Search content
Sort by

Showing 6 of 6 results by bozalic
Post
Topic
Board Development & Technical Discussion
Re: Generating Private Keys with OpenSSL in Bitcoin’s Early Days – Methods- History
by
bozalic
on 15/03/2025, 14:02:38 UTC
I am insteresting with method. First bitcoin client did this automatically off course.

I am trying to understand how algorithm works.



Quote from: AndrewWeb
link=topic=5534510.msg65158706#msg65158706 date=1741765966
I am eager to learn more about private key generation in Bitcoin’s early days. Do you think Satoshi or early miners used a specific method, or did each individual develop their own approach?

Let’s explore this through historical documentation and technical discussions. Please share any interesting findings you may have.

Thank you!
Back in 2009 Satoshi and early miners used a program called Bitcoin 0.1.0 to generate bitcoin addresses with corresponding private keys.

https://i.ibb.co/MxxDrS8s/100.jpg
Post
Topic
Board Development & Technical Discussion
Re: Generating Private Keys with OpenSSL in Bitcoin’s Early Days – Methods- History
by
bozalic
on 15/03/2025, 13:05:15 UTC
If this report for me. I am just using ai for translate.


AI post detected.

GPTZero -> 100%
copyleaks -> 100%

I will report it.
Post
Topic
Board Development & Technical Discussion
Re: Generating Private Keys with OpenSSL in Bitcoin’s Early Days – Methods- History
by
bozalic
on 07/03/2025, 10:13:35 UTC
 Thank you for the response. I have been researching the forum and old discussions, but what I am specifically looking for is a method that might have been used by early users to generate private keys using a combination of a string, passphrase, and salt.

 For example, was there any known practice of using OpenSSL commands like HMAC, PBKDF2, or direct hashing methods (e.g., SHA-256, SHA-512) to derive a private key deterministically?

 I am particularly interested in whether any early Bitcoin users might have used a repeatable process, similar to how deterministic wallets work today, but manually, without HD wallets.

 If anyone has insights, examples, or can point me to discussions covering this topic, I would appreciate it.


We could discuss the following questions:

1. Was it possible to generate private keys using OpenSSL in Bitcoin’s early days?

Yes. In fact older version of Bitcoin Core (back then it was called "Bitcoin" and "Bitcoin-Qt") had OpenSSL dependency.

5. Are there any previous discussions on Bitcointalk regarding deterministic private key generation in Bitcoin’s early days?

Yes, here's an example Deterministic wallets. You can use https://ninjastic.space/search to find other relevant discussion topic.
Post
Topic
Board Development & Technical Discussion
Topic OP
Generating Private Keys with OpenSSL in Bitcoin’s Early Days – Methods and Histo
by
bozalic
on 07/03/2025, 09:03:51 UTC
Title:




Hello Bitcointalk members,

I am conducting research on the methods used to generate private keys in Bitcoin’s early days. How did Satoshi Nakamoto and early miners generate Bitcoin-compatible private keys? I would like to initiate a technical discussion on using OpenSSL and other cryptographic tools for both deterministic and random private key generation.

As you know, Bitcoin private keys are 256-bit random numbers derived using the secp256k1 curve. However, there are some discussions and speculations regarding how OpenSSL was used in the early days of Bitcoin.

We could discuss the following questions:

1. Was it possible to generate private keys using OpenSSL in Bitcoin’s early days?


2. Which algorithms and methods were preferred in the OpenSSL versions used at the time?


3. Which hash functions or HMAC techniques might have been used for deterministic Bitcoin private key generation?


4. What sources of entropy might Satoshi or early miners have used?


5. Are there any previous discussions on Bitcointalk regarding deterministic private key generation in Bitcoin’s early days?



Example: Generating a Private Key Using OpenSSL

Today, we can generate a Bitcoin-compatible private key using OpenSSL with the following commands:

openssl ecparam -genkey -name secp256k1 -noout -out private-key.pem
openssl ec -in private-key.pem -text -noout

This command creates an ECDSA private key based on the secp256k1 curve. However, additional methods may be required for deterministic private key generation. For instance:

Is it possible to generate the same key every time using a message or a specific hash value?

Could deterministic private key derivation in Bitcoin’s early days have involved HMAC, PBKDF2, or SHA-256 techniques?

What role did older versions of OpenSSL play in this process?


I have conducted research on Bitcointalk and other forums but have not yet found a conclusive answer. If you have old discussions, documents, or sources on this topic, could you share them?

I am eager to learn more about private key generation in Bitcoin’s early days. Do you think Satoshi or early miners used a specific method, or did each individual develop their own approach?

Let’s explore this through historical documentation and technical discussions. Please share any interesting findings you may have.

Thank you!


Post
Topic
Board Development & Technical Discussion
Re: Can someone provide 3 examples of r,s,z and nonce data ?
by
bozalic
on 05/03/2025, 07:48:29 UTC
Can you provide the code with pm?


Good day

Can someone provide 3 examples of r,s,z and nonce data ?


nonce need <= 100

?

Thank you very much.
Post
Topic
Board Development & Technical Discussion
Re: I found a method to reverse public keys to private keys
by
bozalic
on 05/03/2025, 07:42:06 UTC
I guess in your specific code, if a weak or repeated nonce  is used, an attacker can compute it from  values and recover the private key. This is a well-known vulnerability in ECDSA when nonces are not generated securely.

However, Bitcoin does not use a random nonce for signing transactions. Instead, it employs RFC 6979, which ensures that the nonce is deterministically derived from the private key and the message hash. This prevents reuse and eliminates the risk of private key leakage due to nonce repetition or poor randomness.

If someone claims to have derived the private key from , they likely exploited a flawed nonce generation process. To verify this, one would need multiple signatures using the same nonce or a predictable nonce pattern. In Bitcoin, this should never happen under normal circumstances.


Can you share your code, so i want to check.


First of all, I'd like to say that I have a different account on the forum, and I'm creating this one just to stay anonymous.
I know how this sounds. but here me out.
All i need is one of you to generate a public key with a private key which is below 200 bits (just to note, I already done this method on 256 bit keys. I didn't touch any funds).
Sign at least two messages with that public key.
Include your bitcointalk username in one of them.
The more signatures you provide the faster it'll take my computer to compute it.
10 is well more than enough.

I also have a script to generate these, if you want to save time on that, but i recommend not trusting what i say and write your own script.

Edit: when you send the signatures, send them in this format:

R = 0xHexValue
S = 0xHexValue
Z = 0xHexValue

Note: both the nonce and the private key needs to be below 200 bits.