Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 276. (Read 229433 times)

full member
Activity: 431
Merit: 105
So hi there 57fe.

when you gonna give you'r not only code away, but somewhat explain with what and how you did it,
you have a compiled version of the app like Telariust has given,

thanks again for the info.
newbie
Activity: 8
Merit: 4
#105 is solved. I'll post the private key later, after learn most significant BTC forks. A checkpoint right now is uncompressed address that corresponds to the same private key: 1JATjHbShdvgkvGHyoRv1vTnEeiibqMVnj.
Thanks very much for the creator of the puzzle! I have learned so many beautiful math at puzzle solving.   
member
Activity: 245
Merit: 17
# 66   20000000000000000 3FFFFFFFFFFFFFFFF
# 67   40000000000000000 7FFFFFFFFFFFFFFFF
# 68   80000000000000000 FFFFFFFFFFFFFFFFF
# 69 100000000000000000 1FFFFFFFFFFFFFFFFF

# 71   400000000000000000 7FFFFFFFFFFFFFFFFF
# 72   800000000000000000  FFFFFFFFFFFFFFFFFF
# 73 1000000000000000000 1FFFFFFFFFFFFFFFFFF
# 74 2000000000000000000 3FFFFFFFFFFFFFFFFFF

# 76   8000000000000000000 FFFFFFFFFFFFFFFFFFF
# 77 10000000000000000000 1FFFFFFFFFFFFFFFFFFF
# 78 20000000000000000000 3FFFFFFFFFFFFFFFFFFF
# 79 40000000000000000000 7FFFFFFFFFFFFFFFFFFF

# 81
# 82
# 83
# 84

# 86
# 87
# 88
# 89

# 91
# 92
# 93
# 94

# 96
# 97
# 98
# 99

# 101  10000000000000000000000000 1FFFFFFFFFFFFFFFFFFFFFFFFF
# 102  20000000000000000000000000 3FFFFFFFFFFFFFFFFFFFFFFFFF
# .....
# 159
# 160

You can do the rest now Wink

Why did you skip 101, 102 etc .. and left only 105 110 115 ...  
jr. member
Activity: 119
Merit: 1
Who can write the supposed keyspace for addresses

# 66 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so
# 67 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9
# 68 1MVDYgVaSN6iKKEsbzRUAYFrYJadLYZvvZ
# 69 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG
# 71 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU
# 72 1JTK7s9YVYywfm5XUH7RNhHJH1LshCaRFR
# 73 12VVRNPi4SJqUTsp6FmqDqY5sGosDtysn4
# 74 1FWGcVDK3JGzCC3WtkYetULPszMaK2Jksv
# 76 1DJh2eHFYQfACPmrvpyWc8MSTYKh7w9eRF
# 77 1Bxk4CQdqL9p22JEtDfdXMsng1XacifUtE
# 78 15qF6X51huDjqTmF9BJgxXdt1xcj46Jmhb
# 79 1ARk8HWJMn8js8tQmGUJeQHjSE7KRkn2t8
# 81 15qsCm78whspNQFydGJQk5rexzxTQopnHZ
# 82 13zYrYhhJxp6Ui1VV7pqa5WDhNWM45ARAC
# 83 14MdEb4eFcT3MVG5sPFG4jGLuHJSnt1Dk2
# 84 1CMq3SvFcVEcpLMuuH8PUcNiqsK1oicG2D
# 86
# 87
# 88
# 89
# 91
# 92
# 93
# 94
# 96
# 97
# 98
# 99
# 105 1CMjscKB3QW7SDyQ4c3C3DEUHiHRhiZVib
# 110 12JzYkkN76xkwvcPT6AWKZtGX6w2LAgsJg
# 115 1NLbHuJebVwUZ1XqDjsAyfTRUPwDQbemfv
# 120 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT
# 125 1PXAyUB8ZoH3WD8n5zoAthYjN15yN5CVq5
# 130 1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua
# 135 16RGFo6hjq9ym6Pj7N5H7L1NR1rVPJyw2v
# 140 1QKBaU6WAeycb3DbKbLBkX7vJiaS8r42Xo
# 145 19GpszRNUej5yYqxXoLnbZWKew3KdVLkXg
# 150 1MUJSJYtGPVGkBCTqGspnxyHahpt5Te8jy
# 155 1AoeP37TmHdFh8uN72fu9AqgtLrUwcv2wJ
# 160 1NBC8uXJy1GiJ6drkiZa1WuKn51ps7EPTv

in this format

# 62 2000000000000000 - 3FFFFFFFFFFFFFFFF
# 63 4000000000000000 - 7FFFFFFFFFFFFFFFFF
# 64 8000000000000000- FFFFFFFFFFFFFFFFF
jr. member
Activity: 138
Merit: 2
Hey guys! I'm getting this error. I got a video card Gefore GTX 760, any clue why this is happening? I tried to change from default 30 ,to 60, to 50, to 90 and nothing is working out. What am I doing wrong??




https://imgur.com/x4Wj4j4

we are not psychics ,what problems to do a full-screen system window ,or at least to lay out the initial command to run this format cuBitCrack.exet -b 32-t 64-p 192 --keyspace 0908adc3872838975ccaebbad7834294786ddae8297
newbie
Activity: 4
Merit: 0
Hey guys! I'm getting this error. I got a video card Gefore GTX 760, any clue why this is happening? I tried to change from default 30 ,to 60, to 50, to 90 and nothing is working out. What am I doing wrong??




https://imgur.com/x4Wj4j4
newbie
Activity: 43
Merit: 0
probably so...

Quote
from bit import Key
from bit.format import bytes_to_wif

...

key1 = Key.from_int(b)
wif = bytes_to_wif(key1.to_bytes(), compressed=False)
key2 = Key(wif)
key1 == key2
addr1 = key1.address
addr2 = key2.address

...


Thank you. It`s working.
member
Activity: 330
Merit: 34
Drotika: you can give me proof and solve the puzzel what i made for you with this tool what you sell.
i generate a 74 bit address tell me the priv key and i will buy instantly.
here is the compressed pub key.

02860383bb423be58e05694974bd9f509f6cf9d003c16360c1062cc417acd4270c

compressed address:
1NfQBC3hcwugx4fFjkp6ugNC8ZmYGddMz

This might be a sockpuppet account. So catpatkany might be same person as drotika. So be careful guys!
If a mod could check this (IP?) please. Looks shady.

Well, lets wait until someone beyond Newbie post a new 74 bit address generated to test Drotika's tool.

bit75

03a407ff62f7943a48eb34df67e4fb5c50e963ab4c83ae26a7c7af1fa5dec7e6a5

show PK
full member
Activity: 706
Merit: 111
01 0000000000000000000000000000000000000000000000000000000000000001 1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH
02 0000000000000000000000000000000000000000000000000000000000000003 1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb
03 0000000000000000000000000000000000000000000000000000000000000007 19ZewH8Kk1PDbSNdJ97FP4EiCjTRaZMZQA
04 0000000000000000000000000000000000000000000000000000000000000008 1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e
05 0000000000000000000000000000000000000000000000000000000000000015 1E6NuFjCi27W5zoXg8TRdcSRq84zJeBW3k
06 0000000000000000000000000000000000000000000000000000000000000031 1PitScNLyp2HCygzadCh7FveTnfmpPbfp8
07 000000000000000000000000000000000000000000000000000000000000004c 1McVt1vMtCC7yn5b9wgX1833yCcLXzueeC
08 00000000000000000000000000000000000000000000000000000000000000e0 1M92tSqNmQLYw33fuBvjmeadirh1ysMBxK
09 00000000000000000000000000000000000000000000000000000000000001d3 1CQFwcjw1dwhtkVWBttNLDtqL7ivBonGPV
10 0000000000000000000000000000000000000000000000000000000000000202 1LeBZP5QCwwgXRtmVUvTVrraqPUokyLHqe
11 0000000000000000000000000000000000000000000000000000000000000483 1PgQVLmst3Z314JrQn5TNiys8Hc38TcXJu
12 0000000000000000000000000000000000000000000000000000000000000a7b 1DBaumZxUkM4qMQRt2LVWyFJq5kDtSZQot
13 0000000000000000000000000000000000000000000000000000000000001460 1Pie8JkxBT6MGPz9Nvi3fsPkr2D8q3GBc1
14 0000000000000000000000000000000000000000000000000000000000002930 1ErZWg5cFCe4Vw5BzgfzB74VNLaXEiEkhk
15 00000000000000000000000000000000000000000000000000000000000068f3 1QCbW9HWnwQWiQqVo5exhAnmfqKRrCRsvW
16 000000000000000000000000000000000000000000000000000000000000c936 1BDyrQ6WoF8VN3g9SAS1iKZcPzFfnDVieY
17 000000000000000000000000000000000000000000000000000000000001764f 1HduPEXZRdG26SUT5Yk83mLkPyjnZuJ7Bm
18 000000000000000000000000000000000000000000000000000000000003080d 1GnNTmTVLZiqQfLbAdp9DVdicEnB5GoERE
19 000000000000000000000000000000000000000000000000000000000005749f 1NWmZRpHH4XSPwsW6dsS3nrNWfL1yrJj4w
20 00000000000000000000000000000000000000000000000000000000000d2c55 1HsMJxNiV7TLxmoF6uJNkydxPFDog4NQum
21 00000000000000000000000000000000000000000000000000000000001ba534 14oFNXucftsHiUMY8uctg6N487riuyXs4h
22 00000000000000000000000000000000000000000000000000000000002de40f 1CfZWK1QTQE3eS9qn61dQjV89KDjZzfNcv
23 0000000000000000000000000000000000000000000000000000000000556e52 1L2GM8eE7mJWLdo3HZS6su1832NX2txaac
24 0000000000000000000000000000000000000000000000000000000000dc2a04 1rSnXMr63jdCuegJFuidJqWxUPV7AtUf7
25 0000000000000000000000000000000000000000000000000000000001fa5ee5 15JhYXn6Mx3oF4Y7PcTAv2wVVAuCFFQNiP
26 000000000000000000000000000000000000000000000000000000000340326e 1JVnST957hGztonaWK6FougdtjxzHzRMMg
27 0000000000000000000000000000000000000000000000000000000006ac3875 128z5d7nN7PkCuX5qoA4Ys6pmxUYnEy86k
28 000000000000000000000000000000000000000000000000000000000d916ce8 12jbtzBb54r97TCwW3G1gCFoumpckRAPdY
29 0000000000000000000000000000000000000000000000000000000017e2551e 19EEC52krRUK1RkUAEZmQdjTyHT7Gp1TYT
30 000000000000000000000000000000000000000000000000000000003d94cd64 1LHtnpd8nU5VHEMkG2TMYYNUjjLc992bps
31 000000000000000000000000000000000000000000000000000000007d4fe747 1LhE6sCTuGae42Axu1L1ZB7L96yi9irEBE
32 00000000000000000000000000000000000000000000000000000000b862a62e 1FRoHA9xewq7DjrZ1psWJVeTer8gHRqEvR
33 00000000000000000000000000000000000000000000000000000001a96ca8d8 187swFMjz1G54ycVU56B7jZFHFTNVQFDiu
34 000000000000000000000000000000000000000000000000000000034a65911d 1PWABE7oUahG2AFFQhhvViQovnCr4rEv7Q
35 00000000000000000000000000000000000000000000000000000004aed21170 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
36 00000000000000000000000000000000000000000000000000000009de820a7c 1Be2UF9NLfyLFbtm3TCbmuocc9N1Kduci1
37 0000000000000000000000000000000000000000000000000000001757756a93 14iXhn8bGajVWegZHJ18vJLHhntcpL4dex
38 00000000000000000000000000000000000000000000000000000022382facd0 1HBtApAFA9B2YZw3G2YKSMCtb3dVnjuNe2
39 0000000000000000000000000000000000000000000000000000004b5f8303e9 122AJhKLEfkFBaGAd84pLp1kfE7xK3GdT8
40 000000000000000000000000000000000000000000000000000000e9ae4933d6 1EeAxcprB2PpCnr34VfZdFrkUWuxyiNEFv
41 00000000000000000000000000000000000000000000000000000153869acc5b 1L5sU9qvJeuwQUdt4y1eiLmquFxKjtHr3E
42 000000000000000000000000000000000000000000000000000002a221c58d8f 1E32GPWgDyeyQac4aJxm9HVoLrrEYPnM4N
43 000000000000000000000000000000000000000000000000000006bd3b27c591 1PiFuqGpG8yGM5v6rNHWS3TjsG6awgEGA1
44 00000000000000000000000000000000000000000000000000000e02b35a358f 1CkR2uS7LmFwc3T2jV8C1BhWb5mQaoxedF
45 0000000000000000000000000000000000000000000000000000122fca143c05  1NtiLNGegHWE3Mp9g2JPkgx6wUg4TW7bbk
46 00000000000000000000000000000000000000000000000000002ec18388d544 1F3JRMWudBaj48EhwcHDdpeuy2jwACNxjP
47 00000000000000000000000000000000000000000000000000006cd610b53cba 1Pd8VvT49sHKsmqrQiP61RsVwmXCZ6ay7Z
48 0000000000000000000000000000000000000000000000000000ade6d7ce3b9b 1DFYhaB2J9q1LLZJWKTnscPWos9VBqDHzv
49 000000000000000000000000000000000000000000000000000174176b015f4d 12CiUhYVTTH33w3SPUBqcpMoqnApAV4WCF
50 00000000000000000000000000000000000000000000000000022bd43c2e9354 1MEzite4ReNuWaL5Ds17ePKt2dCxWEofwk
51 00000000000000000000000000000000000000000000000000075070a1a009d4 1NpnQyZ7x24ud82b7WiRNvPm6N8bqGQnaS
52 000000000000000000000000000000000000000000000000000efae164cb9e3c  15z9c9sVpu6fwNiK7dMAFgMYSK4GqsGZim
53 00000000000000000000000000000000000000000000000000180788e47e326c 15K1YKJMiJ4fpesTVUcByoz334rHmknxmT
54 00000000000000000000000000000000000000000000000000236fb6d5ad1f43  1KYUv7nSvXx4642TKeuC2SNdTk326uUpFy
55 000000000000000000000000000000000000000000000000006abe1f9b67e114 1LzhS3k3e9Ub8i2W1V8xQFdB8n2MYCHPCa
56 000000000000000000000000000000000000000000000000009d18b63ac4ffdf   17aPYR1m6pVAacXg1PTDDU7XafvK1dxvhi
57 00000000000000000000000000000000000000000000000001eb25c90795d61c 15c9mPGLku1HuW9LRtBf4jcHVpBUt8txKz
58 00000000000000000000000000000000000000000000000002c675b852189a21 1Dn8NF8qDyyfHMktmuoQLGyjWmZXgvosXf
59 00000000000000000000000000000000000000000000000007496cbb87cab44f  1HAX2n9Uruu9YDt4cqRgYcvtGvZj1rbUyt
60 0000000000000000000000000000000000000000000000000fc07a1825367bbe  1Kn5h2qpgw9mWE5jKpk8PP4qvvJ1QVy8su
61 00000000000000000000000000000000000000000000000013C96A3742F64906 1AVJKwzs9AskraJLGHAZPiaZcrpDr1U6AB
62 000000000000000000000000000000000000000000000000363D541EB611ABEE 1Me6EfpwZK5kQziBwBfvLiHjaPGxCKLoJi                  
63 0000000000000000000000000000000000000000000000007CCE5EFDACCF6808 1NpYjtLira16LfGbGwZJ5JbDPh3ai9bjf4

65 000000000000000000000000000000000000000000000001A838B13505B26867 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe

70 0000000000000000000000000000000000000000000000349B84B6431A6C4EF1 19YZECXj3SxEZMoUeJ1yiPsw8xANe7M7QR

75 0000000000000000000000000000000000000000000004C5CE114686A1336E07 1J36UjUByGroXcCvmj13U6uwaVv9caEeAt
 
80 00000000000000000000000000000000000000000000ea1a5c66dcc11b5ad180  1BCf6rHUW6m3iH2ptsvnjgLruAiPQQepLe

85 00000000000000000000000000000000000000000011720c4f018d51b8cebba8  1Kh22PvXERd2xpTQk3ur6pPEqFeckCJfAr

90 000000000000000000000000000000000000000002ce00bb2136a445c71e85bf  1L12FHH2FHjvTviyanuiFVfmzCy46RRATU

95 0000000000000000000000000000000000000000527a792b183c7f64a0e8b1f4  19eVSDuizydXxhohGh8Ki9WY9KsHdSwoQC

100 000000000000000000000000000000000000000af55fc59c335c8ec67ed24826 1KCgMv8fo2TPBpddVi9jqmMmcne9uSNJ5F

105 000000000000000000000000000000000000016f14fc2054cd87ee6396b33df3  1CMjscKB3QW7SDyQ4c3C3DEUHiHRhiZVib
newbie
Activity: 17
Merit: 0
Hurray.
62th puzzle solved Huh
2019-09-08 10:44:14
 
jr. member
Activity: 184
Merit: 3
probably so...

Quote
from bit import Key
from bit.format import bytes_to_wif

...

key1 = Key.from_int(b)
wif = bytes_to_wif(key1.to_bytes(), compressed=False)
key2 = Key(wif)
key1 == key2
addr1 = key1.address
addr2 = key2.address

...

newbie
Activity: 43
Merit: 0
Hello,

If I have the below script, is possible to add a line like addr2 = ... for uncompressed addresses?
I have little experience with python and that's why I ask for help.
Thanks!

import random
from bit import *
#from PyRandLib import *
#rand = FastRand63()
#random.seed(rand())

c1 = str (random.choice("1"))
b1  = "01111111111111111111111111111111111111111111111111111111"
b2  = "00111111111111111111111111111111111111111111111111111111"
b3  = "00011111111111111111111111111111111111111111111111111111"
b4  = "00001111111111111111111111111111111111111111111111111111"
b5  = "00000111111111111111111111111111111111111111111111111111"
b6  = "00000011111111111111111111111111111111111111111111111111"
b7  = "00000001111111111111111111111111111111111111111111111111"
b8  = "00000000111111111111111111111111111111111111111111111111"
b9  = "00000000011111111111111111111111111111111111111111111111"
b10 = "00000000001111111111111111111111111111111111111111111111"
b11 = "00000000000111111111111111111111111111111111111111111111"
b12 = "00000000000011111111111111111111111111111111111111111111"
b13 = "00000000000001111111111111111111111111111111111111111111"
b14 = "00000000000000111111111111111111111111111111111111111111"
b15 = "00000000000000011111111111111111111111111111111111111111"
b16 = "00000000000000001111111111111111111111111111111111111111"
b17 = "00000000000000000111111111111111111111111111111111111111"
b18 = "00000000000000000011111111111111111111111111111111111111"
b19 = "00000000000000000001111111111111111111111111111111111111"
b20 = "00000000000000000000111111111111111111111111111111111111"
b21 = "00000000000000000000011111111111111111111111111111111111"
b22 = "00000000000000000000001111111111111111111111111111111111"
b23 = "00000000000000000000000111111111111111111111111111111111"
b24 = "00000000000000000000000011111111111111111111111111111111"
b25 = "00000000000000000000000001111111111111111111111111111111"
b26 = "00000000000000000000000000111111111111111111111111111111"
b27 = "00000000000000000000000000011111111111111111111111111111"
b28 = "00000000000000000000000000001111111111111111111111111111"
b29 = "00000000000000000000000000000111111111111111111111111111"
b30 = "00000000000000000000000000000011111111111111111111111111"
b31 = "00000000000000000000000000000001111111111111111111111111"
b32 = "00000000000000000000000000000000111111111111111111111111"
b33 = "00000000000000000000000000000000011111111111111111111111"
b34 = "00000000000000000000000000000000001111111111111111111111"
b35 = "00000000000000000000000000000000000111111111111111111111"
b36 = "00000000000000000000000000000000000011111111111111111111"
b37 = "00000000000000000000000000000000000001111111111111111111"
b38 = "00000000000000000000000000000000000000111111111111111111"
b39 = "00000000000000000000000000000000000000011111111111111111"
b40 = "00000000000000000000000000000000000000001111111111111111"
b41 = "00000000000000000000000000000000000000000111111111111111"
b42 = "00000000000000000000000000000000000000000011111111111111"
b43 = "00000000000000000000000000000000000000000001111111111111"
b44 = "00000000000000000000000000000000000000000000111111111111"
b45 = "00000000000000000000000000000000000000000000011111111111"
b46 = "00000000000000000000000000000000000000000000001111111111"
b47 = "00000000000000000000000000000000000000000000000111111111"
b48 = "00000000000000000000000000000000000000000000000011111111"
b49 = "00000000000000000000000000000000000000000000000001111111"
b50 = "00000000000000000000000000000000000000000000000000111111"
b51 = "00000000000000000000000000000000000000000000000000011111"
b52 = "00000000000000000000000000000000000000000000000000001111"
b53 = "00000000000000000000000000000000000000000000000000000111"
b54 = "00000000000000000000000000000000000000000000000000000011"
b55 = "00000000000000000000000000000000000000000000000000000001"
#xx = "00000000000000000000000000000000000000000000000000000001"

while True:
    spisok = [b1,b2,b3,b4,b5,b6,b7,b8,b9,b10,b11,b12,b13,b14,b15,b16,b17,b18,b19,b20,b21,b22,b23,b24,b25,b26,b27,b28,b29,b30,b31,b32,b33,b34,b35,b36,b37,b38,b39,b40,b41,b42,b43,b44,b45,b46,b47,b48,b49,b50,b51,b52,b53,b54,b55]
    for element in (spisok):
        for spisok in range(1000):
            s = element
            d = ''.join(random.sample(s,len(s)))
            bina = (c1+d)
            b = int(c1+d,2)
            key = Key.from_int(b)
            addr = key.address
            if addr == "1LzhS3k3e9Ub8i2W1V8xQFdB8n2MYCHPCa":
                print ("found!!!",b,addr)
                s1 = str(b)
                s2 = addr
                f=open(u"C:/a.txt","a")
                f.write(s1)
                f.write(s2)       
                f.close()
                pass
            else:
                print (s,bina,b,addr)
    pass

hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale
Maybe this is an R-puzzle
legendary
Activity: 3472
Merit: 10611
Can you clarify why this table is relevant? There is only 1 address for every private number.
However actually for every private number there are different addresses depending on the types: P2PKH address (starting with 1), P2SH address (starting with 3), Bech32 address (starting with bc1).

So, is this correct that having one private key (number) you can access 3 different  BTC address? Or even more?

you are correct but it is off topic here.
with every private key (which is a number) you have one public key (encoded 2 ways: compressed and uncompressed) and an have a lot of different types of addresses which you mentioned here. with P2SH you can have a bunch of different scripts using that public key too.
you also missed P2WSH and nested P2PKH/P2WSH inside P2SH scripts.
remember that you technically never do that, you always derive 1 type of address from a key.

this table (and the topic in general) is working on a puzzle that has paid to 1 type of address (P2PKH) and that is what they have been trying to solve for a long time.
sr. member
Activity: 443
Merit: 350
Can you clarify why this table is relevant? There is only 1 address for every private number.
However actually for every private number there are different addresses depending on the types: P2PKH address (starting with 1), P2SH address (starting with 3), Bech32 address (starting with bc1).

So, is this correct that having one private key (number) you can access 3 different  BTC address? Or even more?
member
Activity: 255
Merit: 27
legendary
Activity: 2646
Merit: 1137
All paid signature campaigns should be banned.
My daughter and I have created our own thread to discuss her Science Fair Project to trap Bitcoin private keys using Kangaroos!

All of our results will be posted there.  If you are interested in our implementation and optimization of the Pollard Kangaroo algorithm give the thread a visit:

https://bitcointalksearch.org/topic/science-fair-project-to-trap-bitcoin-private-keys-using-kangaroos-5173445
newbie
Activity: 73
Merit: 0
I have 33 spare amd gpus rx570/580, we can cooperate on searching keys. please pm me. thanks
jr. member
Activity: 59
Merit: 3
I do not use the "--stride" function for several reasons:
1) it is possible to not find the right key (already using '2' as a value)
2) is meaningless without any premises as to whether the key is even or not
Any (no) benefit I could achieve - a comparable example I could run half of the whole range without using this function anyway) not knowing if I'm scanning the right half :-)

I use the "--share" function for this, thanks to which I have scripts that start divided into X parts (read internal ranges).
For each space I determine X individually (based on my own whim) and based only on my mood or the weather. My whim of X's arrangements for space 63 resulted in the fact that the last set scanned the space from the value of 'Y', which was lower than the proper key, respectively, so that I needed three days to reach the key. I can not say the same about the '62' range, which did not show the right key despite the fact that all readings are already at the level BELOW of the month until the end of the full scan.

Prejuding the questions:
1. I will NOT betray 'X' I have set.
2. Yes ... I am also scanning the range 64
So looks like you've got a key for #64 just by luck... or may be it was a good weather at that time.   Wink Cheesy Cheesy Cheesy
full member
Activity: 282
Merit: 114
#63 - 1NpYjtLira16LfGbGwZJ5JbDPh3ai9bjf4
Hex PK: 0000000000000000000000000000000000000000000000007CCE5EFDACCF6808
Private key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYv5Z9J7hv7VYYN3XL3Y

62 is still in progress ... I just found 63 faster :-)

What do you use for searching?

Same as previous keys found by me (#59,#60,#61) - the key was found with the BitCrack application
Interesting, what speed you have on what video card? I have rx560oc and reach only 50Mkey/s acording my calculation if you scan all 62 bit range is so much years. Are you scan small pieces of 62bit range or all ? Thanks


Edit: Sorry for my bad english,it isnt my native language.

For searching for keys I have adapted Tesla working cards that I have at my disposal in the company (which also means no energy costs). I scan the given space in full, and the total speed with which I carry out the search process is 37 200 000 000keys/s (no ... I don't do mistake... is this thirty seven trillion two hundred million keys per second)

My calclulations :
63 bit key all combinations = 9223372036854775808 2^63 ?
for 1 day you can calclulate  3214080000000000 keys
9223372036854775808/3214080000000000  = 2869.6771819166840302668259657507 days
Am i wrong  with calclulations ?

Are you use something like pool for all videos or what ? I have some ideas for adapting bitcrack to pool , but i think its useless because we dont know is it have more puzzels like this or more adresses like this for bruteforcing. I try to brute 86 but with no sucess still.. I get only 50Mkey/s even if i clock my video.....

Edit: how much cards and what period of time to brute 63 ?

Hitting # 63 was an extraordinary happiness because I used the last remaining resources to start searching # 63, starting from the end. After three days - I found ...
Responding: it took me three days to use 5% of all my power.


[/font]
Privat key in 97.5% position in own range. You found him for 3 days. 1 percent for 1.2 days. Calculate, and gette d for checked all range fro 63 bit you nead only 120 days. But if calculate your spead we get 2869 days. How?
And as far as I remember, BitCrack cannot count in the reverse order. "--stride -1" not worked. How you strating from the end?


I do not use the "--stride" function for several reasons:
1) it is possible to not find the right key (already using '2' as a value)
2) is meaningless without any premises as to whether the key is even or not
Any (no) benefit I could achieve - a comparable example I could run half of the whole range without using this function anyway) not knowing if I'm scanning the right half :-)

I use the "--share" function for this, thanks to which I have scripts that start divided into X parts (read internal ranges).
For each space I determine X individually (based on my own whim) and based only on my mood or the weather. My whim of X's arrangements for space 63 resulted in the fact that the last set scanned the space from the value of 'Y', which was lower than the proper key, respectively, so that I needed three days to reach the key. I can not say the same about the '62' range, which did not show the right key despite the fact that all readings are already at the level BELOW of the month until the end of the full scan.

Prejuding the questions:
1. I will NOT betray 'X' I have set.
2. Yes ... I am also scanning the range 64
I also remind you to continue the possible conversation related to this topic in the new thread:

https://bitcointalksearch.org/topic/archive-bitcoin-challenge-discusion-5166284


Jump to: