Search content
Sort by

Showing 20 of 33 results by Bglhn
Post
Topic
Board Development & Technical Discussion
Re: Lattice Attack
by
Bglhn
on 08/04/2024, 21:50:54 UTC
Hello. How to find lsb or msb bit leak in lattice attack? Is there a method for this?
Post
Topic
Board Development & Technical Discussion
Topic OP
Rsz - a technical question
by
Bglhn
on 08/04/2024, 19:02:06 UTC
Hello.

I hope someone knows. 🙏 What does it mean that the R value starts with 0?
My other question is, what is the way to find the msb bits for kattice attack?
Post
Topic
Board Development & Technical Discussion
Re: Backdoor ve ecdsa
by
Bglhn
on 05/04/2024, 15:37:22 UTC
Yes, I asked a question and it was deleted. I don't understand why.
I've been searching on the internet, but I still haven't figured out how to use the leaked parts.
Post
Topic
Board Development & Technical Discussion
Re: Backdoor ve ecdsa
by
Bglhn
on 04/04/2024, 07:39:38 UTC
In a similar way I have a simulation script in python https://github.com/iceland2k14/rsz/blob/main/LLL_nonce_leakage.py  where some Random signatures are prepared with Leakage in 128 bits and then assuming they are are from Real Tx, they are solved using LLL reduction to print the PrivateKey.

can I use your script with real values? I couldn't find a way.

In short, the attacker influences the selection of the nonce in such a way that a portion of a secret can be derived from each signature.

The secret to be leaked can be anything, but it is just a random value in the example code:

Code:
secret_to_leak = randscalar()

The nonce, k, is computed by multiplying a small portion, si, of the secret, S, by a value, b, known only to the attacker. Since b is known by the attacker and si is a small value, k and si can be recovered. k = si * b obfuscates the fact that k is not random.

So how can I find the value of b? Trial and error method for example? Is b an integer?
Post
Topic
Board Development & Technical Discussion
Topic OP
Backdoor ve ecdsa
by
Bglhn
on 03/04/2024, 21:14:25 UTC
Hello friends.
I came across a source code on github. backdoor ecdsa. I displayed it with the rsz values I discovered. but I couldn't make any sense. What exactly are the leaked values and what do they do? Does anyone have knowledge about this?

https://github.com/oreparaz/backdoor-ecdsa.git
Post
Topic
Board Development & Technical Discussion
Re: relationship between two nonces
by
Bglhn
on 01/04/2024, 19:54:31 UTC
So how to find nonce leak?
Post
Topic
Board Development & Technical Discussion
Topic OP
RSA value
by
Bglhn
on 30/03/2024, 09:14:42 UTC
hello. How can I find my rsa values (p, q, n, e) from my own public key? There is a lot of information about this, but I couldn't find a concrete example.
Post
Topic
Board Development & Technical Discussion
Re: relationship between two nonces
by
Bglhn
on 30/03/2024, 07:42:48 UTC
iceland2k14 I can't believe you're here. Very pleased to meet you.
You said in one of your articles, "There are several ways to find a nonce." Is there anything else you can suggest?
Post
Topic
Board Development & Technical Discussion
Topic OP
relationship between two nonces
by
Bglhn
on 29/03/2024, 12:04:44 UTC
Hello friends.
How can we solve the relationship between the two nonces used in the bitcoin transfer signature? Does anyone have information about this? Or what formulas do you use to find the K value?
Post
Topic
Board Development & Technical Discussion
Topic OP
Lattice attack
by
Bglhn
on 28/03/2024, 18:32:01 UTC
How do you find the nonce bit in lattice operations?
I want to use https://github.com/bitlogik/lattice-attack, but I don't know how to fill the data.json file with my original data. Can anyone detail the process?
Post
Topic
Board Development & Technical Discussion
Re: Privately check
by
Bglhn
on 24/03/2024, 20:27:59 UTC
I can't do this in Electrum. It wants private keys in WIF format but my list is in hex format  Huh
Post
Topic
Board Development & Technical Discussion
Re: Privately check
by
Bglhn
on 24/03/2024, 19:47:57 UTC
Thank you very much for your help, I will try it  Smiley
Post
Topic
Board Development & Technical Discussion
Topic OP
Privately check
by
Bglhn
on 24/03/2024, 18:52:55 UTC
Hello friends. I have a certain private key list, there are approximately 5000 keys. It takes time to check all these one by one. is there a software for this? Can I upload my private key list and perform balance check or address matching?
Post
Topic
Board Development & Technical Discussion
Re: Nonce k k+1
by
Bglhn
on 23/03/2024, 18:31:18 UTC
I don't actually have any range. It looked small to me.
So do you know a way to understand the relationship between two nonces?
Post
Topic
Board Development & Technical Discussion
Re: Nonce k, k+1 python code
by
Bglhn
on 23/03/2024, 16:36:17 UTC
Thank you very much, I will try again.
With your permission, I would like to ask a question; I saw that you also wrote about lattice attack. How can I find known bits? Do you have any knowledge about this topic
Post
Topic
Board Development & Technical Discussion
Re: Lattice Attack
by
Bglhn
on 23/03/2024, 12:47:01 UTC
What I can't figure out in this attack is how kp was found. how to find kp
Post
Topic
Board Development & Technical Discussion
Re: SLA ATTACK INTRODUCTION! - try yourself! part 1
by
Bglhn
on 23/03/2024, 09:53:56 UTC
Hello, did you succeed in the attack?
Post
Topic
Board Development & Technical Discussion
Re: Nonce k k+1
by
Bglhn
on 22/03/2024, 23:23:47 UTC
So is there any way to understand this?
Post
Topic
Board Development & Technical Discussion
Re: Nonce k, k+1 python code
by
Bglhn
on 22/03/2024, 08:30:35 UTC
Is there no one who can check this?
Post
Topic
Board Development & Technical Discussion
Re: Verifying K Value in Sagemath
by
Bglhn
on 21/03/2024, 23:48:53 UTC
So how did you find your G spot? and p is your prime? I'm trying to learn, but I don't have enough knowledge.