Pages:
Author

Topic: Let test my scrypt for find a privkey ? (Read 1486 times)

legendary
Activity: 2870
Merit: 7490
Crypto Swap Exchange
August 27, 2022, 07:55:53 AM
#68

@fxsniper already answer your question. But i'd like to let you know there's thread discussing that tool at lattice-attack || how to run without error.
member
Activity: 406
Merit: 47
August 26, 2022, 07:11:32 AM
#67

gen_data.py is make data for use it

run script  gen_data.py
then you got file data.json
and run  lattice_attack.py

or

run script  gen_data.py -f filename
then you got the file filename.json
and run  lattice_attack.py -f filename

I test already if not have a leak nonce it not works
test with a fake nonce leak (random) it never works

member
Activity: 174
Merit: 12
copper member
Activity: 421
Merit: 29
January 18, 2022, 02:32:27 PM
#65
Send a bitcoin transaction message, R,S, nonce and I will try find a privkey.

Probability of success 90 %

Huh

Good Luck !!

https://youtube.com/watch?v=-UcCMjQab4w
You can't take advantage of the bug. You're 5 or more years late. No program will help you, you will only spend money and get nothing in return.
member
Activity: 330
Merit: 34
January 07, 2022, 04:44:20 PM
#64
for rsz
maybe helpfull to you
https://github.com/kanhavishva/rsz
newbie
Activity: 13
Merit: 0
January 04, 2022, 06:58:46 AM
#63
@COBRAS How this communicate with private keys from ooin2 and point 3 ? Try make example with 110 and 90 bit pubkeys and privkeys ?

just my idea please make and modify div(point1,point2),multi(point1point2) python code

https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalksearch.org/topic/m.58488513
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
December 26, 2021, 02:43:17 AM
#62

Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
thanks
Code:
mausuv, What is that number?
its reflect hex_number trickee


https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalksearch.org/topic/m.58488513

Code:
Point1 = (x1,y1)
Point2 = (x2,y2)

Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)


i need two point use div Point5 = div(Point1,Point2) #remove Scalar option
i need two point use mul Point6 = mul(Point1,Point2) # remove Scalar option
eny method Point1,Point2 use div and mul get therd point #mybadenglish
read my top 2 link modify please..

its posible remove scalar
Code:
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)

How this communicate with private keys from ooin2 and point 3 ? Try make example with 110 and 90 bit pubkeys and privkeys ?
jr. member
Activity: 70
Merit: 1
December 26, 2021, 01:16:42 AM
#61

Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
thanks
Code:
mausuv, What is that number?
its reflect hex_number trickee


https://github.com/ragestack/EC-Point-Operations/blob/master/EC_Math.py
https://bitcointalksearch.org/topic/m.58488513

Code:
Point1 = (x1,y1)
Point2 = (x2,y2)

Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)


i need two point use div Point5 = div(Point1,Point2) #remove Scalar option
i need two point use mul Point6 = mul(Point1,Point2) # remove Scalar option
eny method Point1,Point2 use div and mul get therd point #mybadenglish
read my top 2 link modify please..

its posible remove scalar
Code:
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
    A = (N-1)/Scalar
    Px,Py = ECmul(Qx,Qy,A)
    Py = P-Py
    return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)
member
Activity: 406
Merit: 47
December 25, 2021, 07:00:09 AM
#60

Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
TheArchaeologist  correct

python
>>> hex(int(0x9cbdfb599ed0100/10))[2:]
'fac99228fe19b0'


mausuv, What is that number?
sr. member
Activity: 310
Merit: 727
---------> 1231006505
December 25, 2021, 05:54:00 AM
#59
i know [:-1] this method use remove the last digit,but i need mathematically steps like + - * /

why i am post this topic  Smiley mathbehind crack ecdsa Wink

example input:
9cbdfb599ed0100
ce5efdaccf68080
1cbdfb599ed0100
397bf6b33da0200

i need output:
9cbdfb599ed010
ce5efdaccf6808
1cbdfb599ed010
397bf6b33da020
solve the math write here... :Note only last digits remove #mybadandgoodenglish
Just divide by 10:
9cbdfb599ed0100 / 10 = 9cbdfb599ed010
ce5efdaccf68080 / 10 = ce5efdaccf6808
etc.
jr. member
Activity: 70
Merit: 1
December 23, 2021, 07:23:11 AM
#58
@all
@stanner.austin
@fxsniper
@Cryptosirr
hi guys Wink solve this math example 9cbdfb599ed0100
problem: how to remove last digit zero,,
i know [:-1] this method use remove the last digit,but i need mathematically steps like + - * /

why i am post this topic  Smiley mathbehind crack ecdsa Wink

example input:
9cbdfb599ed0100
ce5efdaccf68080
1cbdfb599ed0100
397bf6b33da0200

i need output:
9cbdfb599ed010
ce5efdaccf6808
1cbdfb599ed010
397bf6b33da020
solve the math write here... :Note only last digits remove #mybadandgoodenglish
member
Activity: 406
Merit: 47
December 22, 2021, 07:41:55 AM
#57

I use same script just copy Bitcoin testnet raw transaction to
I got result

('THE R VALUE is  :', '503434f27f0d5dc23c01a5d2b2b2abb902e2816987515dafa619ffded8fc2ec6')
('THE S VALUE is  :', '4c30c0b82c9afd623e140bf2d6badfa2f02414ef3ffc603e83f2f65a264ce2b8')
('THE Z VALUE is  :', 'c340c9ece755e54bf99c34386eb8e19befd76cb3ddd5b47a4d52be65fea05b6d')
('THE PUBKEY is :', '0355d77643f9bbccde7a1f05d8fa72c0b6c53075cdc299753242320ef9c6611233')


if I know Key how I can calculate and got result same on testnet
member
Activity: 69
Merit: 53
December 21, 2021, 03:06:58 AM
#56
@mausuv
Hi
Your raw data for that tx is decoded this ways.
Code:
01000000 //message version
01 //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422 // PROV HASH
01000000 // PROV HASH INDEX
6A4730440220 //SCRIPT LEN 0x6A + SCRIPT DATA 0x47 WITH R,S,X point compressed or full pub key
503434F27F0D5DC23C01A5D2B2B2ABB902E2816987515DAFA619FFDED8FC2EC6 // R
0220
4C30C0B82C9AFD623E140BF2D6BADFA2F02414EF3FFC603E83F2F65A264CE2B8 // S
0121
0355D77643F9BBCCDE7A1F05D8FA72C0B6C53075CDC299753242320EF9C6611233 //PUB KEY X POINT
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 // OUTPUT AMOUNT
1976A914
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000

details of input and output address need for Z
Code:
OUTPUT ADDRESS mxR3WHpKxCjgYvoh5VS72HF2y8HHfhZfKG
6F //TEST NET
B95BFE11C932408AE44DA26872B3C8CD5D61691A //ADDRESS
D05ED3BB //CHECKSUM

INPUT ADDRESS mpPQhMr2CuRn1AQJgCmcMhH8PgrYaKknSa
6F //TEST NET
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //ADDRESS
7A6D71D7 //CHECKSUM

data for Z making for DOUBLE SHA2 (2 time SHA2 used )
Code:
01000000      //message version
01          //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422    // PROV HASH
01000000     // PROV HASH INDEX
1976A914
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //INPUT ADDRESS
88AC
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 //OUTPUT AMOUNT
1976A914 // SCRIPT DATA
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000 //LOCK TIME
01000000 //SHA2

result
C340C9ECE755E54BF99C34386EB8E19BEFD76CB3DDD5B47A4D52BE65FEA05B6D

if you have more then 01 input you have to add more data after first SEQ
if you have more then 01 output you have to add each output in each Z data calculation after first output data.
jr. member
Activity: 70
Merit: 1
December 21, 2021, 01:30:28 AM
#55
iknow r s1s2  value
i need z1z2 how to calculate
i read this post explain testnet ,i am not understad https://bitcointalksearch.org/topic/m.56686056
https://bitcointalksearch.org/topic/m.10669517 #read 1,3page

please explain stepy by step calulate z1z2  from bitcoin mainet or write code #mybadenglish

run this script https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
output : show r s1s2 z1,z2
but i got error what my mistake

https://tbtc.bitaps.com/raw/transaction/ff948290ff332aed8f0e5d767118a02e8671578c6775a333bb4ee4d6ccfcf639
i am enter raw tx i got error https://github.com/FoxxD3V/btc-rsz/blob/master/RawTX_RSZ.py
Code:
Traceback (most recent call last):
File "RawTX_RSZ.py", line 13, in
s = keyUtils.derSigToHexSig(m[1][:-2])
File "/home/runner/btc-rsz/keyUtils.py", line 32, in derSigToHexSig
x, s = ecdsa.der.remove_integer(s)
File "/usr/local/lib/python2.7/dist-packages/ecdsa/der.py", line 218, in remove_integer
raise UnexpectedDER("Negative integers are not supported")
ecdsa.der.UnexpectedDER: Negative integers are not supported
i know r s1s2
i need z1z2 value please how to get z1z2 #mybadenglish
member
Activity: 330
Merit: 34
October 30, 2021, 02:13:54 AM
#53

I would like to learning an understand this method  use R S Z value?
What good article document or youtube to can read and learn easy explain about it , please advice?

if I have private key can I calculate R S Z value?
What is formula for calculate R S Z how to calculate none?
study here
https://www.koreascience.or.kr/article/JAKO202011161035971.jsp-kj=SSMHB4&py=2012&vnc=v27n6&sp=588
member
Activity: 406
Merit: 47
October 28, 2021, 10:17:25 PM
#52

I would like to learning an understand this method  use R S Z value?
What good article document or youtube to can read and learn easy explain about it , please advice?

if I have private key can I calculate R S Z value?
What is formula for calculate R S Z how to calculate none?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
October 28, 2021, 07:17:50 PM
#51
sorry to say, link was
https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.tex
removing part of these from my post
btw my monkey brain was thinking, first thread created about scrypt buy/sell, some time later that show was ended  then all start discusion at " Let test my scrypt for find a privkey "
and actual title should be " Let test my scrypt for generate R S Z " similar...
and i see that show was ended too, could you please update last post whats new thread for new show, that will help us to come and enjoy those next shows,
Thankx

Show not end, but using shit generated data of r,z,s is a bad idea... Then paste this data to scrypt, only God, can help make scrypt working(I'm serious)...because generated data not on the curve f##k...God is great.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
October 28, 2021, 07:10:32 PM
#50
Here you give COBRAS just the Parameters  r s z h and nonce and COBRAS gives you Privet.

Its like
a = b + c where he gives you c when you give him a and b. Very hard math.

Yeas, if all be good you will be my r,s,z calculator tester Bro )))) and I will pay you 1 privkey for your pubkey for your work. Grin Grin Grin Grin
a.a
member
Activity: 126
Merit: 36
October 28, 2021, 04:23:14 PM
#49
Here you give COBRAS just the Parameters  r s z h and nonce and COBRAS gives you Privet.

Its like
a = b + c where he gives you c when you give him a and b. Very hard math.
Pages:
Jump to: