Post
Topic
Board Development & Technical Discussion
Re: Pollards kangaroo method to reverse engineer private keys
by
Phillwilk
on 06/03/2021, 14:06:20 UTC
Thanks for the reply, knew my understanding must have a big hole in it.

So the additional information an attacker would need is to know a range that the private key is within [a, b]. Now I understand why a flaw in generating the private key (not truly random) can result in encryption failure on an other wise cryptographically secure system.

Thanks for the info on UTXO, always thought it was weird to leave funds on an exposed address but the above explains it.

One other question, how small does the range [a, b] have to be to consider it an immenent security threat with current hardware?