Search content
Sort by

Showing 14 of 14 results by Baboshka
Post
Topic
Board Altcoin Discussion
Re: Bitcointalk meme coin / BTC
by
Baboshka
on 09/01/2025, 21:24:52 UTC
OG platform. OG meme coin. SOL

I find that a great idea, we have here a huge community .. so if each one invest like 5$ (which is just burger price) .. we can make a very successful coin.

When i look on some silly coins with MC of  800M$ or 300M$ .. i just wonder the use of that crap and start asking myself "What would Satoshi think now !!"

may its a good time to do it
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==
by
Baboshka
on 04/12/2024, 20:59:16 UTC
Guys if we found public key for puzzle 67,68,,69
will it make it easier to find private keys ?
i know the public key but dont know what to do

Are you sure (i doubt .. but maybe i am wrong) ? try to create the address from them and see if it is the correct Pub Key
Post
Topic
Board Development & Technical Discussion
Re: Can someone provide 3 examples of r,s,z and nonce data ?
by
Baboshka
on 30/11/2024, 10:17:40 UTC
Its not like that, there is no place .. its generating many different arrays of data which is not so easy to understand.
Anyhow thanks, and hope maybe someone can give a hint.

Regards


I think iceland2k14 is not in this thread, he might have helped as those scripts are from him

Post
Topic
Board Development & Technical Discussion
Re: relationship between two nonces
by
Baboshka
on 28/11/2024, 19:59:38 UTC
Yes there are several ways.
1. When same K is used 2 times either in same or different Transaction, its trivial to calculate PVK. Its already extensively exploited.
2. When K values are closeby so that difference can be bruteforced quickly, then also PVK can be calculated.
3. When you somehow know the mathematical relationship between 2 K, like K2 =K1/2 or K2 = K1 + 1637737337373738373729826362936, whatever, then also PVK can be calculated.
4. When you have several Tx and there may be few bits common, either LSB or MSB, then also it's possible to calculate PVK through Lattice reduction. (Check minimum required Tx for Bit Leakage).
5. If the number of Tx is not sufficient for Lattice reduction but there is info about sufficient bit leakage, we could use the same Kangaroo solver approach on the Rvalue of Tx to get K.
6. We could mathematically generate Tx for known Leakage in Privatkeys and then try to bruteforce. For example Puzzle 130 is know to have a 126 bits Leakage in PVK. So several derived Tx from it can be considered for bruteforce.
7. There could be more which I am not aware of yet.

The main point is, there is no 100% sureshot method which will work on generic Tx. All different approaches either need some vulnerability or prior info or some bruteforce.

Hi iceland2k14,

i find those points very very important but have a question regarding point 3.

I was trying your scripts from https://github.com/iceland2k14/rsz and trying to understand the Math (in the read me) but that's not easy.
my question, in point 3 you assume (just a luck) some combinations between k1 & k2 (which may or may not exist) and try to solve ... so which combinations are you using in the rsz_rdiff_scan.py script.

Before i only knew about point 1 ..(i think that's when r1=r2) correct?
 

Regards,
Baboshka
Post
Topic
Board Development & Technical Discussion
Re: Can someone provide 3 examples of r,s,z and nonce data ?
by
Baboshka
on 20/11/2024, 21:40:16 UTC
Its not like that, there is no place .. its generating many different arrays of data which is not so easy to understand.
Anyhow thanks, and hope maybe someone can give a hint.

Regards
Post
Topic
Board Development & Technical Discussion
Re: Can someone provide 3 examples of r,s,z and nonce data ?
by
Baboshka
on 19/11/2024, 21:41:20 UTC
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second




Hi jacky19790729,

I am not sure which LLL_nonce_leakage.py you mean!
Because the one from iceland2k14 is just generating the values and try to solve them, but how can you inject your values.
As the example you mentioned of puzzle #120 ?

I will be thankful if somebody can give a hint

Regards

posible make MSB LSB  in r known:

k = 0x157cb65b27a820acb0df711e28550521930

new k ,= fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a7


./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x70000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff71ac80a4ecafc61a23ec095db0801dd566131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff860192d681bb3c1667eee374e37cb9c156131536b49b6e4411220885a71

for bigger k:

./modmath 0x257cb65b27a820acb0df711e2855052193f - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000  Result: fffff860192d681bb3c1667eee374f37cb9c156131536b49b6e4411220885a80

userland@localhost:~/ecctools$ ./modmath 0xb32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000                     Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0858dbbf906be11

userland@localhost:~/ecctools$ ./modmath 0xa32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000
Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0758dbbf906be11

Thanks COBRAS , but i am not sure if you are answering my question but honestly i didn't get you point.

My question was simple, according to jacky19790729 we can use LLL_nonce_leakage to solve puzzle#120 (which is already solved) using the 3 set of RSZ .

But were to put the RSZ values in the LLL script?

Regards
Post
Topic
Board Development & Technical Discussion
Re: Can someone provide 3 examples of r,s,z and nonce data ?
by
Baboshka
on 18/11/2024, 19:35:30 UTC
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second




Hi jacky19790729,

I am not sure which LLL_nonce_leakage.py you mean!
Because the one from iceland2k14 is just generating the values and try to solve them, but how can you inject your values.
As the example you mentioned of puzzle #120 ?

I will be thankful if somebody can give a hint

Regards
Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
Baboshka
on 02/05/2024, 22:44:40 UTC
It is possible to reduce a little bit the complexity of the classic kangaroo algorithm by spreading the starting kangaroo in a non uniform maner.
Roughly speaking, if the private key lies in certain areas it will be found faster. As a counterpart if it lies in certain other areas it will be found slower.
But in average, considering the whole range, the compexity is well reduced.
It you read and understand carefully the reference in the gitbub page, you will find the trick Wink



First welcome back master @Jean_Luc .. so happy to see ur post.

You cant compare your deep knowledge to others, as you have developed those tools and have a deep knowledge in the Math used.

I consider my self good in programming (i have many years experience in C++ , but very new to GPU) .. i have a good Math background but that part of "elliptic curve cryptography" is another world.

So its not easy .. yes i have downloaded ur source code but that not easy at all to understand the magic happening inside.

I am learning a lot, and i must say many thanks for @WanderingPhilospher as he is a big help answering my doubts ...


I don't know if you do stuff in youtube, but i can imagine that some simple videos explaining some of those aspects will be gorgeous .. maybe i wish too much ..


Regards
Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
Baboshka
on 17/01/2024, 21:49:45 UTC

Thanks WanderingPhilospher for the quick answer, i am sorry as i was away for few days.

Also many thanks for the explanation, you are very right  Etar Kangaroo didn't even start and i was wondering why but as you explained the range was very small.
After using a bigger range (as you did) and i even used bigger range and found the key - perfect.

Then i started it with the #130 and the full range .. and after 24h there was 100GB of work file but nothing was found - as expected  Wink

Now i started it with the fractional but as you know it uses the JeanLucPons Kangaroo (which loses performance) but lets see how it goes.

Another issue with the tools is the good explanation of the parameters and the configuration also some more detailed information behind those to understand how and why to use them.

by the way, are you the developer of this https://github.com/WanderingPhilosopher/VanBitCrackenRandom2 ... seems you are also very expert in that subject  Cool


Thanks citb0in for your response and the info about the Kanga-256.

I wish to spend more time on this subject, but not easy.

I will update you about any progress

Regards


So an update, ... after running the fractional for 24h the speed of Kangaroo went from 1300 MK/s to 27 MK/s without a result.

Today i started your VBCr v2.00 on #66 which is running with the same speed around 1300 MK/s since free hours.






Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
Baboshka
on 16/01/2024, 23:11:18 UTC

JLP doesn't respond much these days. I know his code works (but is limited to x bits) because his code was used to solve #110 and #115. Not sure about #120 or #125 because no one has claimed they solved them and what was used.

did you run the normal etar kangaroo or the fractional one?

UPDATE:
Try etar's again. Here's the thing, your initial range size is 2^26; his says the range has to be higher than 2^32 (or else it's just a waste of time since even a brute force program can find that within seconds)

Try this config:
-rb 2F633CBE3EC02B9401000000000000000 -re 2F633CBE3EC02B94010000000ffffffff -pub 021c20007f8c8984d403a695494d6afbff37f55a01c8bd1aafb9b958fa9485bb02

I ran it and it found the key.


Thanks WanderingPhilospher for the quick answer, i am sorry as i was away for few days.

Also many thanks for the explanation, you are very right  Etar Kangaroo didn't even start and i was wondering why but as you explained the range was very small.
After using a bigger range (as you did) and i even used bigger range and found the key - perfect.

Then i started it with the #130 and the full range .. and after 24h there was 100GB of work file but nothing was found - as expected  Wink

Now i started it with the fractional but as you know it uses the JeanLucPons Kangaroo (which loses performance) but lets see how it goes.

Another issue with the tools is the good explanation of the parameters and the configuration also some more detailed information behind those to understand how and why to use them.

by the way, are you the developer of this https://github.com/WanderingPhilosopher/VanBitCrackenRandom2 ... seems you are also very expert in that subject  Cool


Thanks citb0in for your response and the info about the Kanga-256.

I wish to spend more time on this subject, but not easy.

I will update you about any progress

Regards
Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
Baboshka
on 14/01/2024, 02:10:50 UTC

The source code is there. It's built with PureBasic. Nice, simple, clean code.

DPs can be at the beginning, middle, end.

JLPs DPs (Zeros) are leading, meaning they are at the beginning. I believe Etar's are trailing, at the end.

So JLP DP 20 = 00000xxxxxxx
Etar's DP 20  = xxxxxxx00000

It doesn't matter if they are trailing or leading. Both are good and work.

Test Etar's version out.

Thanks @WanderingPhilospher, I really didn't notice the PureBasic code.
I have been developing software since 30 years and have experience with many programming languages but first time to see the PureBasic but is also seems not difficult.

I really wish to do something in this Vanity search subject, not because of the puzzle only but its very interesting and challenging.

My problem is that I am not that deep in this Bitcoin Private/Public keys, also not having any idea how CUDA really works, also need to read about the Pollard's kangaroo algorithm.

What I also noticed, and also from my experience that many developers never test their own software well (I am not complaining, actually I am thankful for everyone sharing the code) therefore most of the time those tools never work correctly.

As I told before, after testing the Kangaroo-256 with the examples of JeanLucPons and got no result, I started doubting the other tools therefore I created a simple test tile the same as the one from JeanLucPons but in the range of puzzle 130 but with a very small range as following
Code:
2F633CBE3EC02B9401000000007000000
2F633CBE3EC02B9401000000009000000
021c20007f8c8984d403a695494d6afbff37f55a01c8bd1aafb9b958fa9485bb02
which is small range of about 33M and the PKey is 2F633CBE3EC02B9401000000008000000 and run the following

  • Kangaroo 2.2 (JeanLucPons) : found the key in 15secs
  • Kangaroo 2.3 (NotATether) : no result
  • Etar-Kangaroo : no result
  • Rotor-Cuda: found key in few seconds - like Kangaroo 2.2


I am not sure if I am starting those tools with the correct options but i think there is no much to give.

That was my observation ..

I will be very happy if can get a change to talk to JeanLucPons, as hi code is not that easy


Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
Baboshka
on 12/01/2024, 23:17:06 UTC

Yes, you are correct, it was meant to expand the search range, like you said, be able to solve 160.

However, I am pretty sure it had bugs or speed was lost. I'm not sure it he has tinkered with it any more since his original post.

Check out Etar's kangaroo version; it is same as JLPs (but trailing DPs; zeros at the end) but can solve up to 192 bit range.

Hi WanderingPhilospher, thanks for the quick answer

Actually the 256 version is not working, i cloned the code from the Ripo and build it with CUDA 12.3 & sm_86 and tested it with the same example from JeanLucPons
This one
Code:
49dccfd96dc5df56487436f5a1b18c4f5d34f65ddb48cb5e0000000000000000
49dccfd96dc5df56487436f5a1b18c4f5d34f65ddb48cb5effffffffffffffff
0459A3BFDAD718C9D3FAC7C187F1139F0815AC5D923910D516E186AFDA28B221DC994327554CED887AAE5D211A2407CDD025CFC3779ECB9C9D7F2F1A1DDF3E9FF8
0335BB25364370D4DD14A9FC2B406D398C4B53C85BE58FCC7297BD34004602EBEC

The original JeanLucPons Kangaroo took 1:30 to find both minute while this 256 version didn't find anything even after 20 min ... therefore i think its not helpful.

Regarding the Etar's kangaroo .. you mean this one https://github.com/Etayson/Etarkangaroo ?
I wonder why there is no source code

what do you mean with this "trailing DPs; zeros at the end" can you explain more please

Regards
Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
Baboshka
on 12/01/2024, 19:54:28 UTC
I pushed an update to Kangaroo-256 a couple of days ago that fixes the botched GPU implementation. https://gitea.datahoarding.agency/ZenulAbidin/Kangaroo-256

Next I want to add the ability to create your own dpmask - whether you want certain bits to always be set and others always be cleared. I think I will need two different masks for this, one for the bits that should be set and another for the ones that should be cleared.

Currently all of the dpmask bits are at the left of every kangaroo but I think the ability to define it at random positions could influence the speed it takes to find a collision. I could even make the dpmask to change at random it I want to.


Hi NotATether, can you please explain what this version with 256 can do that the original version from JeanLucPons can not do ?

- Is it just faster ?
- can solve ranges that the JeanLucPons version can not solve (like puzzle 160 for example because the key space is wider)?

I know that i am a bit later as that was posted 3 years ago, but i find the subject very interesting.

Regards
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==
by
Baboshka
on 11/01/2024, 20:20:01 UTC
If you can do that, congratulations because you just partially broke elliptic curve.

No, i mean I can reduce a generator range to skip not random values, so time to bruteforce reduced too.

For example, 23 bit key to test (python 3.11 + ice_secp256k1.dll).
with secret algo:
GOT: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rVkthFNsQ6i7
10.363348245620728 s

with usual range (2^22 ... 2^23-1)
GOT: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9M7rVkthFNsQ6i7
16.832353353500366 s

with big values, like 66 bit, a lot of values just skiped as NOT random binary values, because cant be randomly generated by author (by wallet software).
for example, first value for 66-bit range is 100000100100100101010011001011000111000111001011000111000111001011, all values less is fail.
this value give generator as first value applyed with random's rules

anyway, pure python not a good instrument to get result. wanna use numba cuda.jit, but still learning how to.

Hi fecell .. can you please explain more why values less "100000100100100101010011001011000111000111001011000111000111001011" will fail .. thanks and regards