Post
Topic
Board Bitcoin Discussion
Re: Did you already break the Elliptic Curve, Satoshi, you there?
by
omnicreor
on 18/01/2024, 13:16:57 UTC
Alright, let's delve into the details. First off, here's the CSV I shared, starting with the first 10 public keys:


040000356cb2e0d0c0a0167693b14c338f548da20fea024a04449907140fa270ebff37ae70d00db 8137b5c60d9563b743b090f162f7bf1b51650d20cd7022d695d

04000136bd8d133189ca0e40334a05ac1ce1d33e992f8628a582ec6a27757d0338e1ec3c25631a3 55abec4f8cd452897f7383caa36123ddd232ffb2e9cf48a2806

040001c5a1d394656166be6c0d41219ed3bba0b2b4dd38d0c0f317b6ad0c491ffca489d30ae9177 3b16626a70752f785284840a3e679c86d0bd42ff1bbb47311f1

04000272b300286c7870642be993dd7189a7dd4f713ad133cb04a36f5560dd28ef9782ac421aaec 692650b74f987d42b8330d0af8370799b808644c18aab68ea6f

040005929d4eb70647483f96782be615f7b72f89f02996621b0d792fd3edd20dc229a99dfe63582 d5471b55bcbb1d96c6e770ea406ce03bc798dc714bab36d5740

040009f1f66d83cfe7ec07d8abbd3b85004ff5fe9fe0145e7e85048158284bcb6e9a154fd2a831a f881e55efda58542e00b06a6c1a47f98a04270db2c4faf505b5

04000b1c8a00b4543af5c6121411796e2f02d7d09a57341d85544a06e0c2311b62f2bb2f4279f4a b8ee3d6e1b98d3905ff2808a5f9d05429ff2e4d1f7edae95dda

04000d82179bdc0fdfd4c8f7b46e7bea3a84c35dbaacaee3f35193213728fb4afdac18a09151c36 d7d16e8b72851e90e7ad4c247ac8ae734a3ce096cb354daf2c0

04000ed8229b6fc925fe164bd5be916efab02fb00941dedda712442c145448093995298badfde68 e994f786eb41ea5056bb9f2e3e7d24eb18d383ea35dca49b141

04000f5b05655898aec1744b699dbc461015b714082b19683f495fbc3d24db30b79d76cf773e768 35513d25fbf78d7e82cf47fbb9249faede77be5d290456a5f30

0400159fa21fc72ebf88b9bfbcb7ed7c3c2daf1f3b86231a43354f342de2e16dfaf112dd5c62e71 e26717632c37191b105757026962caf9857de050aa732d1b354


These keys are in sequential order, continuing up to 04ffffcdeee179409d5b0e3133929d6c1292d57768182e650878304dc6867e7a0b0f14b11d08932 8382dcc962312d22fe148b01c8ff911bff70af274146fb000e3.

I've experimented with various methods to crack the elliptic curve, such as point shifting, halving, and examining negative points, but so far, none have yielded significant results. My latest approach involves modular operations: for a point with an odd mod 2, I perform point subtraction followed by halving; for an even mod 2, just halving. The challenge is in the mod 2 calculation, which involves raising the point to the power of 115792089237316195423570985008687907852837564279074904382605163141518161494335, then multiplying the point by this exponent result. This is based on the formula (P * (P^m-2 % m)) % m, where m is the maximum curve value 115792089237316195423570985008687907852837564279074904382605163141518161494337.

I've also tried replicating Satoshi's method of generating public keys in a mathematical sequence but haven't been successful. I'm essentially trying to decipher his thought process, the path he took, and his vision behind this particular order of keys.