Pages:
Author

Topic: BitCrack - A tool for brute-forcing private keys - page 30. (Read 74618 times)

member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


Will we ever see this? Grin Grin

Were you get this SCAM pic ? How mach you was pay to scam seller what send you this pic ?  https://blockchair.com/bitcoin/address/16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN
member
Activity: 260
Merit: 19
the right steps towerds the goal

--keyspace D461A00000000000:D461EFFFFFFFFFFF Done no result at all


Proof of work----------

16jY7qLJuXhXBcQTEWgxCQeNQgm8brvUY8  D461A033F002295F
16jY7qLJd7s4wMpsDb7E6LdYRgswQThQGd  D461A06D1FDD9213
16jY7qLJuuWpCv93rAQ4Cq4AbbZa3osSLh  D461A1331773067B
16jY7qLJrb92mefBp4CMzJ5KoyFzSfm778  D461A136870A6BC2
16jY7qLJZ9XLX4X3LCiJzLXaxy33zti11W  D461A1DB2892292D
16jY7qLJ8b5ZM74Rf4KZaVN4kA9irAF8Mp  D461A2539057663C
16jY7qLJNijwxcpNHioRzdDzbjjrr8q2AE  D461A26D71DB91B0
16jY7qLJgUaBEgi5LXag2vz9WXYQV7E9RH  D461A5EA986D56AB
16jY7qLJ5tg47gHvymHFb12y2ZAjvC2vu3  D461A67C3230FCE6
16jY7qLJfvGhcNyNGHRn1vkyamUxR2TLWH  D461A701F381BF7D
16jY7qLJfvGhcNyNGHRn1vkyamUxR2TLWH  D461A701F381BF7D
16jY7qLJz8WvKT5Sx2tXRfWTd3V72juQx2  D461A746F1B18AAA
16jY7qLJ1CmAoRJF5ZKrUEa7BUkjoi9NkF  D461A7629669083E
16jY7qLJBj3cJy94TFcRTQ1tYX4h8Q9bHZ  D461A76F3189D120
16jY7qLJZzkkJ9wDDriDtHRbD3knBq9uv2  D461A7D973934868
16jY7qLJWZTwQgWLddhuw3zJU4iTH49NST  D461A89FFB2F1FD8
16jY7qLJAP6smG8d9JT4F5tPiFiWUHRTwj  D461A8AA1431CC22
16jY7qLJWNqiLtW29RPpGAM9d8HSLcj6Wo  D461A97A14BEE65A
16jY7qLJNdsAH2nfwYFuDCqTcuXDEm9UuB  D461AA06F956F88D
16jY7qLJHR4DkKP9HeTDMNZur8yUxF9nYP  D461AB207106739E
16jY7qLJDiZkTtmdGNDtnnV4QGty2S5ebm  D461AD83DF40DE6D
16jY7qLJPEiQdPTG5ZtysxgUMqCH776saq  D461B1249FE82CDF
16jY7qLJERfVJduxdWXJy53tMduiQ7RbiN  D461B11E90310D97
16jY7qLJ3Kkxw8kbXXV29akKgFZKgY24FZ  D461B23905479189
16jY7qLJEV89w49Sz6PnX7VKbvfWMrgceR  D461B35408BDF316
16jY7qLJLUgm6UxL7MLdH4FxKH2J2qpebk  D461B35312A9E9AC
16jY7qLJhqN8KSdenR2VV9yNUPUoyWAFph  D461B402FF76DF3C
16jY7qLJAujkRrNQX9UuCBHHZBjo3WK83C  D461B4CE238BF8EA
16jY7qLJrTmXSyGgmsuiV3mMDRugJYt749  D461B5102E6643C4
16jY7qLJnjYP64p2tk47GCy7qjLejUJ4Ep  D461B60641E81DF3
16jY7qLJnjYP64p2tk47GCy7qjLejUJ4Ep  D461B60641E81DF3
16jY7qLJcfETjcQvkd2JuKnLxzYaVPevmA  D461B7A23B365661
16jY7qLJmywpkVPLvtHMT7mFEcTZ2qAaJx  D461B85CF9F1181E
16jY7qLJVfbPo4nXMv8UxJiCYwLWLVCyo2  D461B9DB69E71F5A
16jY7qLJ8W2Gs6utzLWnWFpygDSQhDpzLt  D461BA04B2EB72F9
16jY7qLJ8W2Gs6utzLWnWFpygDSQhDpzLt  D461BA04B2EB72F9
16jY7qLJAh9wxibKGvncNJYyKTGo4qqQHF  D461BA12B0703DB4
16jY7qLJnxPwmtRgVS3HBg2RtAoHe1koZF  D461BAACE35DB135
16jY7qLJFL8ZtVJ4Tb6HUWzkrwnuLm484w  D461BCD45FC8134B
16jY7qLJk2toMHc38ZFm8uXxc4A7seJWCZ  D461BCDAB58E22CD
16jY7qLJpUAXeJU8gMLqGZTUswnEWWW1hR  D461BF9BDE0CAA6A
16jY7qLJGSD9rvHNhhPEUCw27an4FPZs5a  D461C015C3CE6195
16jY7qLJmXRwxaXhBGp4BQMNT7SERC1RxP  D461C0C1869C98D8
16jY7qLJnZLSurG7z32rGMA44nTchL1cSV  D461C240C31498F2
16jY7qLJ582zP7XE4HqB4yknCcdY5RMavK  D461C2A7731103BF
16jY7qLJGEEk1MNfdwFXwGX1CuFsLX4KVA  D461C387144B2DED
16jY7qLJYj4tzRzaPC2JGkgvz2itePCMke  D461C4C621FE43FC
16jY7qLJmk61XYyv1nDVK7Lqcz1T9ayZUL  D461C519745594CF
16jY7qLJ3ZzP66NFEmappAUEjsv1KQ4Xa8  D461C587DBFF7374
16jY7qLJQawPBqaCbi2bGRRGx5JN1RUMDz  D461C59304C00FCB
16jY7qLJGZuRMth5r4LtdhFZfijNX3sArB  D461C5EEDE6D256A
16jY7qLJk9i4NHKQDFcEyzYJvAQdRQ6w2q  D461C6068F6BA7BE
16jY7qLJAaadj8kLb8JoRv5ijPsjEtokTg  D461C6A1A9769576
16jY7qLJQ4bKVh2C65jtJfmxB1htiHCFav  D461C6AE4BB2CF12
16jY7qLJ9CvggN4TXZVKiZkE15NA84LLaK  D461C919A54DBF67
16jY7qLJTehvmq2cnwNDrWteezDAr6rkF7  D461C9F0B7881B16
16jY7qLJjipVEg7MomZtwQ1i29G7Mr3YgT  D461CCA5D5B7590E
16jY7qLJ1cqHU9vq1dVXugL4H4AfZQpwX8  D461CD36E9102632
16jY7qLJrdjZqZtf2jeczmAR1FPHRVm3ap  D461CD8E5A04BA39
16jY7qLJ6i9MgKEvZfEMqZdU6if9hTKZ15  D461CE1700C495E4
16jY7qLJ1zivUzVPKuyQkVNEHvG5RY99nG  D461CE24FDFE2768
16jY7qLJQVFeGNKHuUm4d453kdThqQCgTU  D461CF89D61F0360
16jY7qLJePUqTkxz3Roqb8ffUjHzBakmmK  D461D0330778E0A1
16jY7qLJUCL9sJ9rNTHyER4vrZ8PrkPnCR  D461D05323415FDF
16jY7qLJdx9ViL7uM6sD6zSTqhU6fJVhGJ  D461D0BDFD2782BF
16jY7qLJuoAR4wEYTbRrB1jkRPKTVwPqXS  D461D1BCBC6A2037
16jY7qLJn6tKqDyL5KP3qnH6YP65f5GzP9  D461D1CABA646721
16jY7qLJkfSJCgdsS4bzfFJxSCH4ovvzJD  D461D2D0FC19AFBA
16jY7qLJK8zPURwVUwg8RPzWotjyQgSmRx  D461D41A468FE32C
16jY7qLJXhxpjjdjizcjXXj1zhRovTRFCk  D461D4A259EDCC82
16jY7qLJYcMv2PScZwiMt9dM1tdvTZtDhq  D461D5213647BF87
16jY7qLJAQjtTKCibPeZATiwHqkqHoUX2J  D461D58FB6858F87
16jY7qLJCaBnTn3pFQ83bV9xPu2bxYGVZX  D461D5D2A4FC1D39
16jY7qLJzXHkb14wFHwk28a9deW9Y3fSJc  D461DB8FD14B76F7
16jY7qLJbwpcXxqyqVdshWyA23VcyGMhUT  D461DC749FB448FF
16jY7qLJSmbeWYu1G4XGATpVTiSucMNiu4  D461DCE7EA4959D2
16jY7qLJq4x4aXQVF1pdxYMXatUUaXYbRw  D461DD15F197043F
16jY7qLJsKP8MHe9zTcrLobLAFnmgkxZMZ  D461DD782B6FB4A0
16jY7qLJq9t6gY2qUoHw41aAJvhVrzfiXH  D461DE143A2B6EC1
16jY7qLJw2JY2E6dvVyNJwM47abmAnp9mf  D461DE71182A7595
16jY7qLJ8X7fftTDeYbt4fhypkU8nYvNeZ  D461DEA07EC5DF8F
16jY7qLJZhPdcZCmymbkpBbjPAgMbcgPwf  D461DF59533BFE8B
16jY7qLJ6XXF7vhwBeJeGGVcxeSnwHhuxE  D461E0F8636D33CD
16jY7qLJspYkKcvhBEmVZxA7vB4NpvwmDW  D461E474968FBC8E
16jY7qLJmF8KtiEkWj9wc4XupCagn1yxeB  D461E52E98DD447E
16jY7qLJMcbfmz5Vm3KHh4vGLBrhFi5kbQ  D461E5ED75394E7B
16jY7qLJRfXaDBQjzQjFvCQMmWD6DdqHa6  D461E5FF8F7F0503
16jY7qLJKbCERZq4fNdpUoML3WDXj9ya76  D461E644936B6CC6
member
Activity: 71
Merit: 43
nice edit  Grin (devtools / console ?)

maybe in a few days... who knows  Roll Eyes

//edit
and now lets wait....
member
Activity: 260
Merit: 19
the right steps towerds the goal


Will we ever see this? Grin Grin
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
The very last paragraph is interesting.
 http://cr.yp.to/bib/1987/lenstra-fiec.pdf

So is section (1.3)

Finally, something explains in clear terms what an isomorphism is.

(1.3) Isomorphisms and automorphisms. Let E = Ea,b and E'a',b' be elliptic curves over K. An isomorphism E → E' (over K) is defined to be an element u ∈ K* for which a' = u4a and b' = u6b.

So taking this in secp256k1's perspective, a=0 and b=7. So any curve that manipulates b is potentially an isomorphism of secp256k1 since a=0 implies any curve can satisfy the corresponding relation above.

So this means, b=26*7, 36*7, 46*7 ... are all isomorphisms which also means there's an infinite number of secp256k1 isomorphisms we can calculate (of course that would not be efficient though) and we're not stuck with just the six from VanitySearch.
newbie
Activity: 26
Merit: 2
The very last paragraph is interesting.
 http://cr.yp.to/bib/1987/lenstra-fiec.pdf
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org

Great job, so looks like these factoring methods really were designed to work on privkey factors as well. So it's a repeated Pollard's rho - 1 in a loop, followed by that algorithm on the right (the curve membership test) if that fails I guess? I suspect the elliptic curve used in the example will also have to be changed to y^2 - x^3 - (or maybe +) 7, right? Since secp256k1 doesn't have the "ax" factor, I'm not sure where "a" is going to be placed to make the algorithm usable.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Friends! Why are you all doing hopeless brute-force? Does anyone know other algorithms? Maybe -lenstra_elliptic_curve_method, quadratic_sieve?

Those are both integer factorization algorithms so won't work against secp256k1 elliptic curves. Pollard Rho, Pohlig-Hellman (though slower than the rest), distinguished points and BSGS are the way to go.

This paper rounds up most of the known algorithms: https://math.mit.edu/classes/18.783/2017/LectureNotes10.pdf

There don't appear to by any public, more recent & novel methods for calculating descrete log on Google Scholar.
newbie
Activity: 26
Merit: 2
Friends! Why are you all doing hopeless brute-force? Does anyone know other algorithms? Maybe -lenstra_elliptic_curve_method, quadratic_sieve?
full member
Activity: 1078
Merit: 219
Shooters Shoot...
that might be because not everyone is using it as a means for research - some are specifically using it to target addresses in the hope/attempt to steal the funds.
Yes exactly! What's the point in research?
What will research give me? I never had bitcoins, when I had the opportunity to buy BTC for 1-100$, I did not know about it, I found out about bitcoins only in 2017, when video cards were becoming more expensive.

If that's what you're trying to do, then you are wasting your time trying to find a match in such a large keyspace.

GPUs can only search up to around 2^40 keyspace in a reasonable time (depending on how many GPUs and the kind you use, it could be even less) while bitcoin private keys exist in 2^256 keyspace. That means that unless someone deliberately posts a small range of the private key you can search in, it will take much, much longer than the human lifetime to exhaust bitcoin's entire keyspace to find some private keys.

Brute forcing has always been this hard, it doesn't become difficult as bitcoin's price goes up (and for the same reason, bitcoin GPU mining has been unprofitable since 2013 or so).

Uninitiated crackers will actually spend more on the hardware itself than the potential reward if they are not careful to buy bargain hardware, not to mention electricity bills. Privkey cracking is about to become a specialized industry, like bitcoin mining.

I agree - doesnt stop some of them from trying.


I am currently able to process 2^54.75 Keys/second using a program I've been writing that combines the best of Bitcrack with BSGS using GPU's, at the moment im only capable of getting these speeds while searching public keys, while searching public address compressed Im still getting about 2^38.127 Keys/second. I will be discussing this program more and maybe releasing a copy for public use after I find the 64 address!
I look forward to hearing about the combined bitcrack and bsgs. Maybe post it in project development section to create its own thread.
jr. member
Activity: 50
Merit: 7
that might be because not everyone is using it as a means for research - some are specifically using it to target addresses in the hope/attempt to steal the funds.
Yes exactly! What's the point in research?
What will research give me? I never had bitcoins, when I had the opportunity to buy BTC for 1-100$, I did not know about it, I found out about bitcoins only in 2017, when video cards were becoming more expensive.

If that's what you're trying to do, then you are wasting your time trying to find a match in such a large keyspace.

GPUs can only search up to around 2^40 keyspace in a reasonable time (depending on how many GPUs and the kind you use, it could be even less) while bitcoin private keys exist in 2^256 keyspace. That means that unless someone deliberately posts a small range of the private key you can search in, it will take much, much longer than the human lifetime to exhaust bitcoin's entire keyspace to find some private keys.

Brute forcing has always been this hard, it doesn't become difficult as bitcoin's price goes up (and for the same reason, bitcoin GPU mining has been unprofitable since 2013 or so).

Uninitiated crackers will actually spend more on the hardware itself than the potential reward if they are not careful to buy bargain hardware, not to mention electricity bills. Privkey cracking is about to become a specialized industry, like bitcoin mining.

I agree - doesnt stop some of them from trying.


I am currently able to process 2^54.75 Keys/second using a program I've been writing that combines the best of Bitcrack with BSGS using GPU's, at the moment im only capable of getting these speeds while searching public keys, while searching public address compressed Im still getting about 2^38.127 Keys/second. I will be discussing this program more and maybe releasing a copy for public use after I find the 64 address!
legendary
Activity: 2072
Merit: 2224
EIN: 82-3893490
that might be because not everyone is using it as a means for research - some are specifically using it to target addresses in the hope/attempt to steal the funds.
Yes exactly! What's the point in research?
What will research give me? I never had bitcoins, when I had the opportunity to buy BTC for 1-100$, I did not know about it, I found out about bitcoins only in 2017, when video cards were becoming more expensive.

If that's what you're trying to do, then you are wasting your time trying to find a match in such a large keyspace.

GPUs can only search up to around 2^40 keyspace in a reasonable time (depending on how many GPUs and the kind you use, it could be even less) while bitcoin private keys exist in 2^256 keyspace. That means that unless someone deliberately posts a small range of the private key you can search in, it will take much, much longer than the human lifetime to exhaust bitcoin's entire keyspace to find some private keys.

Brute forcing has always been this hard, it doesn't become difficult as bitcoin's price goes up (and for the same reason, bitcoin GPU mining has been unprofitable since 2013 or so).

Uninitiated crackers will actually spend more on the hardware itself than the potential reward if they are not careful to buy bargain hardware, not to mention electricity bills. Privkey cracking is about to become a specialized industry, like bitcoin mining.

I agree - doesnt stop some of them from trying.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
that might be because not everyone is using it as a means for research - some are specifically using it to target addresses in the hope/attempt to steal the funds.
Yes exactly! What's the point in research?
What will research give me? I never had bitcoins, when I had the opportunity to buy BTC for 1-100$, I did not know about it, I found out about bitcoins only in 2017, when video cards were becoming more expensive.

If that's what you're trying to do, then you are wasting your time trying to find a match in such a large keyspace.

GPUs can only search up to around 2^40 keyspace in a reasonable time (depending on how many GPUs and the kind you use, it could be even less) while bitcoin private keys exist in 2^256 keyspace. That means that unless someone deliberately posts a small range of the private key you can search in, it will take much, much longer than the human lifetime to exhaust bitcoin's entire keyspace to find some private keys.

Brute forcing has always been this hard, it doesn't become difficult as bitcoin's price goes up (and for the same reason, bitcoin GPU mining has been unprofitable since 2013 or so).

Uninitiated crackers will actually spend more on the hardware itself than the potential reward if they are not careful to buy bargain hardware, not to mention electricity bills. Privkey cracking is about to become a specialized industry, like bitcoin mining.
newbie
Activity: 34
Merit: 0
that might be because not everyone is using it as a means for research - some are specifically using it to target addresses in the hope/attempt to steal the funds.
Yes exactly! What's the point in research?
What will research give me? I never had bitcoins, when I had the opportunity to buy BTC for 1-100$, I did not know about it, I found out about bitcoins only in 2017, when video cards were becoming more expensive.
legendary
Activity: 2072
Merit: 2224
EIN: 82-3893490
Before buying a 2080, I was very hopeful that I would definitely find something. But after 2 weeks of using the 2080ti, my results file is empty and I'm depressed. The only thing is that I have lowered the card consumption by 65% ​​for less wear and now I have 1250mkey instead of 1500.

Before that I had a 660ti card - 80 mkey

You should know that methods to crack 256-bit bitcoin private keys are primarily for research purposes and it's almost impossible to find a key to an unsolved puzzle transaction using a small group of GPUs.

that might be because not everyone is using it as a means for research - some are specifically using it to target addresses in the hope/attempt to steal the funds.
newbie
Activity: 34
Merit: 0
Before buying a 2080, I was very hopeful that I would definitely find something. But after 2 weeks of using the 2080ti, my results file is empty and I'm depressed. The only thing is that I have lowered the card consumption by 65% ​​for less wear and now I have 1250mkey instead of 1500.

Before that I had a 660ti card - 80 mkey

You should know that methods to crack 256-bit bitcoin private keys are primarily for research purposes and it's almost impossible to find a key to an unsolved puzzle transaction using a small group of GPUs.
Yes, I calculated that to sort out the entire 64 range, it would take me 500 years, but I was hoping to guess a good point, I tried hundreds of points to no avail.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Before buying a 2080, I was very hopeful that I would definitely find something. But after 2 weeks of using the 2080ti, my results file is empty and I'm depressed. The only thing is that I have lowered the card consumption by 65% ​​for less wear and now I have 1250mkey instead of 1500.

Before that I had a 660ti card - 80 mkey

You should know that methods to crack 256-bit bitcoin private keys are primarily for research purposes and it's almost impossible to find a key to an unsolved puzzle transaction using a small group of GPUs.
newbie
Activity: 34
Merit: 0
Before buying a 2080, I was very hopeful that I would definitely find something. But after 2 weeks of using the 2080ti, my results file is empty and I'm depressed. The only thing is that I have lowered the card consumption by 65% ​​for less wear and now I have 1250mkey instead of 1500.
https://ibb.co/68SCdBS
Before that I had a 660ti card - 80 mkey


newbie
Activity: 34
Merit: 0
I use modify bitcrack and base have 8 different coin so 2gb
Pages:
Jump to: