Pages:
Author

Topic: Private key hack new method (Read 980 times)

copper member
Activity: 193
Merit: 235
Click "+Merit" top-right corner
August 27, 2020, 07:24:27 PM
#35
If you or anyone else could calculate private keys from public keys, you would accomplish one thing: bringing down the value of Bitcoin to zero.
member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 27, 2020, 01:23:37 PM
#34
I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]

[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh

Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.

Did you fined something before 2015 ? Before 2015 is 256 bytes too and Kangaroo just time waster in task to crack 256 bytes.
legendary
Activity: 2310
Merit: 1422
August 27, 2020, 01:18:25 PM
#33
In my start post I was show a private key -base point-public key and address with 1000 BTC. Shocked
Well you have the private key, go sweep the 1000 BTC then.

This private key for different base point !!! Need someone who can make a code for find privkey for legit base point this info about this modified base point, and legit private key for this modified base point.

With 500 BTC any of us can be a king of some African country. Yes, if someone disappointed, and not thant get any btc from block chain this is mistake for future all life for him. So, lets make a code and go, Brothers !!!!  I can provide more examples of privkey+basepoint+pubkey's !!!

I gave you a bit of credit, but I lost you at the king of some African country part. /s
Have fun cracking private keys with your script, if you are super lucky you might unleash satoshi's wealth. And then you would be the new king of bitcoin.
In the meantime read this https://www.quora.com/Is-it-possible-for-someone-to-guess-a-private-key-to-a-Bitcoin-wallet-and-steal-the-coins
full member
Activity: 706
Merit: 111
August 27, 2020, 11:43:10 AM
#32
I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]

[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh

Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.



What's special about public keys exposed before 2015?

member
Activity: 74
Merit: 10
August 27, 2020, 10:48:02 AM
#31
I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]

[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh

Well, why dont you use Pollard on any public key exposed before 2015 with a balance. Much easier than what you are trying to do. Or even throw ina few custom spartan 6 to spin off that private key recovery.
sr. member
Activity: 443
Merit: 350
August 18, 2020, 05:24:24 AM
#30
The set of elliptic curve points is a wheel (repeating from the beginning as soon as reach the order). Actually you try to straighten the wheel, starting from different points (base point) considering the start of length as the base point.

There is no advantage in it. So do not waste your time.
member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 17, 2020, 08:06:52 PM
#29
@mamuu, Im go to sleep now. I will answer you in the morning.

But I not understand why you always multiply some number to stable Q. If you mean what Q is a basepoint, so, you need Q<> QPublickkey.

And were is your private key ?

You know SAGE this is a good news.
member
Activity: 71
Merit: 19
August 17, 2020, 07:53:21 PM
#28
Code:
sage: P
115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: EE
Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q
(52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage:
sage: G
(55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G
(60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q
(9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G
(26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1)
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G)
Adres:  1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF  Balance:  0  Tx:  0
Adres:  1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj  Balance:  0  Tx:  0
Adres:  1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi  Balance:  0  Tx:  0
Adres:  1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G)
Adres:  14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3  Balance:  0  Tx:  0
Adres:  18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc  Balance:  0  Tx:  0
Adres:  1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS  Balance:  0  Tx:  0
Adres:  1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)
Adres:  19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS  Balance:  0  Tx:  0
Adres:  16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso  Balance:  0  Tx:  0
Adres:  14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA  Balance:  0  Tx:  0
Adres:  14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7  Balance:  0  Tx:  0
sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage: SmartAttack(G,Q,P)%P
49507345783879453664137177101856360142284501228139827997787302912743629416333
sage: SmartAttack(G,2*G,P)%P
92776810360347062140128362771302456139448233644672974681811545519691306070200
sage:


there is no fakeBP, all of them Q, Q is k.G

36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G

if you want solve fakeBP, you can use ECDLP solver(like kangaroo)

SmartAttack work on anomalous curve because trace of one

but if work on sec curves, then  always one result.

Code:
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)

sage: str('02')+hex(41092972045662183626692698115026263699106807529773860274318687111639116151521).lstrip("0x")
'025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1'

sage : ku 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1

input                        : 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
network                      : Bitcoin mainnet
symbol                       : BTC
public pair x                : 41092972045662183626692698115026263699106807529773860274318687111639116151521
public pair y                : 25612602434799576731996141476317124058234433726241370033130536741579356668244
 x as hex                    : 5ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
 y as hex                    : 38a03820dcda0c431bf15f4fe897d36c5053981610b20e1699853a00b3248154
y parity                     : even
key pair as sec              : 025ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1
 uncompressed                : 045ad9cc469e32ea3d294a152b78bfded6ad47cfb9d5d9e52e201cd93d0c05fae1\
                                 38a03820dcda0c431bf15f4fe897d36c5053981610b20e1699853a00b3248154
hash160                      : d7b1951a0da15bce93d296b386b4e473e8c00c65
 uncompressed                : 479cbe0cd292709e8595c541146cd6231add3eda
Bitcoin address              : 1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK
Bitcoin address uncompressed : 17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ
Bitcoin segwit address       : bc1q67ce2xsd59duay7jj6ecdd8yw05vqrr9yd638m
p2sh segwit                  : 38Hhqsz98m8bjAJ9JhrN6RMx25Kz32UdS4
 corresponding p2sh script   : 0014d7b1951a0da15bce93d296b386b4e473e8c00c65

sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage:


CC() is check balance function on ellipticcurve points for bitcoin

Code:
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)

sage: FakeBP
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)

sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == FakeBP
True
sage:

member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 17, 2020, 07:32:10 PM
#27
Code:
sage: P
115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: EE
Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q
(52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage:
sage: G
(55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G
(60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q
(9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G
(26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1)
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G)
Adres:  1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF  Balance:  0  Tx:  0
Adres:  1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj  Balance:  0  Tx:  0
Adres:  1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi  Balance:  0  Tx:  0
Adres:  1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G)
Adres:  14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3  Balance:  0  Tx:  0
Adres:  18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc  Balance:  0  Tx:  0
Adres:  1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS  Balance:  0  Tx:  0
Adres:  1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)
Adres:  19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS  Balance:  0  Tx:  0
Adres:  16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso  Balance:  0  Tx:  0
Adres:  14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA  Balance:  0  Tx:  0
Adres:  14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7  Balance:  0  Tx:  0
sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage: SmartAttack(G,Q,P)%P
49507345783879453664137177101856360142284501228139827997787302912743629416333
sage: SmartAttack(G,2*G,P)%P
92776810360347062140128362771302456139448233644672974681811545519691306070200
sage:


there is no fakeBP, all of them Q, Q is k.G

36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G

if you want solve fakeBP, you can use ECDLP solver(like kangaroo)

SmartAttack work on anomalous curve because trace of one

but if work on sec curves, then  always one result.

if conwert curve equation, the trase will be not one. A forget form what without this bag(I mean secure and trace one, not secure - no bug)


CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)


what is it ? so you find private key for 10k btc ? Or this is a privkey * to Q ?

and what is this - "sage: CC(Q)"?
member
Activity: 71
Merit: 19
August 17, 2020, 07:20:08 PM
#26
Code:
sage: P
115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: EE
Elliptic Curve defined by y^2 = x^3 + 7 over Finite Field of size 115792089237316195423570985008687907853269984665640564039457584007908834671663
sage: Q
(41092972045662183626692698115026263699106807529773860274318687111639116151521 : 25612602434799576731996141476317124058234433726241370033130536741579356668244 : 1)
sage: 87954421572711191797409873682088439575132560617980964771068188888320747613432 *Q
(52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q
(27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)
sage:
sage: G
(55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q +G
(60514677919760207795808847379414464935859540298217373706884704950585656052831 : 92467424300256128213756399718584656167407456241133297890405049170425502221771 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113501*Q
(9870940521884748245828036059372982985243987669974027519407180018299448314799 : 84417392858735638984503471023078768847021781340877352409438879295369906944372 : 1)
sage: 36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G
(26526818200564724704301259892364899649062843225393016254446718809459073971066 : 58177991911204874107434935003117119688646076024935570317854531999248293096805 : 1)
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -G)
Adres:  1BLBtz4sZgDkCYaLAx1g17jfiLHPpiojEF  Balance:  0  Tx:  0
Adres:  1B9kyL7qFSZaNRnkR3745zhg4vk3ZjSVPj  Balance:  0  Tx:  0
Adres:  1JBLMwzGGRAga5oXSoh9aBCxFVT7t4wNRi  Balance:  0  Tx:  0
Adres:  1BqzGKfAMj6AX9pdZG8C6AiDyaRqXPMpGc  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q -2*G)
Adres:  14WtPAwTx3Wtp2pYrreztZy3FqVXWx7eQ3  Balance:  0  Tx:  0
Adres:  18HrA6fh3TjzxZ9CgkeL1ebDqZAP94xoNc  Balance:  0  Tx:  0
Adres:  1BUXyr7653i4p5Zy85SXiHbrp6fnPjqCRS  Balance:  0  Tx:  0
Adres:  1K3gF1uBixEgXbQjY9VUPHFH1nzVgbqkS4  Balance:  0  Tx:  0
sage: CC(36540658479409362678121339879672694014739785286643571088000951145429744113500*Q)
Adres:  19qRsrAmc8ZfeAE8fLH7bguvWfTZ3MrLLS  Balance:  0  Tx:  0
Adres:  16KrAKZ6SPESWL1RBkhSbjRwUzbSwBfRso  Balance:  0  Tx:  0
Adres:  14B6z3QgLL6ygX27EjzjjgFMvQkumE41AA  Balance:  0  Tx:  0
Adres:  14LnUUW8dX5Zh3YpddjVDFh24TZMdaf8S7  Balance:  0  Tx:  0
sage: CC(Q)
Adres:  17XekGktaj9DMi61ndokjN6Sx7LNWsVYjQ  Balance:  0  Tx:  0
Adres:  1LfV1tSt3KNyHpFJnAzrqsLFdeD2EvU1MK  Balance:  10000.00188824  Tx:  46
Adres:  187cn4uGjP1rvjrPzSyWzQhX5rhz62ArNm  Balance:  0  Tx:  0
Adres:  1CVZtk2czeMQeRfSeKNHYTDSMJEBXTS21Z  Balance:  0  Tx:  0
sage: SmartAttack(G,Q,P)%P
49507345783879453664137177101856360142284501228139827997787302912743629416333
sage: SmartAttack(G,2*G,P)%P
92776810360347062140128362771302456139448233644672974681811545519691306070200
sage:


there is no fakeBP, all of them Q, Q is k.G

36540658479409362678121339879672694014739785286643571088000951145429744113500*Q == 36540658479409362678121339879672694014739785286643571088000951145429744113500*k*G

if you want solve fakeBP, you can use ECDLP solver(like kangaroo)

SmartAttack work on anomalous curve because trace of one

but if work on sec curves, then  always one result.
member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 17, 2020, 06:13:44 PM
#25
hi there,
you could checkout https://pypi.org/project/eciespy/
i guess some of the things you need.


need someone who know how to subtract from basepoint fakeBP and after add and then what's left to add to the private key
full member
Activity: 427
Merit: 105
August 17, 2020, 05:48:57 PM
#24
hi there,
you could checkout https://pypi.org/project/eciespy/
i guess some of the things you need.
member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 17, 2020, 05:26:00 PM
#23
I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]




[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh


hi
where is the method ?  did you read new model POW attack ?

Need modify fake base point and get valid privkey. This is not to hard task, bat needed math knowledge.

I hope there is someone who will make the code.
member
Activity: 71
Merit: 19
August 17, 2020, 03:44:56 PM
#22
I know a method how to find a private key for any publick key, but with modified base point(false BP).

If someone making a code for calculating a private key for real base point, I will share code for find a private key for false base point and REAL publick key.

This is a examles:

Code:
Real BTC Basepoint (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)


False BTC Base Point [u](52426333756564302526085053269432084545410002202648992412042160756077650870390 : 79709923240617764371931483354308897031409999608033097982950682278401348639896 : 1)[/u]

[b]REAL Public key[/b] Q(41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Public key generated[/b] Q1 (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

[b]Q1==Q True[/b]




[b]Private key [/b]87954421572711191797409873682088439575132560617980964771068188888320747613432 !!!




Any help are welcome !!!

Huh


hi
where is the method ?  did you read new model POW attack ?
legendary
Activity: 2646
Merit: 1720
https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF
August 17, 2020, 11:39:18 AM
#21
lolz ... close, but no cigar ... now go here OP ...  Cheesy

How hard would it be to brute force an address. (Numerically)
- https://bitcointalksearch.org/topic/how-hard-would-it-be-to-brute-force-an-address-numerically-5267859
staff
Activity: 4172
Merit: 8419
August 17, 2020, 10:17:34 AM
#20
You also can't just come up with any domain parameters you like,
Unless you're microsoft. Tongue


This thread is silly. If you can change the basepoint the problem is trivial.   Set the basepoint to any number times the pubkey.  The private key is the modular inverse of that number.

member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 17, 2020, 09:59:59 AM
#19
You also can't just come up with any domain parameters you like, your G coordinates are not in the interval [0, p−1] (read page 17 of SEC 1: Elliptic Curve Cryptography). In other words your point is not even on curve and multiplication is not even defined, consequently the numbers you posted as pub/private key are random numbers. It is like claiming you have found an integer for x for x2=-1.

My points on the curve. Random only private keys and private key in order of curve.


p.s. Base point on curve, for example is a public key too.

This is another variant of privkey and base point for used pubkey:

BP (55066263022277343669578718895168534326250603453777594175500187360389116729240 : 32670510020758816978083085130507043184471273380659243275938904335757337482424 : 1)
FakeBP (27766988394528305332024168539037695039502084538361626787903749004653433687854 : 13581498523946301885502763354170297668198202071266362739407311067363122460026 : 1)

Q (41092972045662183626692698115026263699106807529773860274318687111639116151521, 25612602434799576731996141476317124058234433726241370033130536741579356668244)

privkey 36540658479409362678121339879672694014739785286643571088000951145429744113500
legendary
Activity: 1039
Merit: 2783
Bitcoin and C♯ Enthusiast
August 17, 2020, 09:47:04 AM
#18
You also can't just come up with any domain parameters you like, your G coordinates are not in the interval [0, p−1] (read page 17 of SEC 1: Elliptic Curve Cryptography). In other words your point is not even on curve and multiplication is not even defined, consequently the numbers you posted as pub/private key are random numbers. It is like claiming you have found an integer for x for x2=-1.
member
Activity: 846
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
August 17, 2020, 09:34:27 AM
#17
TheArchaeologist Bro, help please, as you have a good math knowledge Huh Share please yours "base point calculator" Huh

Looks like TheArchaeologist forgot to use the sarcasm-tag?

The correct use is:
[sarcasm]
Text
[/sarcasm]

 Grin

demonstrator of his yellow eggs size of ubiverse and TheArchaeologist, believe that their bitcoins are securely protected and therefore so freaked out.
legendary
Activity: 3388
Merit: 4919
https://merel.mobi => buy facemasks with BTC/LTC
August 17, 2020, 09:28:00 AM
#16
TheArchaeologist Bro, help please, as you have a good math knowledge Huh Share please yours "base point calculator" Huh

Looks like TheArchaeologist forgot to use the sarcasm-tag?

The correct use is:
[sarcasm]
Text
[/sarcasm]

 Grin
Pages:
Jump to: