_33554432.blm .... Done!
[+] Total 82543794972808280276992 keys in 80790 seconds: ~1 Ekeys/s (1021708069969158067 keys/s)



Code:
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5800X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     enabled
    CPU max MHz:         3800.0000
    CPU min MHz:         2200.0000
    BogoMIPS:            7586.05

I would like to understand how it is possible to get that quantity of keys. It is something of really amazing  Shocked

As I read, this software scan 1exakey/s with your hw?
jr. member
Activity: 32
Merit: 11
1 Ekeys/s (1021708069969158067 keys/s)

1.021.708.069.969.158.067 keys/s

128gb + 16 AMD Ryzen 7 5800X


Code:
ubuntu@:~/kknd/keyhunt$ ./keyhunt -m bsgs -f 125.pub -b 125 -R -q -S -n 0x400000000000 -k 4096 -t 15
[+] Version 0.2.230428 Satoshi Quest, developed by AlbertoBSD
[+] Random mode
[+] Quiet thread output
[+] K factor 4096
[+] Threads : 15
[+] Mode BSGS random
[+] Opening file 125.pub
[+] Added 1 points from file
[+] Bit Range 125
[+] -- from : 0x10000000000000000000000000000000 [+] -- to   : 0x20000000000000000000000000000000
[+] N = 0x400000000000
[+] Bloom filter for 34359738368 elements : 117781.20 MB
[+] Bloom filter for 1073741824 elements : 3680.66 MB
[+] Bloom filter for 33554432 elements : 115.02 MB
[+] Allocating 512.00 MB for 33554432 bP Points
[+] Reading bloom filter from file keyhunt_bsgs_4_34359738368.blm .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_6_1073741824.blm .... Done!
[+] Reading bP Table from file keyhunt_bsgs_2_33554432.tbl .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_7_33554432.blm .... Done!
[+] Total 82543794972808280276992 keys in 80790 seconds: ~1 Ekeys/s (1021708069969158067 keys/s)



Code:
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5800X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     enabled
    CPU max MHz:         3800.0000
    CPU min MHz:         2200.0000
    BogoMIPS:            7586.05
Pages:
Jump to: