Author

Topic: Compilation of fake/unsolvable puzzles/challenges (Read 212 times)

copper member
Activity: 1330
Merit: 899
🖤😏
There is one legit/solvable puzzle which actually has a purpose and that is the 1000BTC challenge, solving that has some meaning  behind it, The rest are just distractions, useless because they don't contribute to advancing the science.
So far all the evidence suggests that we are dependent on very old algorithms to solve DLP, and the 1000BTC challenge will hopefully contribute in achieving new algorithms/formulas to solve DLP faster. This will of course help to keep decentralization of money strong so it could last for many generations after we are gone.
-dig p.h.D 😂
legendary
Activity: 2982
Merit: 2681
Top Crypto Casino
hey albert0bsd.

On this site, they have a list with 19 Puzzles, 11 are solved and the other ones are partially solved or unsolved.

https://privatekeys.pw/puzzles

The unsolved ones are:

https://privatekeys.pw/puzzles/0.2-btc-puzzle
0.2 BTC Puzzle
Status: UNSOLVED
Prize: 0.2 BTC
Start Date: 2020-05-10
Address: 1KfZGvwZxsvSmemoCmEV75uqcNzYBHjkHZ

https://privatekeys.pw/puzzles/0.01-btc-corey-phillips-puzzle
0.01 BTC Puzzle by Corey Phillips
Status: UNSOLVED
Prize: 0.01 BTC
Creator: Corey Phillips
Start Date: 2019-07-09
Address: bc1qcyrndzgy036f6ax370g8zyvlw86ulawgt0246r


https://privatekeys.pw/puzzles/gsmg-puzzle
5 BTC Puzzle by GSMG.IO
Status: UNSOLVED
Prize: 2.5 BTC (was 5 BTC)
Owner: gsmg.io
Start Date: 2019-04-13
Address: 1GSMG1JC9wtdSwfwApgj2xcmJPAwx7prBe

https://privatekeys.pw/puzzles/0.03-btc-coinmonks-puzzle
0.03 BTC Puzzle by Coinmonks
Status: UNSOLVED
Prize: 0.03 BTC
Owner: Coinmonks
Start Date: 2019-02-11
Address: 1K4ezpLybootYF23TM4a8Y4NyP7auysnRo

https://privatekeys.pw/puzzles/0.005-btc-lvl5-puzzle
0.005 BTC Level 5 Puzzle by Zden
Status: UNSOLVED
Prize: 0.0055555 BTC
Creator: Zden
Start Date: 2018-11-09
Address: 1cryptoGeCRiTzVgxBQcKFFjSVydN1GW7

So, feel free to add these ones to your list.
legendary
Activity: 3444
Merit: 10537
Quote
It takes a higher computational power to reverse the private key to public key operation or compute private key from signature.

I think it’s a typo mistake here, reversing or decryption of this key pair will actually be public key back to the private which is the encryption
I'm talking about the Elliptic Curve Point Multiplication operation where you compute the public key from private key. This is irreversible. Or in another words you need an impossible amount of computational power to reverse the "private key to public key" operation.
In technical terms that is to solve Elliptic Curve Discrete Logarithm Problem or ECDLP for short.

You are also using the term "decryption" wrong. Decryption demands a cipher text (encrypted message using a password).
hero member
Activity: 672
Merit: 855
ECDSA is a signature algorithm. SA at the end stands for it too: Elliptic Curve Digital Signature Algorithm.

Thanks for the correction, was just trying to differentiate between the ECDSA and SHA 256 that both aren’t an encryption, but the former his, which you just prove is wrong. I misunderstood it because the asymmetric encryption is similar, that is creating two pairs of key with one been an encryption and the other to decrypt it.

Quote
It takes a higher computational power to reverse the private key to public key operation or compute private key from signature.

I think it’s a typo mistake here, reversing or decryption of this key pair will actually be public key back to the private which is the encryption
hero member
Activity: 828
Merit: 657
ECDSA is a signature algorithm. SA at the end stands for it too: Elliptic Curve Digital Signature Algorithm.

Thank you, just to add something to that there is another algorithm that use Eliptic Curves to establish a shared secret between two pairs of keys ( public and private) : Elliptic-curve Diffie–Hellman

This one allows to create a Shared secret that can be use used as KEY for Symetric Encryption bewteen Alice and Bob...
legendary
Activity: 3444
Merit: 10537
ECDSA is an encryption algorithm,
ECDSA is a signature algorithm. SA at the end stands for it too: Elliptic Curve Digital Signature Algorithm.

Quote
specifically an asymmetric algorithm which uses two keys which is the private key for encryption and the public key for decryption, this also requires a higher computational power to decrypt the original input.
It takes a higher computational power to reverse the private key to public key operation or compute private key from signature.
hero member
Activity: 828
Merit: 657
I don't understand the first one

The first is more or less easy to understand if you know the value of the secret Nonce K using in an ECDSA signature you can calculate the private key with no effort.. Now some of you maybe heard about That a repeated R value in two signatures of the same public key can lead to disclose the Private Key... well that is the same if you KNOW the relationship between two signatures if you that K1 is X value +/- K2 or some other weird relationship them the Private Key can be solved easily.

About that i did a real puzzle in: Second small puzzle about ECDSA and other computers topics

Here is satoshi response to a hash 256 getting broken in future

Thank you for the satoshi quote about it.

Do you imagine that? if Sha256 is broken, the entire bitcoin mining industry will be collapsed by a single machine with a proper algorithm... And not only that most of the security of internet that depends of sha256 will be compromised in someway.

hero member
Activity: 672
Merit: 855
I don't understand the first one but regarding the last two, isn't it extremely difficult and impossible to break ECDSA and Sha256 encryption? I am sure if there was some fault it would have been discovered long ago.

There is a little difference, SHA256 is not an encryption but rather a hash function which is a one way algorithm that is almost impossible to reverse because the computational power needed to actually is not something that can be done soon. ECDSA is an encryption algorithm, specifically an asymmetric algorithm which uses two keys which is the private key for encryption and the public key for decryption, this also requires a higher computational power to decrypt the original input.

But as science would have it, there is nothing that they see impossible, we have heard or seen other algorithms that were first developed to be impossible to be broken get broken. But this wouldn’t happen overnight so before it would actually poses threat to the algorithm (like this hash used today gets broken) we will would migrate.

Here is satoshi response to a hash 256 getting broken in future

SHA-256 is very strong.  It's not like the incremental step from MD5 to SHA1.  It can last several decades unless there's some massive breakthrough attack.

If SHA-256 became completely broken, I think we could come to some agreement about what the honest block chain was before the trouble started, lock that in and continue from there with a new hash function.

If the hash breakdown came gradually, we could transition to a new hash in an orderly way.  The software would be programmed to start using a new hash after a certain block number.  Everyone would have to upgrade by that time.  The software could save the new hash of all the old blocks to make sure a different block with the same old hash can't be used.
legendary
Activity: 3738
Merit: 1708
I don't understand the first one but regarding the last two, isn't it extremely difficult and impossible to break ECDSA and Sha256 encryption? I am sure if there was some fault it would of been discovered long ago.

Yeah that would be like someone offering to pay $1M if someone could crack the private key of one of Satoshi's early mined blocks. Basically its pretty much impossible and hence the $1M reward would never be paid and would be a big waste of time for anyone attempting to crack it.
hero member
Activity: 828
Merit: 657
I know that those aren't a common kind of posts here but i today i saw one more of them, so here is the compilation:

Bitcoin puzzle (3,350.00 BTC's )
The user bytcoin offers a bounty of 3350BTC to anyone who can solve his forged signature he explain the relationship between the original signature and the forged one.

math puzzle - if solve I pay:)
The user ecdsa123 offers a small bounty of 2000$ USD to anyone who can provide an algorithm to break ECDSA having two random signatures.

Some BTC to whom solve the puzzle
The user itiswhatitis12345 offers a bounty of 0.1BTC to anyone that can reverse some specific sha256 hash, his only hint is that the original text is a "meaningful sentence"


If you know some other challenge/puzzle and you believe that it is fake/unsolvable please let me know.
Jump to: