Pages:
Author

Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it - page 33. (Read 245663 times)

hero member
Activity: 862
Merit: 662
what is a "trick" of this ? Undecided

modmath don't have any issue, the trick is process the public key properly because some operations may fail with keymath.

But that is not the only way, literally there are hundreds of way to process this "puzzle" with some other tools or customs scripts.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@Etar,


Quote

 (which will be available tomorrow).



interesting.



Quote

./modmath 0x659756abf6c17ca70e829a43c7752f1417002440be6ddd93e441f8d4b4a85653b20b4cdcc5c74 8207a0daa16191d07a425d8080c276f9412472e0429e61bc355 / 0x376c7486601275fbac571546409b241cfd4093e2def806ba427927139ec9b8df
Result: 1


./modmath 0x376c7486601275fbac571546409b241cfd4093e2def806ba427927139ec9b8df / 0x659756abf6c17ca70e829a43c7752f1417002440be6ddd93e441f8d4b4a85653b20b4cdcc5c74 8207a0daa16191d07a425d8080c276f9412472e0429e61bc355
Result: 1



what is a "trick" of this ? Undecided
sr. member
Activity: 652
Merit: 316
What does this mean? You will give the step by step instructions on how to solve, before the outgoing transaction?
Quote
SHA-256 of correct solve steps (will publish tomorrow at this time)
Most likely, the sha-256 hash is simply a hash of the text that contains instructions on how to correctly convert a public key to a range of 80 bits an so on (which will be available tomorrow).

All I know it was supposed to be 80 bits, anywhere in what was posted, so to me, you could post something like this:
0xa6c39217128593909a1fcc0fd92c07a6f5abd32c36a8e7cf4e91f1a8f0651db0
and that would be enough.
The difficulty of this challenge is that some people don't understand where the 80-bit range is, some don't understand how to convert a public key to the required range and return the resulting private key to the 512-bit format and vice versa.
This is just part of the challenge. This is more interesting than just comparing who has more gpus.
hero member
Activity: 862
Merit: 662
@albert0bsd
Can you provide us some of the tools that can be used to search the range since the range is not fixed?

Only kangaroo and keymath
member
Activity: 348
Merit: 34
Hello guys
Sorry I am traveling for next 6 days
Faraway from my desktop system
Just can watch your messages
In my view offered minkey maxkey and sha256 key indicate key is secure private key, it's base aes or salt related etc
And why KtimeG said focus on rawtx ,
All know just pubkey can be seen at Blockchain website ,
Now you all can think and apply coding in that way too
full member
Activity: 297
Merit: 133
@albert0bsd
Can you provide us some of the tools that can be used to search the range since the range is not fixed?

Try this (you may want to convert it to use CUDA - or - make it multithreaded with "process_map"):

Code:
#!/usr/bin/env python3

import hashlib
import multiprocessing
from tqdm import tqdm
from hdwallet import HDWallet
from hdwallet.symbols import BTC
from numba import cuda
from tqdm.contrib.concurrent import process_map

N = 115792089237316195423570985008687907852837564279074904382605163141518161494337

minKey = 0x659756abf6c17ca70e0000000000000000000140be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
maxKey = 0x659756abf6c17ca70fffffffffffffffffffff40be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
target_address = "1ECDLP8osCZHBB1LH5PVAUfFegeMgFb52q"

initial_stride = 0x1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000

hdwallet = HDWallet(symbol=BTC)

def go(x):
y=hex(int(x/N))[2:]
hdwallet.from_private_key(private_key=y)
a=hdwallet.p2pkh_address()
if a=='1ECDLP8osCZHBB1LH5PVAUfFegeMgFb52q':
print('\n'+y)
o=open('found.txt','w')
o.write(y+'\n')
o.flush()
o.close()

r=range(minKey, maxKey, initial_stride)
count=int((maxKey-minKey)/initial_stride)

print(f'from\n{hex(minKey)}\nto\n{hex(maxKey)}\ncount\n{hex(count)}')
print('Working...')
for i in tqdm(r,total=count):
go(i)

print('\a', end='', file=sys.stderr)
member
Activity: 194
Merit: 14
@albert0bsd
Can you provide us some of the tools that can be used to search the range since the range is not fixed?
hero member
Activity: 862
Merit: 662
What are these privatek keys here?

This one:
Private key: 0x659756abf6c17ca70e829a43c7752f1417002440be6ddd93e441f8d4b4a85653b20b4cdcc5c74 8207a0daa16191d07a425d8080c276f9412472e0429e61bc355
and this one:
Private key 256bit: 0x376c7486601275fbac571546409b241cfd4093e2def806ba427927139ec9b8df

How you move from 512 bits to 256 bits?

the 256 bit keys is after apply Modulo N  (This only can be done once that you already have the extended privatekey complete)

The extended private key  (That one of 512 bits) is just a transformation/rotation/multiplication/some other operation of original privatekey, THB I really like that trick, because make people think outside of the box.
full member
Activity: 297
Merit: 133
If this is hex seed, then the space is decimal 1929795357851620611194880. Which one-threaded will take 117815298184130778 hours to search in.
Not always..
Code:
GPU: GPU #0 NVIDIA GeForce GTX 1660 SUPER (22x64 cores) Grid(88x128) (141.0 MB used)
SolveKeyGPU Thread GPU#0: creating kangaroos...
SolveKeyGPU Thread GPU#0: 2^20.46 kangaroos [10.2s]
[706.03 MK/s][GPU 706.03 MK/s][Count 2^36.71][Dead 0][03:03 (Avg 01:25:08)][10658.1/13328.8MB]
2024-11-01 13:55:48.791: Private key: 0x659756abf6c17ca70e829a43c7752f1417002440be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
2024-11-01 13:55:48.791: Private key 256bit: 0x376c7486601275fbac571546409b241cfd4093e2def806ba427927139ec9b8df
Success!!
Searching time: 251 s

What are these privatek keys here?

This one:
Private key: 0x659756abf6c17ca70e829a43c7752f1417002440be6ddd93e441f8d4b4a85653b20b4cdcc5c74 8207a0daa16191d07a425d8080c276f9412472e0429e61bc355
and this one:
Private key 256bit: 0x376c7486601275fbac571546409b241cfd4093e2def806ba427927139ec9b8df

How you move from 512 bits to 256 bits?
member
Activity: 194
Merit: 14
After studying the puzzle I think its not helpful even if the public key did get revealed, I'm not sure. but the ranges are not fix so idk how to solve that
member
Activity: 165
Merit: 26
What is the dilemma? Regardless of its bits, target - (minKey % N)
the result should be a pubkey in the 80-bit range, according to your statement, unless it is an "I Need Attention" from Diga, because if the puzzle was today, why does he have to wait more hours?

I suggest you should build a 1-bit database, let's call it "UnicornDB". It's so easy: compute all the public keys from keys 1 to 280 in one giant batch, add up all the parities of Y values mod 2. I'm sure you can add some clever way to extract any public key from it. Don't thank me for the tip. Go get'em!

PS: your formula is wrong.
newbie
Activity: 7
Merit: 1
Hey, new to Bitcoin but I have a question that one of you may be able to help me understand.

Given the unfortunate event of puzzle#66
{
  the real solver likely panic and tried to sweep the WIF using electrum (34 inputs and paying only 5.217/B)

  the sniper within a minute made a clean TX (1 input and paying 406.356/B)
}

If saatoshi_rising used a static padding for low entropy puzzles (like #66)

-> "123456789abcdef123456789abcdef123456789abcdef12" + [2832ed74f2b5e35ee]

Would a sniper still be able to find the private key from the public key being exposed in the mempool within 2 block confirmations?

From my limited understanding this would not be possible because the pubkey would be from a 256-bit key, but maybe I am missing something.

Thanks!
sr. member
Activity: 652
Merit: 316
Nice, near 5 minutes.., that is with some precalculated Distinguished points?
There the loading of the hashtable takes almost a minute. And the search took 3 minutes.
Yes, this is with precalculated DPs. It would be possible to accumulate more and find faster, but perhaps this will be enough.
Time will show. I am more concerned about the use of the mempool. It's for fun anyway...
hero member
Activity: 862
Merit: 662
Searching time: 251 s

Nice, near 5 minutes.., that is with some precalculated Distinguished points?
sr. member
Activity: 652
Merit: 316
If this is hex seed, then the space is decimal 1929795357851620611194880. Which one-threaded will take 117815298184130778 hours to search in.
Not always..
Code:
GPU: GPU #0 NVIDIA GeForce GTX 1660 SUPER (22x64 cores) Grid(88x128) (141.0 MB used)
SolveKeyGPU Thread GPU#0: creating kangaroos...
SolveKeyGPU Thread GPU#0: 2^20.46 kangaroos [10.2s]
[706.03 MK/s][GPU 706.03 MK/s][Count 2^36.71][Dead 0][03:03 (Avg 01:25:08)][10658.1/13328.8MB]
2024-11-01 13:55:48.791: Private key: 0x659756abf6c17ca70e829a43c7752f1417002440be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
2024-11-01 13:55:48.791: Private key 256bit: 0x376c7486601275fbac571546409b241cfd4093e2def806ba427927139ec9b8df
Success!!
Searching time: 251 s
full member
Activity: 297
Merit: 133
Code:
BTC Address(c): 1ECDLP8osCZHBB1LH5PVAUfFegeMgFb52q

minKey = 0x659756abf6c17ca70e0000000000000000000140be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
maxKey = 0x659756abf6c17ca70fffffffffffffffffffff40be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355

If this is hex seed, then the space is decimal 1929795357851620611194880. Which one-threaded will take 117815298184130778 hours to search in.
sr. member
Activity: 652
Merit: 316
I'm just confused a little bit.

The challenge is the solve a 80 bit key which is 20 HEX but the challenge shows a way longer private key than the maximal 64 HEX or 256 bits.

Can anyone explain those mystery keys?
let's say you have a private key 0x659756abf6c17ca70e00000000f0000000000140be6ddd93e441f8d4b4a85653b20b4cdcc5c74 8207a0daa16191d07a425d8080c276f9412472e0429e61bc355
whose public key 0264a3c32819270c6915ba1a810ad26fb23528b0f41f2146929504da7574eaffc7
if you take this (private key) % N you will get privet key 0xe892209e42f5904ee01bcd69f2e496d156169b3debc5f9594c5ec8e54554e9cd
whose public key is the same 0264a3c32819270c6915ba1a810ad26fb23528b0f41f2146929504da7574eaffc7
member
Activity: 194
Merit: 14
I'm just confused a little bit.

The challenge is the solve a 80 bit key which is 20 HEX but the challenge shows a way longer private key than the maximal 64 HEX or 256 bits.

Can anyone explain those mystery keys?

Code:
minKey  = 0x659756abf6c17ca70e0000000000000000000140be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
maxKey = 0x659756abf6c17ca70fffffffffffffffffffff40be6ddd93e441f8d4b4a85653b20b4cdcc5c748207a0daa16191d07a425d8080c276f9412472e0429e61bc355
full member
Activity: 1232
Merit: 242
Shooters Shoot...
I know you say you want to see how people will attack it differently...but I imagine most will overthink it.

Well It is actually a nice challenge, the extended range that him publish is 64 BYTES long (512 bits).

I bet that half of the users of this topic don't have idea how to reduce or transform it to something solvable.

Even for me it was a little tricky to reduce it, my previous method doesn't work and I need to edit some of my codes to work with it.

I already have some method to reduce/rotate the key and I really like it, I learn some limitations of my current tools.

Cool...I guess lol.

I briefly read his original post, but since it was for not that much, I tuned it out.

But as more posts were quoting it, asking questions, etc. I read more into it.
(I've been asked by several people, no, I am not participating in this challenge. I did offer up GPU power, for a few who said they had a "plan", and it was to be free of charge.)

The initial post is misleading to me. Shows x amount of characters, then the real one shows more. Which is whatever, just misleading. Like, what is the challenge really about, is it one thing, two things, 44 things lol?!

All I know it was supposed to be 80 bits, anywhere in what was posted, so to me, you could post something like this:
0xa6c39217128593909a1fcc0fd92c07a6f5abd32c36a8e7cf4e91f1a8f0651db0
and that would be enough.

And it's not that your tools don't work for normal curve things, this is an abstract / different type of challenge.
hero member
Activity: 862
Merit: 662
I know you say you want to see how people will attack it differently...but I imagine most will overthink it.

Well It is actually a nice challenge, the extended range that him publish is 64 BYTES long (512 bits).

I bet that half of the users of this topic don't have idea how to reduce or transform it to something solvable.

Even for me it was a little tricky to reduce it, my previous method doesn't work and I need to edit some of my codes to work with it.

I already have some method to reduce/rotate the key and I really like it, I learn some limitations of my current tools.
Pages:
Jump to: