Post
Topic
Board Bitcoin Discussion
Re: Did you already break the Elliptic Curve, Satoshi, you there?
by
Legends_Never_Die
on 18/01/2024, 21:03:59 UTC
Umm, sir Jack the ripper the second, can you explain please about this part of your "vulnerability research"?

Code:
def get_private_key_from_public_point(point):
    """ Extracts private key from a public key point, this method reverses Double and Add method by Subtract and Halve """

There is no such a thing as getting a private key from a public key that could be defined simply as "subtract and halve", I hope you understand that I'm not trying to mock you, but there  are some things in ECC that you need to understand first before spending time and efforts which could interrupt your normal life.

Let me give you an example, just try it on normal calculator, subtract 1 from the following and then divide by 2, then again subtract 1 after dividing to do another dividing, keep doing it to see where the problem is.

666908835070271

Whenever you hit a fraction as result, don't try to go back fixing the odd key into an even one, no, you need to keep doing it, until you actually reach no where, because numbers repeat for ever.

Also note that when you are working with points(public keys) you can't actually tell whether a point belongs to a small scalar or not, unless you have all the 2**256 points saved on a file to compare or at least have the first 2**65 points saved, but then, maybe a point belongs to a scalar in 67 bit range and you just miss it during explorations.

The whole point of a 256 bit curve is to have a security level at 128 bit, otherwise up to even 80 bits is easy to brute force considering if one has great computing power.

1000BTC puzzle challenge is a very good starting point for every mathematician/cryptographer, focus there instead of trying to go after keys that does not belong to you. At least puzzle keys are for free to grab and it won't be considered as theft.