I’m releasing a cryptographic challenge designed for experts in Bitcoin ECDSA internals, elliptic curve analysis, and nonce pattern vulnerabilities. There is a 5 BTC reward for the first person who solves it. Read the structure carefully.
The Puzzle Overview:
I have posted a file containing 1,000,000 valid signatures for one fixed public key.
Each signature is given as (sig_num, r, s, z, A, rx, ry) where:
r, s, and z are standard ECDSA signature parameters (z is the hashed message)
A is added to the private key to produce the nonce k used for that signature
k = d + A (mod n)
rx, ry are the elliptic curve point coordinates of r
PUBLIC KEY:
04c1c1e912c51061424286bdea075e0a19a96be1869566f4ebc9ea3e565f9c334d1779371fd313e
dc2955b14f3eaabf8af027f77a7b3e1e908839d4f7ee81aef28
X = 87638989873003743107580407194345607023493955367007042197569832403610862629709
Y = 10617364466289823353593438673072375587688363537404447133738278709366498193192
Important Details
The nonce values for signatures increase incrementally:
1st signature: k = d + 2
2nd signature: k = d + 3
3rd signature: k = d + 4
... and so forth, continuing this pattern for all 1,000,000 signatures.
In every signature, r == s
Bounty:
Recover any valid k and post it here with the corresponding signature index.
Or recover the private key directly from any subset of signatures.
Post your result here along with your Bitcoin address to receive the bounty.
💰 Prize: 5 BTC
⏱ Paid within 24 hours of verified result.
If you successfully recover any nonce k or the private key d, post your result here along with your BTC address to receive the 5 BTC reward.
✅ Submission Example:
✅ Recovered nonce k from signature index #0:
k = 0xabcdef123456...
BTC Address: bc1qyouraddrhere
or,
as your wish, but with any valid k or private key
Data Access
CSV file download (1 million signatures):
https://is.gd/1million_rszExample Data Format (First line)
0,0x37cb099a32bdc5e3b790b0ad94a2c0d1184a1bba7a2b688223a183ff7bdbdf33,0x37cb099a32bdc5e3b790b0ad94a2c0d1184a1bba7a2b688223a183ff7bdbdf33,0x6f961334657b8bc76f21615b294581a230943774f456d104474307fef7b7be66,0x0000000000000000000000000000000000000000000000000000000000000002,0x37cb099a32bdc5e3b790b0ad94a2c0d1184a1bba7a2b688223a183ff7bdbdf33,0x799945c68262f3c0d7dbded5eb795d1bf0b2829dbc303eb9fa21e9643c3fbc67
0 = signature index
r = 0x37cb09... (also equals s)
s = same as r
z = message hash
A = 2 (added to private key to get nonce k)
rx, ry = coordinates of r on SECP256k1 curve
Rewards & Rules
5 BTC payout within 24 hours after proof of valid nonce or private key recovery.