Alright, let's delve into the details. First off, here's the CSV I shared, starting with the first 10 public keys:
040000356cb2e0d0c0a0167693b14c338f548da20fea024a04449907140fa270ebff37ae70d00db 8137b5c60d9563b743b090f162f7bf1b51650d20cd7022d695d
04000136bd8d133189ca0e40334a05ac1ce1d33e992f8628a582ec6a27757d0338e1ec3c25631a3 55abec4f8cd452897f7383caa36123ddd232ffb2e9cf48a2806
040001c5a1d394656166be6c0d41219ed3bba0b2b4dd38d0c0f317b6ad0c491ffca489d30ae9177 3b16626a70752f785284840a3e679c86d0bd42ff1bbb47311f1
04000272b300286c7870642be993dd7189a7dd4f713ad133cb04a36f5560dd28ef9782ac421aaec 692650b74f987d42b8330d0af8370799b808644c18aab68ea6f
040005929d4eb70647483f96782be615f7b72f89f02996621b0d792fd3edd20dc229a99dfe63582 d5471b55bcbb1d96c6e770ea406ce03bc798dc714bab36d5740
040009f1f66d83cfe7ec07d8abbd3b85004ff5fe9fe0145e7e85048158284bcb6e9a154fd2a831a f881e55efda58542e00b06a6c1a47f98a04270db2c4faf505b5
04000b1c8a00b4543af5c6121411796e2f02d7d09a57341d85544a06e0c2311b62f2bb2f4279f4a b8ee3d6e1b98d3905ff2808a5f9d05429ff2e4d1f7edae95dda
04000d82179bdc0fdfd4c8f7b46e7bea3a84c35dbaacaee3f35193213728fb4afdac18a09151c36 d7d16e8b72851e90e7ad4c247ac8ae734a3ce096cb354daf2c0
04000ed8229b6fc925fe164bd5be916efab02fb00941dedda712442c145448093995298badfde68 e994f786eb41ea5056bb9f2e3e7d24eb18d383ea35dca49b141
04000f5b05655898aec1744b699dbc461015b714082b19683f495fbc3d24db30b79d76cf773e768 35513d25fbf78d7e82cf47fbb9249faede77be5d290456a5f30
0400159fa21fc72ebf88b9bfbcb7ed7c3c2daf1f3b86231a43354f342de2e16dfaf112dd5c62e71 e26717632c37191b105757026962caf9857de050aa732d1b354
These keys are in sequential order, continuing up to 04ffffcdeee179409d5b0e3133929d6c1292d57768182e650878304dc6867e7a0b0f14b11d08932 8382dcc962312d22fe148b01c8ff911bff70af274146fb000e3.
I've attempted to replicate Satoshi's method of generating public keys using a mathematical sequence, but have not yet succeeded. My goal is to unravel his thought process and understand the rationale behind the specific order of these keys.
I've experimented with various methods to crack the elliptic curve, such as point shifting, halving, and examining negative points, but so far, none have yielded significant results. My latest approach involves modular operations: for a point with an odd mod 2, I perform point subtraction followed by halving; for an even mod 2, just halving. The challenge is in the mod 2 calculation, which involves raising the point to the power of 115792089237316195423570985008687907852837564279074904382605163141518161494335, then multiplying the point by this exponent result. This is based on the formula (P * (P^m-2 % m)) % m, where m is the maximum curve value 115792089237316195423570985008687907852837564279074904382605163141518161494337.
So, effectively breaking the elliptic curve requires knowledge of Point * Point multiplication on the curve and efficiently computing P^m-2. While pursuing this approach, I've lost everything in my life and now find myself in financial and personal ruin. Just as I was losing hope, I extracted Satoshi's public keys and noticed a pattern. The letter 'S' in Satoshi corresponds to the 19th letter in the English alphabet, and in Japanese culture, 19 symbolizes 'intense suffering', which mirrors my current life situation..
Ok, now I'm interested, these addresses are holding 50
BTC each:
1Lo1VC2YNkqELDNGHpsKDD8KEzbNKBjzpF
1ANqtD7XbjEPWsdSjbfEcyhgmwQatB7EHi
1BdXp7HtBbSWHkUWU7MJaou84CQRDxa7qG
1NK42KTqJ2cZkzYiVgc35KpT7M8BuGhTLz
1JtCBgQucKnV4j9nUYgVvrfYDGH4X3KHsu
16chPF8HWZq7HgjivRiLkDSvJbAWFyfWg1
1DMEidMXgX9mRxcEic94FL3zhv7nzMBcLN
1LsfkvwMo6JBisYpGHkai18hyTzs4qSZjz
1FLLtCveUBbk41xDqDSTCmuhFUyNAq9Sbd
13AN7o5F2dgsyfc1AHjJRtPe6RubnZupnL
1LhB4cSeiiQzT2A7i7jbTvRT4YChXEJqci
AFAIK, you can just mine such public keys by a vanity engine brute force tool, and if you check, he only managed to mine keys for 3-4 leading zeros, not a big deal.
Whenever you managed to show me a used public key like this :
04fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141670999be34f51e8894b9c14211c28801d9a70fde24b71d3753854b35d07c9a11
Then we will talk. What he used is just a vanity public key generator. 😉
BTW, where are you with "point to point" multiplication? I assume no where because that's not possible.