Pages:
Author

Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED== - page 35. (Read 47899 times)

member
Activity: 255
Merit: 27
if scan all it use a time too much

Depent of your speed, i made some calculations based on the speed, the time is for scan all the range in that bit space:

Code:
Puzzle 120 @ 1 Terakeys/s :     21074771622667996 years
Puzzle 120 @ 1 Petakeys/s :     21074771622667 years
Puzzle 120 @ 1 Exakeys/s :      21074771622 years
Puzzle 120 @ 1 Zettakeys/s :    21074771 years
Puzzle 120 @ 1 Yottakeys/s :    21074 years
Puzzle 160 @ 1 Terakeys/s :     23171956451847141650870193314 years
Puzzle 160 @ 1 Petakeys/s :     23171956451847141650870193 years
Puzzle 160 @ 1 Exakeys/s :      23171956451847141650870 years
Puzzle 160 @ 1 Zettakeys/s :    23171956451847141650 years
Puzzle 160 @ 1 Yottakeys/s :    23171956451847141 years
Puzzle 256 @ 1 Terakeys/s :     1835871531540401373407708412745559168131740612197318060720 years
Puzzle 256 @ 1 Petakeys/s :     1835871531540401373407708412745559168131740612197318060 years
Puzzle 256 @ 1 Exakeys/s :      1835871531540401373407708412745559168131740612197318 years
Puzzle 256 @ 1 Zettakeys/s :    1835871531540401373407708412745559168131740612197 years
Puzzle 256 @ 1 Yottakeys/s :    1835871531540401373407708412745559168131740612 years

I know there is no puzzle 256, but that is the exact time for the real wallets.


With Pollard / Rho we calculate:

Code:
Puzzle 120 @ 1 Terakeys/s :     ~ 10 days
Puzzle 120 @ 1 Yottakeys/s :    < 1 sec

Puzzle 160 @ 1 Terakeys/s :     ~ 27107 years
Puzzle 160 @ 1 Yottakeys/s :    < 1 sec

Puzzle 256 @ 1 Yottakeys/s :    10790283 years (real addresses)

We can see here, how important a high keyrate is.

How much is 1 Yottakeys/s for (Pollard / Rho) ?
copper member
Activity: 75
Merit: 11
if scan all it use a time too much

Depent of your speed, i made some calculations based on the speed, the time is for scan all the range in that bit space:

Code:
Puzzle 120 @ 1 Terakeys/s :     21074771622667996 years
Puzzle 120 @ 1 Petakeys/s :     21074771622667 years
Puzzle 120 @ 1 Exakeys/s :      21074771622 years
Puzzle 120 @ 1 Zettakeys/s :    21074771 years
Puzzle 120 @ 1 Yottakeys/s :    21074 years
Puzzle 160 @ 1 Terakeys/s :     23171956451847141650870193314 years
Puzzle 160 @ 1 Petakeys/s :     23171956451847141650870193 years
Puzzle 160 @ 1 Exakeys/s :      23171956451847141650870 years
Puzzle 160 @ 1 Zettakeys/s :    23171956451847141650 years
Puzzle 160 @ 1 Yottakeys/s :    23171956451847141 years
Puzzle 256 @ 1 Terakeys/s :     1835871531540401373407708412745559168131740612197318060720 years
Puzzle 256 @ 1 Petakeys/s :     1835871531540401373407708412745559168131740612197318060 years
Puzzle 256 @ 1 Exakeys/s :      1835871531540401373407708412745559168131740612197318 years
Puzzle 256 @ 1 Zettakeys/s :    1835871531540401373407708412745559168131740612197 years
Puzzle 256 @ 1 Yottakeys/s :    1835871531540401373407708412745559168131740612 years

I know there is no puzzle 256, but that is the exact time for the real wallets.


With Pollard / Rho we calculate:

Code:
Puzzle 120 @ 1 Terakeys/s :     ~ 10 days
Puzzle 120 @ 1 Yottakeys/s :    < 1 sec

Puzzle 160 @ 1 Terakeys/s :     ~ 27107 years
Puzzle 160 @ 1 Yottakeys/s :    < 1 sec

Puzzle 256 @ 1 Yottakeys/s :    10790283 years (real addresses)

We can see here, how important a high keyrate is.
full member
Activity: 277
Merit: 106
larocfra: please download the application available there from https://www.thegrideon.com/bitcoin-password-recovery.html (whether portable or installer). After running it, you will see the available devices at the bottom of the log window, among which the CU value will be in square brackets next to the GPU. The CU value will be the best value for your card as -b in cuBitCrack, set -t to 512. Now check what effect and show it off. All you need to do now is try to find the best -p value

It's the first time I've seen a third-party (Thegrideon in this case) try to sell a wallet.dat cracker. I also haven't seen many people working on crackers for some time, so I'm a little surprised that their cracker has all these listed features: "mixed, dictionary and brute-force methods", "SSE, AVX optimization", AMD and NVIDIA card support out of the box which implies that the program has both a CUDA and OpenCL kernel.

Consequently, this makes me think they just bundled hashcat in their program with a little .NET wrapper for the GUI, no?

If that's true, it would mean the CU value might also be printed by hashcat proper. I've only paid attention to hashcat speeds, not CUs so I don't remember if they are logged too.

Truth. Hashcat will also give you the CU value, but I suggested it earlier, because getting this value would only involve downloading the program and running it :-) Much earlier I found this option and I already suggested this method to interested people, because it is the simplest, and the value of cu = value -b and better than this setting you won't find.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
larocfra: please download the application available there from https://www.thegrideon.com/bitcoin-password-recovery.html (whether portable or installer). After running it, you will see the available devices at the bottom of the log window, among which the CU value will be in square brackets next to the GPU. The CU value will be the best value for your card as -b in cuBitCrack, set -t to 512. Now check what effect and show it off. All you need to do now is try to find the best -p value

It's the first time I've seen a third-party (Thegrideon in this case) try to sell a wallet.dat cracker. I also haven't seen many people working on crackers for some time, so I'm a little surprised that their cracker has all these listed features: "mixed, dictionary and brute-force methods", "SSE, AVX optimization", AMD and NVIDIA card support out of the box which implies that the program has both a CUDA and OpenCL kernel.

Consequently, this makes me think they just bundled hashcat in their program with a little .NET wrapper for the GUI, no?

If that's true, it would mean the CU value might also be printed by hashcat proper. I've only paid attention to hashcat speeds, not CUs so I don't remember if they are logged too.
full member
Activity: 277
Merit: 106
Thank You for the link, I am under linux not windows. I have compiled the cuBitCrack for linux.

so try "cuBitCrack -l" oraz "cuBitCrack --list" for check CU. Maybe that command show you you ComputeUnits value
newbie
Activity: 32
Merit: 0
Thank You for the link, I am under linux not windows. I have compiled the cuBitCrack for linux.
full member
Activity: 277
Merit: 106
Third column: bounty wallet address which is officially known from the Blockchain transaction available here: https://www.blockchain.com/btc/tx/08389f34c98c606322740c0be6a7125d9860bb8d5cb182c02f98461e5fa6cd15
Unless you mean the fourth: the upper rank limit. It's simple ... each subsequent rank is 2 ^ n-1 and the result of this equation is the value of the fourth column in DECIMAL

larocfra: please download the application available there from https://www.thegrideon.com/bitcoin-password-recovery.html (whether portable or installer). After running it, you will see the available devices at the bottom of the log window, among which the CU value will be in square brackets next to the GPU. The CU value will be the best value for your card as -b in cuBitCrack, set -t to 512. Now check what effect and show it off. All you need to do now is try to find the best -p value
newbie
Activity: 32
Merit: 0
Hi everybody,

I currently trying to solve the number 64 key, I have a Nvidia K80 water cooled and I am running cuBitCrack -b 88 -t 1024 -p 1024 -c -o foundkey.txt --keyspace 8000000000000000:FFFFFFFFFFFFFFFF

I have to run 2 separate session to be able to use both GPU on the card, I am getting 121.36 MKey/s on one target so about 240.00 Mkey/s total.

Do anybody have a setting to get more MKey/s out of the card ?
full member
Activity: 277
Merit: 106
For the last two months - a large part of the text in the main post was invisible because it led to the server that was changed, which, combined with the fact that almost the entire topic is mainly composed of pictures (which I did due to the limitation of the number of characters in the post) - resulted in that's as mentioned above. This problem has already been fixed, and I will revive the topic by the way :-)
member
Activity: 406
Merit: 45
120
https://blockchain.info/q/pubkeyaddr/17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT

same just change address and see pubkey, if address had outgoing transaction

I really wanted it to work with number 64 but it is only possible when there is an exit.  Grin

64
https://blockchain.info/q/pubkeyaddr/16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN

pubkey is expose when that address make transaction pay out

address 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN not yet use for payout so pubkey not expose

address 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT already payout to other address is available pubkey expose

other way you can brute-force pubkey but pubkey  is long 34 alphanumeric characters  no body do this because  brute-force to private key directly is better if you do is double work for pubkey and still do with private key again it is waste of time
member
Activity: 406
Merit: 45
120
https://blockchain.info/q/pubkeyaddr/17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT

same just change address and see pubkey, if address had outgoing transaction

I really wanted it to work with number 64 but it is only possible when there is an exit.  Grin

64
https://blockchain.info/q/pubkeyaddr/16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN

pubkey is expose when that address make transaction pay out

address 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN not yet use for payout so pubkey not expose

address 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT already payout to other address is available pubkey expose
newbie
Activity: 24
Merit: 0
120
https://blockchain.info/q/pubkeyaddr/17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT

same just change address and see pubkey, if address had outgoing transaction

I really wanted it to work with number 64 but it is only possible when there is an exit.  Grin

64
https://blockchain.info/q/pubkeyaddr/16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN
member
Activity: 316
Merit: 34
120
https://blockchain.info/q/pubkeyaddr/17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT

same just change address and see pubkey, if address had outgoing transaction
sr. member
Activity: 443
Merit: 350
-snip-
sorry for posting on this old post. i want to ask where you get the public keys for the 120 key from?

The creator made outgoing transactions from the addresses divided by 5 (..,100,105,110,115,120,125,... 160)
So, you can find the public key in blockchain: https://www.blockchain.com/btc/tx/17e4e323cfbc68d7f0071cad09364e8193eedf8fefbcbd8a21b4b65717a4b3d3?page=3

See the Index 11 (as outgoing transaction for 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT), and you will find the public key in SigSciprt (use ASM format for better understanding)

full member
Activity: 637
Merit: 131
newbie
Activity: 24
Merit: 0
here are as many public keys as possible.

#120 ( 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT )
800000000000000000000000000000
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
02CEB6CBBCDBDF5EF7150682150F4CE2C6F4807B349827DCDBDD1F2EFA885A2630

#125 ( 1PXAyUB8ZoH3WD8n5zoAthYjN15yN5CVq5 )
10000000000000000000000000000000
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
0233709EB11E0D4439A729F21C2C443DEDB727528229713F0065721BA8FA46F00E

#130 ( 1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua )
200000000000000000000000000000000
3FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
03633CBE3EC02B9401C5EFFA144C5B4D22F87940259634858FC7E59B1C09937852

#135 ( 16RGFo6hjq9ym6Pj7N5H7L1NR1rVPJyw2v )
4000000000000000000000000000000000
7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
02145D2611C823A396EF6712CE0F712F09B9B4F3135E3E0AA3230FB9B6D08D1E16

#140 ( 1QKBaU6WAeycb3DbKbLBkX7vJiaS8r42Xo )
80000000000000000000000000000000000
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
031F6A332D3C5C4F2DE2378C012F429CD109BA07D69690C6C701B6BB87860D6640

#145 ( 19GpszRNUej5yYqxXoLnbZWKew3KdVLkXg )
1000000000000000000000000000000000000
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
03AFDDA497369E219A2C1C369954A930E4D3740968E5E4352475BCFFCE3140DAE5

#150 ( 1MUJSJYtGPVGkBCTqGspnxyHahpt5Te8jy )
20000000000000000000000000000000000000
3FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
03137807790EA7DC6E97901C2BC87411F45ED74A5629315C4E4B03A0A102250C49

#155 ( 1AoeP37TmHdFh8uN72fu9AqgtLrUwcv2wJ )
400000000000000000000000000000000000000
7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
035CD1854CAE45391CA4EC428CC7E6C7D9984424B954209A8EEA197B9E364C05F6

#160 ( 1NBC8uXJy1GiJ6drkiZa1WuKn51ps7EPTv )
8000000000000000000000000000000000000000
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
02E0A8B039282FAF6FE0FD769CFBC4B6B4CF8758BA68220EAC420E32B91DDFA673

you can use Kangaroo 2.2 to try to find private keys: https://github.com/JeanLucPons/Kangaroo
full member
Activity: 431
Merit: 105
thanks so much,

That is Ok, C can work with correctly if you want remove the warning you can write this:

Code:
sscanf(&seed[2 * i], "%02X",(unsigned int *)( &my1ch)); 

this above part, made that warning go away, but i have a lot of undeclared identifiers?
Severity            Code   Description                                                                           Project           File           Line   Suppression State

Error   C2065   'seed': undeclared identifier                                                                   VanitySearch   main.cpp   156   

Error   C2447   '{': missing function header (old-style formal list?)                                   VanitySearch   vanity.cpp   946   

Error   C4430   missing type specifier - int assumed. Note: C++ does not support default-int   VanitySearch     vanity.cpp   983   

and some other

error C2143: syntax error: missing ';' before '}'
error C2143: syntax error: missing ';' before '{'

your first solution worked flawless btw. thanks again

What exactly are you trying to do? Which program are you trying to tweak and what are you wanting it to do? If you tell me, I can help, if it's dealing with any of the VanitySearch programs
[/quote]

Severity   Code   Description   Project   File   Line   Suppression State
Error   C2065   'seed': undeclared identifier   VanitySearch   main.cpp   185  

3 errors, otherwise build successfull. but now not,

 "%02X",(unsigned int *)( &my1ch)); i added this

so instead, sscanf(&seed[2 * i], "%02X",(unsigned int *)( &my1ch));

instead of the original.          sscanf(&seed[2 * i], "%02X", &my1ch);

otherwise nogo? with or without unsigned int*)
using visual studio 2017, sdk 10.0.19041.0 (v141)
thanks

i compiled it fully, with a few add's some changes that's all.
        unsigned char my1ch = 0;
        sscanf(&seed[2 * i], "%02X", (unsigned int *)(&my1ch));

the line above sscanf has got the same unsigned char but needed unsigned int those 2 fixed thanks guys sorry for all those questions..

h
newbie
Activity: 49
Merit: 0
what are you doing with repetitions in random?
do you make a base with ready keyspaces to check that you checked it already?

This is my python script for searching puzzle 64 it's generating an .bat file with  random keyspace between puzzle64 keyrange. I'm using vanity + bitcrack

Code:
# Xh0st Keyspace Puzzle 64 Random
# Made by Andrei Melek

import random

file = open('random.bat', 'w')


file.write(":while1" + '\n')
for x in range(100000):
             
    low  = 0x80000000000
    high = 0xfffffffffff
    val = str ( hex ( random.randrange( low, high ) ) )[2:]
    start = val + "00000"
    end = val + "fffff"
    file.write("start Vanity.exe -o out.txt --keyspace " + start +":" + end + "  16jY7q" + '\n' + "timeout /t 20 /nobreak" + '\n' + "taskkill /im Vanity.exe /f" + '\n' + "timeout /t 1 /nobreak" + '\n')
   
file.close()

just place vanity + bitcrack in the same folder name vanity.exe an run the .bat file

Code:
:while1
start Vanity.exe -o out.txt --keyspace e641fa3965c00000:e641fa3965cfffff  16jY7q
timeout /t 20 /nobreak
taskkill /im Vanity.exe /f
timeout /t 1 /nobreak
start Vanity.exe -o out.txt --keyspace a7de69a79ef00000:a7de69a79effffff  16jY7q
timeout /t 20 /nobreak
taskkill /im Vanity.exe /f
timeout /t 1 /nobreak
start Vanity.exe -o out.txt --keyspace 9c547761d2b00000:9c547761d2bfffff  16jY7q
timeout /t 20 /nobreak
taskkill /im Vanity.exe /f
timeout /t 1 /nobreak

Good luck guys


Pages:
Jump to: