Author

Topic: Lattice attack example with nonce finder. (Read 330 times)

member
Activity: 406
Merit: 47
December 31, 2021, 07:40:56 PM
#9

No wallet uses the same r value for transactions / signatures. So our transactions / signatures are safe.

If you can solve it for 2 different r (r1 and r2), then you can post it here and will get thousands of merits  Smiley  Happy new year!

I don't know inside  deep Signature algorithm calculate how to generate R but if nonce use create is 256 bit, that mean you need to find private key 256 bit number for can find out


 Happy new year!
full member
Activity: 233
Merit: 253
December 31, 2021, 02:29:53 PM
#8
r  = 0xd47ce4c025c35ec440bc81d99834a624875161a26bf56ef7fdc0f5d52f843ad1
s1 = 0x44e1ff2dfd8102cf7a47c21d5c9fd5701610d04953c6836596b4fe9dd2f53e3e
s2 = 0x9a5f1c75e461d7ceb1cf3cab9013eb2dc85b6d0da8c3c6e27e3a5a5b3faa5bab
z1 = 0xc0e2d0a89a348de88fda08211c70d1d7e52ccef2eb9459911bf977d587784c6e
z2 = 0x17b0f41c8c337ac1e18c98759e83a8cccbc368dd9d89e5f03cb633c265fd0ddc

No wallet uses the same r value for transactions / signatures. So our transactions / signatures are safe.

If you can solve it for 2 different r (r1 and r2), then you can post it here and will get thousands of merits  Smiley  Happy new year!
member
Activity: 406
Merit: 47
December 31, 2021, 09:45:33 AM
#7

I am not sure I am right or not just guess
about nonce on signature I think should check at
https://asecuritysite.com/signatures/ecd5

and use with sample at
https://hackernoon.com/hacking-a-bitcoin-wallet-642u36sa
https://allprivatekeys.com/random-vulnerability

r  = 0xd47ce4c025c35ec440bc81d99834a624875161a26bf56ef7fdc0f5d52f843ad1
s1 = 0x44e1ff2dfd8102cf7a47c21d5c9fd5701610d04953c6836596b4fe9dd2f53e3e
s2 = 0x9a5f1c75e461d7ceb1cf3cab9013eb2dc85b6d0da8c3c6e27e3a5a5b3faa5bab
z1 = 0xc0e2d0a89a348de88fda08211c70d1d7e52ccef2eb9459911bf977d587784c6e
z2 = 0x17b0f41c8c337ac1e18c98759e83a8cccbc368dd9d89e5f03cb633c265fd0ddc

will get result  k(nonce) = 55228977394393414412853003502097247104908965897402951232160234933662925082798
I not sure I calculate wrong or not I don't know  some  good code on python for check it

I think all signature nonce is 256 bit not 128 bit   (it not same bitcoin block is a 32-bit (4-byte) _
so it not easy to crack it for high 256 bit nonce

member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
December 31, 2021, 01:18:26 AM
#6
I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

that method is may be on theory only because that script it generate itself both private key and public key it is complete run on script
it not work in real
for improve or testing you need to try spilt generate part and LLL method part and test it

function ecdsa.ecdsa.Public_key can not easy to put manual public key proint for test it need to modify to can use easy

sorry I am not coder pro, I just try testing it but can not apply to advance
how every I think method we found on internet it never work with high bit puzzle may be need some complex method

Another method what work on real eth daa. Research some pdf's eth nonce id static and = p/2etc...


https://medium.com/@pierreia/quick-tour-on-ethereum-private-keys-attacks-3082846b7632



Soft for attack awaliable on github.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
December 31, 2021, 01:17:41 AM
#5
I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

that method is may be on theory only because that script it generate itself both private key and public key it is complete run on script
it not work in real
for improve or testing you need to try spilt generate part and LLL method part and test it

function ecdsa.ecdsa.Public_key can not easy to put manual public key proint for test it need to modify to can use easy

sorry I am not coder pro, I just try testing it but can not apply to advance
how every I think method we found on internet it never work with high bit puzzle may be need some complex method

Another method what work on real eth daa. Research some pdf's eth nonce id static and = p/2etc...


https://medium.com/@pierreia/quick-tour-on-ethereum-private-keys-attacks-3082846b7632
member
Activity: 406
Merit: 47
December 30, 2021, 10:12:34 PM
#4

you need to try create file h5py by using that algorithm new one again using python generate that serial binary file



I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd

that method is may be on theory only because that script it generate itself both private key and public key it is complete run on script
it not work in real
for improve or testing you need to try spilt generate part and LLL method part and test it

function ecdsa.ecdsa.Public_key can not easy to put manual public key proint for test it need to modify to can use easy

sorry I am not coder pro, I just try testing it but can not apply to advance
how every I think method we found on internet it never work with high bit puzzle may be need some complex method
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
December 27, 2021, 11:21:45 PM
#3
I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.

Try this another example https://asecuritysite.com/ecc/ecd
full member
Activity: 162
Merit: 230
December 27, 2021, 05:49:27 PM
#2
I think this article isn't useful to you, as it describes a situation where someone has connected an oscilloscope to the hardware generating the public key.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Jump to: