Pages:
Author

Topic: VanitySearch (Yet another address prefix finder) - page 19. (Read 32072 times)

legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Where is the file that generates the private keys?

Sorry, I missed this post. When VanitySearch finds a private key, it prints the public key, and the private key WIF and HEX to standard output, and also to whatever file name you passed if you used the -o option.
member
Activity: 206
Merit: 16
Where is the file that generates the private keys?
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Hello is it possible to search only in 5H private keys?

It seems that you are asking if Vanitysearch can find prefixes of private keys.

Using https://www.dcode.fr/base-58-cipher to convert between addresses and public keys, the smallest public key possible is  80000000000000000000000000000000000000000000000000000000000000000000000000. All mainnet public keys have to start with a leading "80" or else their base58 addresses, and by extension their private keys, will be invalid too.

This public key corresponds to the address 5HpHagT65TZzG1PH3CSu63k8DbpvD8s5ip4nEB3kEsreAbmahZy.

The largest base58 address that still starts with 5h is 5Hzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz, whose public key is  
801853E65BF4DDC28AA8C27A71F65671928ED6E1D612946BB3E94B8B36E5E9FFFFFFFFFFFF.

So you'd need to find a way to search only the public keys between:

Code:
80000000000000000000000000000000000000000000000000000000000000000000000000
801853E65BF4DDC28AA8C27A71F65671928ED6E1D612946BB3E94B8B36E5E9FFFFFFFFFFFF

Vanitysearch cannot search between ranges of public keys, so therefore you can't choose which private keys it will search in either.
member
Activity: 206
Merit: 16
Hello is it possible to search only in 5H private keys?
hero member
Activity: 1438
Merit: 513
I PMed ThePiachu , said original requestor wanted it back and he honored it. But gave no heads up to those of us working it.

I'll no longer be taking parts in these due to this

https://web.archive.org/web/20130127032850/https://vanitypool.appspot.com/availableWork
legendary
Activity: 3038
Merit: 4418
Crypto Swap Exchange
What's the URL of that site?

Is lavishness some kind of measure of how active this solution is? I don't understand why it would have an additive and a multiplicative lavishness, not to mention mining ratio which isn't even a metric in Vanitysearch.
You'll find their formula here: https://vanitypool.appspot.com/faq

It's not strictly speaking a mining pool since it doesn't split the rewards among those who works for it. It was very overpriced then and even more overpriced now, if you want any solutions. It's just basically a site for those who are interested in earning from helping others to generate their vanity address with split key generation. It's pretty dead nowadays.
full member
Activity: 706
Merit: 111


Almost all the work is now gone also along with the 1qwertyuiop.

What's the URL of that site?

Is lavishness some kind of measure of how active this solution is? I don't understand why it would have an additive and a multiplicative lavishness, not to mention mining ratio which isn't even a metric in Vanitysearch.

https://vanitypool.appspot.com/availableWork

legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org


Almost all the work is now gone also along with the 1qwertyuiop.

What's the URL of that site?

Is lavishness some kind of measure of how active this solution is? I don't understand why it would have an additive and a multiplicative lavishness, not to mention mining ratio which isn't even a metric in Vanitysearch.
full member
Activity: 706
Merit: 111


Almost all the work is now gone also along with the 1qwertyuiop.


https://vanitypool.appspot.com/availableWork
https://vanitypool.appspot.com/solvedWork
full member
Activity: 1162
Merit: 237
Shooters Shoot...
Its funny
The 1qwertyuiop problem was up for years , and it wasnt solved yet its disappeared.

1.2 BTC bounty vanished unsolved?
Refunding the bounty is theft to the problem solvers
Anyone else see this? I literally just mentioned working it a couple weeks ago and another member even benched it.



Which 1.2 bounty are you speaking of?
hero member
Activity: 1438
Merit: 513
Its funny
The 1qwertyuiop problem was up for years , and it wasnt solved yet its disappeared.

1.2 BTC bounty vanished unsolved?
Refunding the bounty is theft to the problem solvers
Anyone else see this? I literally just mentioned working it a couple weeks ago and another member even benched it.


jr. member
Activity: 41
Merit: 1

Try remove all compute_XX and sm_XX in line #63 VanitySearch.vcxproj and try to add only compute_86,sm_86. In new line after #156 in file /gpu/GPUEngine.cu add "{0x86,  82},"
Now youcan try compile in Windows. In Visual Studio you must select ReleaseX64
By the way: You can try set in command line when you try start searching parameter -g 1920,512 and check is it better than before? if yes - you can try to search the best value in place when now is 1920. If it not work - change 512 to 256.

Sorry for bad value of this post but i add them from phone😉
I hope that tips was help solve your issue.

Sorry 4 the late answer, i was gone..
and thank u very much! i will try this in the coming days..



Apparently JeanLucPons is busy with other things - which I quite understand.

Updated VanitySearch to support the latest NVIDIA architecture.
Please here is the link:

https://github.com/zielar2/VanitySearch

IMPORTANT! To compile you need the latest CUDA Toolkit, version 11.1!
I have already compiled that for all: https://github.com/zielar2/VanitySearch/releases/download/1.19.2/VanitySearch.exe

Let me know if it helped and show off your performance.
Please let me know any other users that all work or if you find any issues.

Thank you too, great work !

will try this too in the coming days..
did u adjust for the new arcitecture (2 fp32 elements in one unit) or did you do something else?

with old code unter linux i got 3800-4400 MKeys/s but dont know if that is really representative with the old code..

quick try with your exe did not work unfotunately will try code in a few days

VanitySearch.exe -r 1000000 -t 0 -gpu -gpuId 0 -g 656,128 -o found_0.txt 1112BqXVUXqvNmhUVrP3spvpqea37uzxvt
VanitySearch v1.19
Difficulty: 1461501637330902918203684832716283019655932542976
Search: 1112BqXVUXqvNmhUVrP3spvpqea37uzxvt [Compressed]
Start Thu Jan  7 17:41:45 2021
Base Key: Randomly changed every 1000000 Mkeys
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 3090 (82x128 cores) Grid(656x128)
[3795.19 Mkey/s][GPU 3795.19 Mkey/s][Total 2^32.85][Prob 0.0%][50% in 8.46417e+30y][Found 0]  GPUEngine: Launch: an illegal memory access was encountered

its the same grid size the -check option uses...

GPU: GPU #0 GeForce RTX 3090 (82x128 cores) Grid(656x128)
Seed: 1610037863
2.779 GigaKey/sec
ComputeKeys() found 15832 items , CPU check...

reducing the grid dramatically does not seem to help

GPU: GPU #0 GeForce RTX 3090 (82x128 cores) Grid(128x32)
[818.33 Mkey/s][GPU 818.33 Mkey/s][Total 2^31.63][Prob 0.0%][50% in 3.92544e+31y][Found 0]  GPUEngine: Launch: an illegal memory access was encountered

trying multiple addresses still brings

GPU: GPU #0 GeForce RTX 3090 (82x128 cores) Grid(656x128)
GPUEngine: Launch: misaligned address

so i compiled under ubuntu 20 with cuda 11.1 and g++-9
working exept addresses.. here an example with one address.. when i shorten the address by 6 characters it's working but not with one complete or even more than one address

./VanitySearch -t 0 -gpu -gpuId 0 -g 736,256 -o found_btcfuck.txt 1121WxDoSHcbACJY1ykvevxHfwNw
VanitySearch v1.19
Difficulty: 164888818499126885406117494769938638116436836352
Search: 1121WxDoSHcbACJY1ykvevxHfwNw [Compressed]
Start Fri Jan  8 00:54:30 2021
Base Key: 513980ECDA0075E843B9ABE92927DC8F4903CF80B0E38583DEE9032F14C94D02
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 3090 (82x128 cores) Grid(736x256)
[3906.26 Mkey/s][GPU 3906.26 Mkey/s][Total 2^36.45][Prob 0.0%][50% in 9.27788e+29y][Found 0]

./VanitySearch -t 0 -gpu -gpuId 0 -g 736,256 -o found_btcfuck.txt 1121WxDoSHcbACJY1ykvevxHfwNwshPpFk
VanitySearch v1.19
Difficulty: 1461501637330902918203684832716283019655932542976
Search: 1121WxDoSHcbACJY1ykvevxHfwNwshPpFk [Compressed]
Start Fri Jan  8 00:55:21 2021
Base Key: 584FBD42125487E359F90EE6168A4AC1AA13CE2E88C203EF9A2C397283D9FBDA
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 3090 (82x128 cores) Grid(736x256)
GPUEngine: Launch: an illegal memory access was encountered
newbie
Activity: 12
Merit: 1
guys is "https://github.com/Telariust/VanitySearch-bitcrack" like Plutus ? i mean for guys who want just to generate random privat key and compare it with your ready Adress list (.txt) ? or VanitySearch request something else ?
full member
Activity: 1162
Merit: 237
Shooters Shoot...
But i thought the way VanitySearch works is similar to bitcrack (sequentially) and not random. Doesn't that mean if 10 people start working on the same string you provided that they would all go through the same exact process and duplication?
It would be a huge security risk to have it run sequentially. Imagine if I were to try to get bc1qw and since it runs sequentially, another person also gets the same bc1qw address.  It has a RNG to ensure the randomness.
Also on a separate note. For argument's sake lets say we run this for nearly 150 years and our grandsons get a match. Isn't there still a high possibility that since you defined only partial public key that the results would not be the exact same key? e.g. you've been waiting 100+ years for 1qwertyuiopBBBBBBOOOOO but your grandson gets 1qwertyuiopBBBBBZZZZZ instead?
Vanity gen brute forces using the given split public key. When it gets the correct solution, it'll produce your part public key and part private key. Give the private key combine with their part private key and the address will be as defined in the pattern.

I see so it works differently from bitcrack then? because the biggest issue with bitcrack was the developer never wanted to add randomness so it would start at a specified sequence and work its way up +1, +1 etc etc
which never made sense to me because users with million + database would all be going through the same numbers so duplicated effort

if Vanitysearch really generates the sequences in calculation randomly that's a big advantage.

Also i didn't understand what you mean by part private key. So in the example of "1qwertyuiop" VanitySearch shows this will take more than 150 years, and the other user wanted to split the effort. But my question is since this is just a partial public key there's no guarantee it will find the exact public key he's looking for in 150 years. It might find a key with last few digits different from what he wants, the only way to get the exact public key is to submit the full public key but then that will change from 150 year estimate to millions.
The author of Bitcrack didn't specifically develop Bitcrack to be used by a pool or a combined effort; so while you speak of "duplicated effort", I don't think that is exact.  He created the program for individuals to search for keys specifically tied to the 100 BTC puzzle/challenge.

So it's up to people to tweak the code or use it in a way to not duplicate effort, like the pool at ttd...effort is not duplicated because users are assigned different ranges to work on.

Adding randomness, to start at a specified sequence...what does that mean? The point of randomness should or could mean not knowing what key the program starts with, or each thread generates/starts at random keys.  I have modified a version of Bitcrack where each GPU thread generates a random key, and then starts searching sequentially from that key. And you can also tell the program to "regenerate" every x amount of keys searched.  

Vanity generates the random base key, but then sequentially (and inverse) searches for xyz prefix. User can use the rekey function to generate a new random base key.

I guess you're right, for it's intended purposes it does the job correctly. Is your version of Bitcrack available publicly or on Github to try? I've attempted something similar, currently i have a python script that generates random hex and feeds it to bitcrack (similar like a batch script) so it will open bitcrack then run for 10 minutes with random x characters changed then repeat etc etc with the option of choosing to randomize the x number of characters from beginning or from the end. So it's a semi random solution since the sharting hash is changed every 10 minutes but bitcrack still runs sequentially for each starting point which i can do nothing about

That's similar to what I did with Bitcrack; I posted it all in that thread, python to create the random range, etc. The version I have has not been released. I have ran it numerous times and it feels like it should hit the private key but to no avail lol! I'm away from main PC for a few days but when I get back I may clean it up and post it. I can change bit range but the one I do have is set up specifically for the 64 bit range. I've tested it at 48 bit range (smaller range just to make sure it worked, and it found key everytime) but the 64 bit range is a beast, for brute force, sequentially or random Smiley
copper member
Activity: 19
Merit: 2
But i thought the way VanitySearch works is similar to bitcrack (sequentially) and not random. Doesn't that mean if 10 people start working on the same string you provided that they would all go through the same exact process and duplication?
It would be a huge security risk to have it run sequentially. Imagine if I were to try to get bc1qw and since it runs sequentially, another person also gets the same bc1qw address.  It has a RNG to ensure the randomness.
Also on a separate note. For argument's sake lets say we run this for nearly 150 years and our grandsons get a match. Isn't there still a high possibility that since you defined only partial public key that the results would not be the exact same key? e.g. you've been waiting 100+ years for 1qwertyuiopBBBBBBOOOOO but your grandson gets 1qwertyuiopBBBBBZZZZZ instead?
Vanity gen brute forces using the given split public key. When it gets the correct solution, it'll produce your part public key and part private key. Give the private key combine with their part private key and the address will be as defined in the pattern.

I see so it works differently from bitcrack then? because the biggest issue with bitcrack was the developer never wanted to add randomness so it would start at a specified sequence and work its way up +1, +1 etc etc
which never made sense to me because users with million + database would all be going through the same numbers so duplicated effort

if Vanitysearch really generates the sequences in calculation randomly that's a big advantage.

Also i didn't understand what you mean by part private key. So in the example of "1qwertyuiop" VanitySearch shows this will take more than 150 years, and the other user wanted to split the effort. But my question is since this is just a partial public key there's no guarantee it will find the exact public key he's looking for in 150 years. It might find a key with last few digits different from what he wants, the only way to get the exact public key is to submit the full public key but then that will change from 150 year estimate to millions.
The author of Bitcrack didn't specifically develop Bitcrack to be used by a pool or a combined effort; so while you speak of "duplicated effort", I don't think that is exact.  He created the program for individuals to search for keys specifically tied to the 100 BTC puzzle/challenge.

So it's up to people to tweak the code or use it in a way to not duplicate effort, like the pool at ttd...effort is not duplicated because users are assigned different ranges to work on.

Adding randomness, to start at a specified sequence...what does that mean? The point of randomness should or could mean not knowing what key the program starts with, or each thread generates/starts at random keys.  I have modified a version of Bitcrack where each GPU thread generates a random key, and then starts searching sequentially from that key. And you can also tell the program to "regenerate" every x amount of keys searched.  

Vanity generates the random base key, but then sequentially (and inverse) searches for xyz prefix. User can use the rekey function to generate a new random base key.

I guess you're right, for it's intended purposes it does the job correctly. Is your version of Bitcrack available publicly or on Github to try? I've attempted something similar, currently i have a python script that generates random hex and feeds it to bitcrack (similar like a batch script) so it will open bitcrack then run for 10 minutes with random x characters changed then repeat etc etc with the option of choosing to randomize the x number of characters from beginning or from the end. So it's a semi random solution since the sharting hash is changed every 10 minutes but bitcrack still runs sequentially for each starting point which i can do nothing about
copper member
Activity: 19
Merit: 2
Also i didn't understand what you mean by part private key. So in the example of "1qwertyuiop" VanitySearch shows this will take more than 150 years, and the other user wanted to split the effort. But my question is since this is just a partial public key there's no guarantee it will find the exact public key he's looking for in 150 years. It might find a key with last few digits different from what he wants, the only way to get the exact public key is to submit the full public key but then that will change from 150 year estimate to millions.

You pass the public key and a prefix through a vanity search program, and then that gives you one of the private keys needed. My understanding is that to combine two private keys, you first convert them into large numbers, and then compute something called a Lagrange interpolation polynomial (source) at 0. And this has parameters x and y which are contained inside each private key, and the x's I know are inputs to this polynomial because I read the code, and y's are solutions of a split-key equation that uses a different polynomial.

It's complicated math, and I'll have to go over it for a few days before I fully understand it.

Thanks, sounds complicated for sure
full member
Activity: 1162
Merit: 237
Shooters Shoot...
But i thought the way VanitySearch works is similar to bitcrack (sequentially) and not random. Doesn't that mean if 10 people start working on the same string you provided that they would all go through the same exact process and duplication?
It would be a huge security risk to have it run sequentially. Imagine if I were to try to get bc1qw and since it runs sequentially, another person also gets the same bc1qw address.  It has a RNG to ensure the randomness.
Also on a separate note. For argument's sake lets say we run this for nearly 150 years and our grandsons get a match. Isn't there still a high possibility that since you defined only partial public key that the results would not be the exact same key? e.g. you've been waiting 100+ years for 1qwertyuiopBBBBBBOOOOO but your grandson gets 1qwertyuiopBBBBBZZZZZ instead?
Vanity gen brute forces using the given split public key. When it gets the correct solution, it'll produce your part public key and part private key. Give the private key combine with their part private key and the address will be as defined in the pattern.

I see so it works differently from bitcrack then? because the biggest issue with bitcrack was the developer never wanted to add randomness so it would start at a specified sequence and work its way up +1, +1 etc etc
which never made sense to me because users with million + database would all be going through the same numbers so duplicated effort

if Vanitysearch really generates the sequences in calculation randomly that's a big advantage.

Also i didn't understand what you mean by part private key. So in the example of "1qwertyuiop" VanitySearch shows this will take more than 150 years, and the other user wanted to split the effort. But my question is since this is just a partial public key there's no guarantee it will find the exact public key he's looking for in 150 years. It might find a key with last few digits different from what he wants, the only way to get the exact public key is to submit the full public key but then that will change from 150 year estimate to millions.
The author of Bitcrack didn't specifically develop Bitcrack to be used by a pool or a combined effort; so while you speak of "duplicated effort", I don't think that is exact.  He created the program for individuals to search for keys specifically tied to the 100 BTC puzzle/challenge.

So it's up to people to tweak the code or use it in a way to not duplicate effort, like the pool at ttd...effort is not duplicated because users are assigned different ranges to work on.

Adding randomness, to start at a specified sequence...what does that mean? The point of randomness should or could mean not knowing what key the program starts with, or each thread generates/starts at random keys.  I have modified a version of Bitcrack where each GPU thread generates a random key, and then starts searching sequentially from that key. And you can also tell the program to "regenerate" every x amount of keys searched.  

Vanity generates the random base key, but then sequentially (and inverse) searches for xyz prefix. User can use the rekey function to generate a new random base key.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Also i didn't understand what you mean by part private key. So in the example of "1qwertyuiop" VanitySearch shows this will take more than 150 years, and the other user wanted to split the effort. But my question is since this is just a partial public key there's no guarantee it will find the exact public key he's looking for in 150 years. It might find a key with last few digits different from what he wants, the only way to get the exact public key is to submit the full public key but then that will change from 150 year estimate to millions.

You pass the public key and a prefix through a vanity search program, and then that gives you one of the private keys needed. My understanding is that to combine two private keys, you first convert them into large numbers, and then compute something called a Lagrange interpolation polynomial (source) at 0. And this has parameters x and y which are contained inside each private key, and the x's I know are inputs to this polynomial because I read the code, and y's are solutions of a split-key equation that uses a different polynomial.

It's complicated math, and I'll have to go over it for a few days before I fully understand it.
copper member
Activity: 19
Merit: 2
But i thought the way VanitySearch works is similar to bitcrack (sequentially) and not random. Doesn't that mean if 10 people start working on the same string you provided that they would all go through the same exact process and duplication?
It would be a huge security risk to have it run sequentially. Imagine if I were to try to get bc1qw and since it runs sequentially, another person also gets the same bc1qw address.  It has a RNG to ensure the randomness.
Also on a separate note. For argument's sake lets say we run this for nearly 150 years and our grandsons get a match. Isn't there still a high possibility that since you defined only partial public key that the results would not be the exact same key? e.g. you've been waiting 100+ years for 1qwertyuiopBBBBBBOOOOO but your grandson gets 1qwertyuiopBBBBBZZZZZ instead?
Vanity gen brute forces using the given split public key. When it gets the correct solution, it'll produce your part public key and part private key. Give the private key combine with their part private key and the address will be as defined in the pattern.

I see so it works differently from bitcrack then? because the biggest issue with bitcrack was the developer never wanted to add randomness so it would start at a specified sequence and work its way up +1, +1 etc etc
which never made sense to me because users with million + database would all be going through the same numbers so duplicated effort

if Vanitysearch really generates the sequences in calculation randomly that's a big advantage.

Also i didn't understand what you mean by part private key. So in the example of "1qwertyuiop" VanitySearch shows this will take more than 150 years, and the other user wanted to split the effort. But my question is since this is just a partial public key there's no guarantee it will find the exact public key he's looking for in 150 years. It might find a key with last few digits different from what he wants, the only way to get the exact public key is to submit the full public key but then that will change from 150 year estimate to millions.
Pages:
Jump to: