A number of people have raised this matter: how to read properly the FOUND.txt file?
I decided to share a little python script.
First we generate a FOUND.txt file to make a test:
$ ./LBC -x
Testing mode. Using page 0, turning off looping.
Benchmark info not found - benchmarking... done.
Your speed is roughly ............ keys/s per CPU core.
o
Test ok. Your test results were stored in FOUND.txt.
Have a look and then you may want to remove the file.
$ ls
FOUND.txt
....
$ more FOUND.txt
2d17543d32448acc7a1c43c5f72cd5be459ab302:u:priv:0000000000000000000000000000000000000000000000000000000000000001+0x5e
02e62151191a931d51cdc513a86d4bf5694f4e51:c:priv:0000000000000000000000000000000000000000000000000000000000000001+0x65
9d74ffdb31068ca2a1feb8e34830635c0647d714:u:priv:00000000000000000000000000000000000000000000000000000000000f9001+0xf8c
3d6871076780446bd46fc564b0c443e1fd415beb:c:priv:00000000000000000000000000000000000000000000000000000000000f9001+0xf8c
Then you can use this python script, called "lbc_output.py":
https://www.dropbox.com/s/q1sgc4gbb26vc99/lbc_output.py?dl=0Copy the line of FOUND.TXT you are interested of and you get the result:
$ ./lbc_output.py 2d17543d32448acc7a1c43c5f72cd5be459ab302:u:priv:0000000000000000000000000000000000000000000000000000000000000001+0x5e
Private key : 000000000000000000000000000000000000000000000000000000000000005f
Public key :
x : 15d9441254945064cf1a1c33bbd3b49f8966c5092171e699ef258dfab81c045c
y : d56eb30b69463e7234f5137b73b84177434800bacebfc685fc37bbe9efe4070d
PrKey WIF u.: 5HpHagT65TZzG1PH3CSu63k8DbpvD8s5ip4nEB3kEsreMQiR4w7
Address u. : 2d17543d32448acc7a1c43c5f72cd5be459ab302
Address u. : 157RMZhbBLC1wucv3jxQqqHjbKezL1yy7g
What does the script?
First it reads and parses the line.
Then it computes the private key (it does the addition, in our example: 0000000000000000000000000000000000000000000000000000000000000001 + 0x5e) and using the ecc arithmetic it generates the public key. Then it generates the address (compressed or uncompressed) and checks if it matches with the address in FOUND.txt (in this case 2d17543d32448acc7a1c43c5f72cd5be459ab302).
Finally it provides the private key in WIF format and the address b58 encoded.
hi please specify after running the scrypt in phyton window where exactly to @Copy the line of FOUND.TXT you are interested of and you get the result@
please can you post more details photos on process? ps I am running phyton app under mac