Author

Topic: Modulus illusion (Read 161 times)

legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
February 29, 2024, 04:36:35 AM
#6
As far as I can tell you can't use the fact that key 1 and 2 are a known distance away from each other to discern anything about them. It's a single equation with two unknowns. Example: X + Y = 123, but X and Y could be 0 and 123, or they could be -113258881385746098181140976018376643534 and 113258881385746098181140976018376643657, or any other number.

Another way to think about it: Pick any arbitrary random public key from the blockchain, like say, the genesis block coinbase key, and call it #A1. Calculate #3 - #A1, and call the result #B1. You now have two keys #A1 and #B1 that when added gives #3, the exact same situation in your original question.

If this process would give you any insight into the private key of #A1, elliptic curve cryptography would be fundamentally broken.

This is basically the only possible answer.

While you could get the *public keys* of this sort of operation if you were doing the arithmetic between private keys (and indeed this is what I initially thought the OP was trying to do until I saw the 02 and 03 at the beginning of all the strings), it does not work the other way around.

Public key arithmetic without the private keys is really only interesting to cryptographers.
jr. member
Activity: 53
Merit: 11
February 29, 2024, 04:11:00 AM
#5
You get the "between" keys ( i call them brothers and sisters ), relevant to your base keys. That´s why you don´t find and see them, and that is the reason kangaroo won´t work.

Look at my post, remember when you ask to search for a public key.

https://bitcointalksearch.org/topic/only-math-is-the-way-of-private-key-5483513
full member
Activity: 161
Merit: 230
February 27, 2024, 08:40:28 PM
#4
As far as I can tell you can't use the fact that key 1 and 2 are a known distance away from each other to discern anything about them. It's a single equation with two unknowns. Example: X + Y = 123, but X and Y could be 0 and 123, or they could be -113258881385746098181140976018376643534 and 113258881385746098181140976018376643657, or any other number.

Another way to think about it: Pick any arbitrary random public key from the blockchain, like say, the genesis block coinbase key, and call it #A1. Calculate #3 - #A1, and call the result #B1. You now have two keys #A1 and #B1 that when added gives #3, the exact same situation in your original question.

If this process would give you any insight into the private key of #A1, elliptic curve cryptography would be fundamentally broken.
jr. member
Activity: 50
Merit: 3
February 27, 2024, 01:02:28 PM
#3
Of course, I already know what you explained,  my question is where should I look for any of the 3 unknown points or any of their offsets?  Whether I can find any of them  below the range of scalar #3 or above that range?  As I have tried kangaroo with no success.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
February 26, 2024, 01:49:17 PM
#2
Note that scalar 1, 2 and 4 result in different points than above points but they do behave similar when working with 3. Why is that?
Because they are all mathematically related.

  • #1 + #2 = #3
  • #1 - #2 = #4

Given these, #3 - #4 = #1 + #2 - (#1 - #2) = #1 + #2 - #1 + #2 = 2 * #2. So, yes, if you subtract #4 from #3, you get double #2.
jr. member
Activity: 50
Merit: 3
February 26, 2024, 11:23:17 AM
#1
I have difficulties to understand the following results, can someone explain?

I have these keys
#1=
Code:
03f4bef7834ec36e40f1c007a4c27c2f7d2ded709fda3333fdd5801625736ed152
#2=
Code:
03389523df912b20e7f5b2223f50a3e074551d3859487701d9e6297b950c9a78ea
Adding two keys gives me this one
#3=
Code:
0390823e1bb57e0b3492019544a0b3d4fcdfe51e843b417becd3d3285c9c154d0d
Private_key=
0x000000000000000000000000000000000000000000000200ddfe92f46681b20a
If I subtract #2 from #1, we'd have this
#4=
Code:
032b0d9abd02f210631ca0fdf138a19c6725f6b67f2dba6c22bf181c73e81abd08
Then if we subtract #4 from #3, it would give us double of #2.
But I'm going to make it much easier for you to understand by showing scalar instead of points.

We have these
#1=
0x1c16e0f93f27c98dfa5
#2=
0x3f6feeff01e9e8d265
#3=
0x200ddfe92f46681b20a
#4=
0x181fe2094f092b00d40

Everything I do with 4 keys above is related to key #3, but I can't solve any of the other 3 keys even though whatever I do always gives me correct points, where is my mistake?

Note that scalar 1, 2 and 4 result in different points than above points but they do behave similar when working with 3. Why is that?
Jump to: