Pages:
Author

Topic: Bitcoin Cipher/puzzle - 0.56 Prize ! Bitcoins [SOLVED] - page 2. (Read 19314 times)

legendary
Activity: 1946
Merit: 1007
A true solution to something is accomplished with only the original data.
Newton, Einstein, Euclid ect... had no hints.

i will post a new hint later on today Smiley just need to prepare it, don't wanna give away to much Smiley

Awaiting for your hints! Cheers!

But there is a difference between problems. This is a user created problem, not one that follows the rules of physics or maths perse.
Also, most people like them are not scrambling for half a bitcoin, but doing more important stuff probably Wink
legendary
Activity: 1148
Merit: 1018
It's about time -- All merrit accepted !!!
A true solution to something is accomplished with only the original data.
Newton, Einstein, Euclid ect... had no hints.

i will post a new hint later on today Smiley just need to prepare it, don't wanna give away to much Smiley

Awaiting for your hints! Cheers!
legendary
Activity: 2282
Merit: 1023
i will post a new hint later on today Smiley just need to prepare it, don't wanna give away to much Smiley

Awaiting for your hints! Cheers!
hero member
Activity: 574
Merit: 500
Call me Alice. just Alice.
i will post a new hint later on today Smiley just need to prepare it, don't wanna give away to much Smiley
legendary
Activity: 1946
Merit: 1007
hey guys, i know it's past the 5th, but my internet is horrible at the moment, (currently moving) i will post a new hint soon !

Any chance to get the hint? This puzzle has really proven to be quite challenging! Much kudo's to you for coming up with it Cheesy
sr. member
Activity: 263
Merit: 250
Well one thing is sure. I'm not a spy. I had a look and I have absolutly no idea what it is or what to do with it.
hero member
Activity: 574
Merit: 500
Call me Alice. just Alice.
hey guys, i know it's past the 5th, but my internet is horrible at the moment, (currently moving) i will post a new hint soon !
legendary
Activity: 1946
Merit: 1007
i have no idea to solve it.
maybe it because i haven't solved a puzzle like that  Huh Huh

Of You read the earlier posts in This thread You can get an idea of the thought process behind solving the steps. You may learn a thing or two also!
sr. member
Activity: 294
Merit: 250
i have no idea to solve it.
maybe it because i haven't solved a puzzle like that  Huh Huh
full member
Activity: 195
Merit: 100
★YoBit.Net★ 200+ Coins Exchange & Dice
i dont really understand with that encryption  Sad
somebody can help me?
full member
Activity: 126
Merit: 100
★777Coin.com★ Fun BTC Casino!
Did we figure out #9 yet? Cause I really want some of this money.
hero member
Activity: 518
Merit: 501
Error 404: there seems to be nothing here.
5 days left till end of puzzle.
I hope the OP is preparing another one.

The Puzzle won't end Smiley Don't worry about that!
member
Activity: 85
Merit: 10
There are 15 missing characters with known letter casing.



Code:
2     1    3     4     5     6     7     8     9     10                
5Juu2 CkB3       EcyH9 dypNh DZ8fX gh6RQ wwbo5     6       E
           AAaAa                               __-_  -^^-^-      




Uc="ABCDEFGHJKLMNPQRSTUVWXYZ123456789" (33 char)
lc="abcdefghijkmnopqrstuvwxyz123456789" (34 char)




try brute forcing this number of keys  
                                                    
(33*33*34*33*34)  * (34*34*33*34) * (34*33*33*34*33*34) * (!9)


And on top of that the casing may change as seen in solved levels.
sr. member
Activity: 392
Merit: 259
Tips welcomed: 1CF4GhXX1RhCaGzWztgE1YZZUcSpoqTbsJ
As for brute forcing it's not fun at all.
And useless anyway at this stage especially if there is a reordering step.

A reordering step isn't bad. A lightly optimized bruteforcer I wrote and was running on an anemic laptop managed to search 70*(10!) private keys for validity (although none were in fact valid).
member
Activity: 85
Merit: 10
The book is a road block for me without it I can't go any further .
I'm in a non English country .
English books are rare in bookshops  over here .
Ordering online take ages to deliver to my country .

As for brute forcing it's not fun at all.
And useless anyway at this stage especially if there is a reordering step.



5 days left till end of puzzle.
I hope the OP is preparing another one.

full member
Activity: 126
Merit: 100
Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Correct.

I know of two approaches to brute force crack a private key if some of the unknown characters are on the end:

Approach #1: Checking against checksum
1. Assemble your guess as a WIF string (base58)
2. Then do a base58_decode which outputs a 1+32+4=37 byte (1 extra byte when compressed but this puzzle has an uncompressed key).
3. Then re-calculate the checksum
4. If it matches, alert, else goto 1.
Chance of a false positive: 1:232

Approach #2: Check against hash160 (this is the way I go)
1. Split your guesses in many batches
2. Assemble the first guess in the batch as a base58 string
3. Then do a base58_decode which outputs a 37 or 38 byte binary
4. Take byte #1 to #32 (counting from #0) and load it into your EC library (yes, you can ignore the checksum here)
5. Do an EC point multiplication p=G*k where p=public key, G=base point and k=your first guess
6. If ripemd160(sha256(p)) matches target, alert and stop
7. Do an EC point addition p=p+G and goto 6. until 58n/232 repetitions has been made. n is the number of characters missing at the end
8. Open a new batch and goto 2

Approach #2 has advantages if #10 is unknown because large parts of #10 are sitting in the checksum. When directly dealing with the internal binary representation of the private key using EC math, you're "skipping" all possible invalid WIF private key combinations at once.
Approach #1 could be the better choice if you're sure that you have #10 correct.

Currently I don't do any bruteforce anymore because I ran out of ideas for #9. As soon I get new clues, I'll resume my bruteforce.


Note:
Some peoples asked for code (here/PM):
I'm handing out this hint for free but you have to do the coding work yourself. I'm fearing getting deanonymized if uploading my code here because it heavyly relies on code from other projects made by me.

as a normal person who just tried reading that "woooow" Shocked Shocked Shocked
hero member
Activity: 518
Merit: 501
Error 404: there seems to be nothing here.
Finally some free time  Cheesy

Starting to work onto it  Cool Cool
jr. member
Activity: 38
Merit: 2
Another hint for combatants who are struggling like me: most of the chars in #10 are sitting in the checksum part of the B58 private key.
I'm looking at https://en.bitcoin.it/wiki/Wallet_import_format and don't see you can take advantage of that fact.
Don't you have to decode the base58 first before you can remove the 4 byte checksum?
Correct.

I know of two approaches to brute force crack a private key if some of the unknown characters are on the end:

Approach #1: Checking against checksum
1. Assemble your guess as a WIF string (base58)
2. Then do a base58_decode which outputs a 1+32+4=37 byte (1 extra byte when compressed but this puzzle has an uncompressed key).
3. Then re-calculate the checksum
4. If it matches, alert, else goto 1.
Chance of a false positive: 1:232

Approach #2: Check against hash160 (this is the way I go)
1. Split your guesses in many batches
2. Assemble the first guess in the batch as a base58 string
3. Then do a base58_decode which outputs a 37 or 38 byte binary
4. Take byte #1 to #32 (counting from #0) and load it into your EC library (yes, you can ignore the checksum here)
5. Do an EC point multiplication p=G*k where p=public key, G=base point and k=your first guess
6. If ripemd160(sha256(p)) matches target, alert and stop
7. Do an EC point addition p=p+G and goto 6. until 58n/232 repetitions has been made. n is the number of characters missing at the end
8. Open a new batch and goto 2

Approach #2 has advantages if #10 is unknown because large parts of #10 are sitting in the checksum. When directly dealing with the internal binary representation of the private key using EC math, you're "skipping" all possible invalid WIF private key combinations at once.
Approach #1 could be the better choice if you're sure that you have #10 correct.

Currently I don't do any bruteforce anymore because I ran out of ideas for #9. As soon I get new clues, I'll resume my bruteforce.


Note:
Some peoples asked for code (here/PM):
I'm handing out this hint for free but you have to do the coding work yourself. I'm fearing getting deanonymized if uploading my code here because it heavyly relies on code from other projects made by me.
hero member
Activity: 560
Merit: 500
The intellegence in this thread intimidates me lol.

then head over to the speculation forum, the blind predictions will recoup your intellectualism
legendary
Activity: 1946
Merit: 1007
The intellegence in this thread intimidates me lol.

Quite a few of the puzzles are also just taking a step back and looking carefully. The ISBN number for instance, if you took notice of the numbers on the books you read, it was easy to spot where to look. The same goes for the morse code.

I agree though, some of the puzzles went way over my head too Wink
Pages:
Jump to: