Search content
Sort by

Showing 20 of 45 results by kknd
Post
Topic
Board Project Development
Re: Keyhunt - development requests - bug reports
by
kknd
on 19/05/2023, 16:38:36 UTC
g0g0g0

Code:
ubuntu@AWS:~/kknd/keyhunt$ ./keyhunt -m bsgs -f 125.pub -b 125 -R -q -S -n 0x400000000000 -k 4096 -t 15
[+] Version 0.2.230428 Satoshi Quest, developed by AlbertoBSD
[+] Random mode
[+] Quiet thread output
[+] K factor 4096
[+] Threads : 15
[+] Mode BSGS random
[+] Opening file 125.pub
[+] Added 1 points from file
[+] Bit Range 125
[+] -- from : 0x10000000000000000000000000000000
[+] -- to   : 0x20000000000000000000000000000000
[+] N = 0x400000000000
[+] Bloom filter for 34359738368 elements : 117781.20 MB
[+] Bloom filter for 1073741824 elements : 3680.66 MB
[+] Bloom filter for 33554432 elements : 115.02 MB
[+] Allocating 512.00 MB for 33554432 bP Points
[+] Reading bloom filter from file keyhunt_bsgs_4_34359738368.blm .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_6_1073741824.blm .... Done!
[+] Reading bP Table from file keyhunt_bsgs_2_33554432.tbl .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_7_33554432.blm .... Done!
[+] Total 1424941016555326638391296 keys in 1394970 seconds: ~1 Ekeys/s (1021485061725575918 keys/s)

Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==
by
kknd
on 02/05/2023, 19:10:43 UTC
1 Ekeys/s (1021708069969158067 keys/s)

1.021.708.069.969.158.067 keys/s

128gb + 16 AMD Ryzen 7 5800X


Code:
ubuntu@:~/kknd/keyhunt$ ./keyhunt -m bsgs -f 125.pub -b 125 -R -q -S -n 0x400000000000 -k 4096 -t 15
[+] Version 0.2.230428 Satoshi Quest, developed by AlbertoBSD
[+] Random mode
[+] Quiet thread output
[+] K factor 4096
[+] Threads : 15
[+] Mode BSGS random
[+] Opening file 125.pub
[+] Added 1 points from file
[+] Bit Range 125
[+] -- from : 0x10000000000000000000000000000000 [+] -- to   : 0x20000000000000000000000000000000
[+] N = 0x400000000000
[+] Bloom filter for 34359738368 elements : 117781.20 MB
[+] Bloom filter for 1073741824 elements : 3680.66 MB
[+] Bloom filter for 33554432 elements : 115.02 MB
[+] Allocating 512.00 MB for 33554432 bP Points
[+] Reading bloom filter from file keyhunt_bsgs_4_34359738368.blm .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_6_1073741824.blm .... Done!
[+] Reading bP Table from file keyhunt_bsgs_2_33554432.tbl .... Done!
[+] Reading bloom filter from file keyhunt_bsgs_7_33554432.blm .... Done!
[+] Total 82543794972808280276992 keys in 80790 seconds: ~1 Ekeys/s (1021708069969158067 keys/s)



Code:
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5800X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     enabled
    CPU max MHz:         3800.0000
    CPU min MHz:         2200.0000
    BogoMIPS:            7586.05
Post
Topic
Board Project Development
Merits 3 from 2 users
Re: Keyhunt - development requests - bug reports
by
kknd
on 01/05/2023, 23:12:00 UTC
⭐ Merited by Halab (2) ,albert0bsd (1)
https://kknd.com.br/etc/keyhunt.png

https://kknd.com.br/etc/htop.png

Code:
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5800X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     enabled
    CPU max MHz:         3800.0000
    CPU min MHz:         2200.0000
    BogoMIPS:            7586.05
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
kknd
on 01/05/2023, 23:09:02 UTC

https://kknd.com.br/etc/keyhunt.png

https://kknd.com.br/etc/htop.png

Code:
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         48 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  16
  On-line CPU(s) list:   0-15
Vendor ID:               AuthenticAMD
  Model name:            AMD Ryzen 7 5800X 8-Core Processor
    CPU family:          25
    Model:               33
    Thread(s) per core:  2
    Core(s) per socket:  8
    Socket(s):           1
    Stepping:            2
    Frequency boost:     enabled
    CPU max MHz:         3800.0000
    CPU min MHz:         2200.0000
    BogoMIPS:            7586.05
Post
Topic
Board Development & Technical Discussion
Re: VanitySearch (Yet another address prefix finder)
by
kknd
on 18/04/2023, 00:40:01 UTC
Agora a brincadeira ficou boa !

poderiam verificar a origem ...
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 22/05/2022, 12:23:38 UTC



https[Suspicious link removed] -t 0 -g --gpui 0 --gpux 256,256 -m addresses --coin BTC -o OWNZ.txt --range 12aa500da5c9fd25f7d3647d03f27b91647c40af11fdcd2987c45923a0bac696:12aa500da5c9fd25f7d3647d03f27b91647c40af11fdcd2987c4598c66d1da96 -i TEST.bin -b

12aa500da5c9fd25f7d3647d03f27b91647c40af11fdcd2987c45923a0bac696
1JLZmvAP7VZxMS2CfNYvZmtngwTdKkV9zG
13AXDCVfdWw7MSfsJhEWByKZ42gDpjjbhJ


12aa500da5c9fd25f7d3647d03f27b91647c40af11fdcd2987c4598c66d1da96
1NFwRx3838ReQwWaNBohCXwUe34gbwk9g6
18GL57b1yh5HP6HhsfRTe31AjrGFuWZxXs
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 21/05/2022, 22:18:18 UTC
I try
kanhavishva/KeyHunt-Cuda
and
phrutis/Rotor-Cuda

AND DONT FIND THE KEYS !

FAKE ? SCAM ?

https://github.com/phrutis/Rotor-Cuda/issues/38
https://github.com/kanhavishva/KeyHunt-Cuda/issues/59
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 18/05/2022, 16:17:56 UTC
clBitCrack (https://github.com/brichard19/BitCrack)
vs
cuBitCrack sp-mod #5 (https://github.com/sp-hash/Bitcrack)
vs
KeyHunt-Cuda (https://github.com/kanhavishva/KeyHunt-Cuda)

clBitCrack = 758.00 MKey/s in [00:00:23]
cuBitCrack sp-mod #5 = 1010.52 MKey/s in [00:00:16]
KeyHunt-Cuda = 863.86 Mk/s in [00:00:12]

Quote
C:\Users\r00t\Desktop\KeyHunt>KeyHunt-Cuda.exe -t 0 -g --gpui 0 --gpux 256,256 -m address --coin BTC --range 0000000000000001:7ffffffff 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

KeyHunt-Cuda v1.08

COMP MODE    : COMPRESSED
COIN TYPE    : BITCOIN
SEARCH MODE  : Single Address
DEVICE       : GPU
CPU THREAD   : 0
GPU IDS      : 0
GPU GRIDSIZE : 256x256
SSE          : YES
RKEY         : 0 Mkeys
MAX FOUND    : 65536
BTC ADDRESS  : 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
OUTPUT FILE  : Found.txt

Start Time   : Wed May 18 13:13:32 2022
Global start : 1 (1 bit)
Global end   : 7FFFFFFFF (35 bit)
Global range : 7FFFFFFFE (35 bit)

GPU          : GPU #0 NVIDIA GeForce RTX 3060 Laptop GPU (30x128 cores) Grid(256x256)

[00:00:12] [CPU+GPU: 863.86 Mk/s] [GPU: 863.86 Mk/s] [C: 30.859375 %] [R: 0] [T: 10,603,200,512 (34 bit)] [F: 0]
=================================================================================
PubAddress: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9MP7J9oTbu6KuRr
Priv (HEX): 4AED21170
PubK (HEX): 02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D
=================================================================================




EVGA RTX 2080

clBitCrack
758.00 MKey/s in [00:00:23]
-d 0 -b 42 -t 512 -p 2500

Code:
clBitCrack.exe -d 0 -b 42 -t 512 -p 2500 --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

[2021-04-03.22:16:52] [Info] Compression: compressed
[2021-04-03.22:16:52] [Info] Starting at: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:16:52] [Info] Ending at:   000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
[2021-04-03.22:16:52] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:16:52] [Info] Compiling OpenCL kernels...
[2021-04-03.22:16:52] [Info] Initializing GeForce RTX 2080
[2021-04-03.22:17:10] [Info] Generating 53,760,000 starting points (2050.8MB)
[2021-04-03.22:17:24] [Info] 10.0%
[2021-04-03.22:17:24] [Info] 20.0%
[2021-04-03.22:17:25] [Info] 30.0%
[2021-04-03.22:17:25] [Info] 40.0%
[2021-04-03.22:17:25] [Info] 50.0%
[2021-04-03.22:17:25] [Info] 60.0%
[2021-04-03.22:17:26] [Info] 70.0%
[2021-04-03.22:17:26] [Info] 80.0%
[2021-04-03.22:17:26] [Info] 90.0%
[2021-04-03.22:17:26] [Info] 100.0%
[2021-04-03.22:17:26] [Info] Done
GeForce RTX 2080 4921 / 8192MB | 1 target 758.00 MKey/s (19,568,640,000 total) [00:00:23][2021-04-03.22:17:53] [Info] Address:     1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
                             Private key: 00000000000000000000000000000000000000000000000000000004AED21170
                             Compressed:  yes
                             Public key:
                             02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D

[2021-04-03.22:17:53] [Info] No targets remaining


cuBitCrack sp-mod #5 (https://github.com/sp-hash)
932.93 MKey/s in [00:00:18]
-b 42 -t 512 -p 2500
Code:
cuBitCrack.exe -d 0 -b 42 -t 512 -p 2500 --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

Bitcrack sp-mod #5 (https://github.com/sp-hash)

[2021-04-03.22:02:29] [Info] Compression: compressed
[2021-04-03.22:02:29] [Info] Starting at: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:02:29] [Info] Ending at:   000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
[2021-04-03.22:02:29] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:02:29] [Info] Initializing GeForce RTX 2080
[2021-04-03.22:02:29] [Info] Generating 53,760,000 starting points (2050.8MB)
[2021-04-03.22:02:45] [Info] 10.0%
[2021-04-03.22:02:46] [Info] 20.0%
[2021-04-03.22:02:46] [Info] 30.0%
[2021-04-03.22:02:46] [Info] 40.0%
[2021-04-03.22:02:46] [Info] 50.0%
[2021-04-03.22:02:47] [Info] 60.0%
[2021-04-03.22:02:47] [Info] 70.0%
[2021-04-03.22:02:47] [Info] 80.0%
[2021-04-03.22:02:47] [Info] 90.0%
[2021-04-03.22:02:48] [Info] 100.0%
[2021-04-03.22:02:48] [Info] Done
GeForce RTX 2080 5976 / 8192MB | 1 target 932.93 MKey/s (18,923,520,000 total) [00:00:18][2021-04-03.22:03:10] [Info] Address:     1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
                             Private key: 00000000000000000000000000000000000000000000000000000004AED21170
                             Compressed:  yes
                             Public key:
                             02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D

[2021-04-03.22:03:10] [Info] No targets remaining
Execution time = 41 seconds

cuBitCrack sp-mod #5 (https://github.com/sp-hash)
1010.52 MKey/s in [00:00:16]
Code:
cuBitCrack.exe -d 0 --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

Bitcrack sp-mod #5 (https://github.com/sp-hash)

[2021-04-04.01:54:45] [Info] Compression: compressed
[2021-04-04.01:54:45] [Info] Starting at: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-04.01:54:45] [Info] Ending at:   000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
[2021-04-04.01:54:45] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-04.01:54:45] [Info] Initializing GeForce RTX 2080
[2021-04-04.01:54:46] [Info] Generating 48,611,328 starting points (1854.4MB)
[2021-04-04.01:55:04] [Info] 10.0%
[2021-04-04.01:55:04] [Info] 20.0%
[2021-04-04.01:55:04] [Info] 30.0%
[2021-04-04.01:55:04] [Info] 40.0%
[2021-04-04.01:55:05] [Info] 50.0%
[2021-04-04.01:55:05] [Info] 60.0%
[2021-04-04.01:55:05] [Info] 70.0%
[2021-04-04.01:55:06] [Info] 80.0%
[2021-04-04.01:55:06] [Info] 90.0%
[2021-04-04.01:55:06] [Info] 100.0%
[2021-04-04.01:55:06] [Info] Done
GeForce RTX 2080 5505 / 8192MB | 1 target 1010.52 MKey/s (18,472,304,640 total) [00:00:16][2021-04-04.01:55:26] [Info] Address:     1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
                             Private key: 00000000000000000000000000000000000000000000000000000004AED21170
                             Compressed:  yes
                             Public key:
                             02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D

[2021-04-04.01:55:26] [Info] No targets remaining
Execution time = 41 seconds

VanitySearch v1.15.4, add BitCrack mode
565.040 MK/s in 00:01:57
Code:
VanitySearch-1.15.4_bitcrack_th256gr.exe -b -gpu -gpuId 0 -t 0 -stop --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
VanitySearch v1.15.4, add BitCrack mode
[keyspace] start=0000000000000000000000000000000000000000000000000000000000000001
[keyspace]   end=000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
Difficulty: 1461501637330902918203684832716283019655932542976
Search: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb [Compressed or Uncompressed]
Start at Sun Apr  4 01:22:33 2021
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 2080 (46x64 cores) Grid(368x256)
565.040 MK/s (GPU 565.040 MK/s) (2^35.96) [00:01:57 lost_TIME_left infinity][0]
Pub Addr: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9MP7J9oTbu6KuRr
Priv (HEX): 0x00000000000000000000000000000000000000000000000000000004AED21170
Finish at Sun Apr  4 01:24:33 2021


VanitySearch v1.15.4, add BitCrack mode
514.464 MK/s in 00:01:02
Code:
"VanitySearch-1.15.4_bitcrack_th128gr(orig).exe" -b -gpu -gpuId 0 -t 0 -stop --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

VanitySearch v1.15.4, add BitCrack mode
[keyspace] start=0000000000000000000000000000000000000000000000000000000000000001
[keyspace]   end=000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
Difficulty: 1461501637330902918203684832716283019655932542976
Search: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb [Compressed or Uncompressed]
Start at Sat Apr  3 22:09:16 2021
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 2080 (46x64 cores) Grid(368x128)
514.464 MK/s (GPU 514.464 MK/s) (2^34.93) [00:01:02 lost_TIME_left infinity][0]
Pub Addr: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9MP7J9oTbu6KuRr
Priv (HEX): 0x00000000000000000000000000000000000000000000000000000004AED21170
Finish at Sat Apr  3 22:10:22 2021

Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 21/04/2022, 21:44:51 UTC
GeForce RTX 3060 Laptop GPU


cuBitCrack.exe

-b 64 -t 512 -p 1024
564.09 MKey/s [00:00:32]

-b 96 -t 128 -p 1024
605.41 MKey/s [00:00:30]

-b 128 -t 256 -p 1024
666.64 MKey/s [00:00:27]

-b 82 -t 256 -p 2096
704.18 MKey/s [00:00:25]

clBitCrack.exe

-b 128 -t 256 -p 1024
613.69 MKey/s [00:00:29]

-b 128 -t 256 -p 756
609.83 MKey/s [00:00:29]

-b 128 -t 256 -p 1024
618.68 MKey/s [00:00:29]

-b 82 -t 256 -p 2096
620.38 MKey/s [00:00:29]
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 06/04/2021, 02:31:12 UTC
This is normal ? the same 5 last digits every --continue salve file

Code:
start=E667E1F7F83AFE0A116B600527C2E3F5036D3A5B75FBB4580109BE466D0F818E
next=E667E1F7F83AFE0A116B600527C2E3F5036D3A5B75FBB45803A3E326710F818E
end=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364140
blocks=42
threads=512
points=2500
compression=both
device=0
elapsed=56088390
stride=0000000000000000000000000000000000000000000000000000000000000001

Code:
start=D26865903CCCE5DDBEC71A2523CCDAFD13E51EC2ACD574A5235C0E949EE972D1
next=D26865903CCCE5DDBEC71A2523CCDAFD13E51EC2ACD574A5296DE34C062972D1
end=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364140
blocks=42
threads=512
points=2500
compression=both
device=0
elapsed=130823312
stride=0000000000000000000000000000000000000000000000000000000000000001

Code:
start=19AF6EACEEB5F70423A37D460D6C5D8AC192FF7629D71EDC29B07EB1D8943793
next=19AF6EACEEB5F70423A37D460D6C5D8AC192FF7629D71EDC533B1C1226943793
end=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364140
blocks=42
threads=512
points=2500
compression=both
device=0
elapsed=914610374
stride=0000000000000000000000000000000000000000000000000000000000000001
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 04/04/2021, 05:11:12 UTC

EVGA RTX 2080

clBitCrack
758.00 MKey/s in [00:00:23]
-d 0 -b 42 -t 512 -p 2500

Code:
clBitCrack.exe -d 0 -b 42 -t 512 -p 2500 --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

[2021-04-03.22:16:52] [Info] Compression: compressed
[2021-04-03.22:16:52] [Info] Starting at: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:16:52] [Info] Ending at:   000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
[2021-04-03.22:16:52] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:16:52] [Info] Compiling OpenCL kernels...
[2021-04-03.22:16:52] [Info] Initializing GeForce RTX 2080
[2021-04-03.22:17:10] [Info] Generating 53,760,000 starting points (2050.8MB)
[2021-04-03.22:17:24] [Info] 10.0%
[2021-04-03.22:17:24] [Info] 20.0%
[2021-04-03.22:17:25] [Info] 30.0%
[2021-04-03.22:17:25] [Info] 40.0%
[2021-04-03.22:17:25] [Info] 50.0%
[2021-04-03.22:17:25] [Info] 60.0%
[2021-04-03.22:17:26] [Info] 70.0%
[2021-04-03.22:17:26] [Info] 80.0%
[2021-04-03.22:17:26] [Info] 90.0%
[2021-04-03.22:17:26] [Info] 100.0%
[2021-04-03.22:17:26] [Info] Done
GeForce RTX 2080 4921 / 8192MB | 1 target 758.00 MKey/s (19,568,640,000 total) [00:00:23][2021-04-03.22:17:53] [Info] Address:     1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
                             Private key: 00000000000000000000000000000000000000000000000000000004AED21170
                             Compressed:  yes
                             Public key:
                             02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D

[2021-04-03.22:17:53] [Info] No targets remaining


cuBitCrack sp-mod #5 (https://github.com/sp-hash)
932.93 MKey/s in [00:00:18]
-b 42 -t 512 -p 2500
Code:
cuBitCrack.exe -d 0 -b 42 -t 512 -p 2500 --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

Bitcrack sp-mod #5 (https://github.com/sp-hash)

[2021-04-03.22:02:29] [Info] Compression: compressed
[2021-04-03.22:02:29] [Info] Starting at: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:02:29] [Info] Ending at:   000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
[2021-04-03.22:02:29] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-03.22:02:29] [Info] Initializing GeForce RTX 2080
[2021-04-03.22:02:29] [Info] Generating 53,760,000 starting points (2050.8MB)
[2021-04-03.22:02:45] [Info] 10.0%
[2021-04-03.22:02:46] [Info] 20.0%
[2021-04-03.22:02:46] [Info] 30.0%
[2021-04-03.22:02:46] [Info] 40.0%
[2021-04-03.22:02:46] [Info] 50.0%
[2021-04-03.22:02:47] [Info] 60.0%
[2021-04-03.22:02:47] [Info] 70.0%
[2021-04-03.22:02:47] [Info] 80.0%
[2021-04-03.22:02:47] [Info] 90.0%
[2021-04-03.22:02:48] [Info] 100.0%
[2021-04-03.22:02:48] [Info] Done
GeForce RTX 2080 5976 / 8192MB | 1 target 932.93 MKey/s (18,923,520,000 total) [00:00:18][2021-04-03.22:03:10] [Info] Address:     1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
                             Private key: 00000000000000000000000000000000000000000000000000000004AED21170
                             Compressed:  yes
                             Public key:
                             02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D

[2021-04-03.22:03:10] [Info] No targets remaining
Execution time = 41 seconds

cuBitCrack sp-mod #5 (https://github.com/sp-hash)
1010.52 MKey/s in [00:00:16]
Code:
cuBitCrack.exe -d 0 --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

Bitcrack sp-mod #5 (https://github.com/sp-hash)

[2021-04-04.01:54:45] [Info] Compression: compressed
[2021-04-04.01:54:45] [Info] Starting at: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-04.01:54:45] [Info] Ending at:   000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
[2021-04-04.01:54:45] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2021-04-04.01:54:45] [Info] Initializing GeForce RTX 2080
[2021-04-04.01:54:46] [Info] Generating 48,611,328 starting points (1854.4MB)
[2021-04-04.01:55:04] [Info] 10.0%
[2021-04-04.01:55:04] [Info] 20.0%
[2021-04-04.01:55:04] [Info] 30.0%
[2021-04-04.01:55:04] [Info] 40.0%
[2021-04-04.01:55:05] [Info] 50.0%
[2021-04-04.01:55:05] [Info] 60.0%
[2021-04-04.01:55:05] [Info] 70.0%
[2021-04-04.01:55:06] [Info] 80.0%
[2021-04-04.01:55:06] [Info] 90.0%
[2021-04-04.01:55:06] [Info] 100.0%
[2021-04-04.01:55:06] [Info] Done
GeForce RTX 2080 5505 / 8192MB | 1 target 1010.52 MKey/s (18,472,304,640 total) [00:00:16][2021-04-04.01:55:26] [Info] Address:     1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
                             Private key: 00000000000000000000000000000000000000000000000000000004AED21170
                             Compressed:  yes
                             Public key:
                             02F6A8148A62320E149CB15C544FE8A25AB483A0095D2280D03B8A00A7FEADA13D

[2021-04-04.01:55:26] [Info] No targets remaining
Execution time = 41 seconds

VanitySearch v1.15.4, add BitCrack mode
565.040 MK/s in 00:01:57
Code:
VanitySearch-1.15.4_bitcrack_th256gr.exe -b -gpu -gpuId 0 -t 0 -stop --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
VanitySearch v1.15.4, add BitCrack mode
[keyspace] start=0000000000000000000000000000000000000000000000000000000000000001
[keyspace]   end=000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
Difficulty: 1461501637330902918203684832716283019655932542976
Search: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb [Compressed or Uncompressed]
Start at Sun Apr  4 01:22:33 2021
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 2080 (46x64 cores) Grid(368x256)
565.040 MK/s (GPU 565.040 MK/s) (2^35.96) [00:01:57 lost_TIME_left infinity][0]
Pub Addr: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9MP7J9oTbu6KuRr
Priv (HEX): 0x00000000000000000000000000000000000000000000000000000004AED21170
Finish at Sun Apr  4 01:24:33 2021


VanitySearch v1.15.4, add BitCrack mode
514.464 MK/s in 00:01:02
Code:
"VanitySearch-1.15.4_bitcrack_th128gr(orig).exe" -b -gpu -gpuId 0 -t 0 -stop --keyspace 1:FFFFFFFFFFFFFFFF 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb

VanitySearch v1.15.4, add BitCrack mode
[keyspace] start=0000000000000000000000000000000000000000000000000000000000000001
[keyspace]   end=000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFF
Difficulty: 1461501637330902918203684832716283019655932542976
Search: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb [Compressed or Uncompressed]
Start at Sat Apr  3 22:09:16 2021
Number of CPU thread: 0
GPU: GPU #0 GeForce RTX 2080 (46x64 cores) Grid(368x128)
514.464 MK/s (GPU 514.464 MK/s) (2^34.93) [00:01:02 lost_TIME_left infinity][0]
Pub Addr: 1PWCx5fovoEaoBowAvF5k91m2Xat9bMgwb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYjgd9MP7J9oTbu6KuRr
Priv (HEX): 0x00000000000000000000000000000000000000000000000000000004AED21170
Finish at Sat Apr  3 22:10:22 2021
Post
Topic
Board Development & Technical Discussion
Re: Pollard's kangaroo ECDLP solver
by
kknd
on 13/11/2020, 02:27:21 UTC
Ok ? the best for 2080 CX ?

Code:
C:\Users\plex\Desktop\k>Kangaroo.exe -t 0 -gpu -ws -w save.work -wi 60 -o k.txt 120.txt
Kangaroo v2.2
Start:800000000000000000000000000000
Stop :FFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Keys :1
Number of CPU thread: 0
Range width: 2^119
Jump Avg distance: 2^58.98
Number of kangaroos: 2^20.52
Suggested DP: 36
Expected operations: 2^60.61
Expected RAM: 990.0MB
DP size: 36 [0xFFFFFFFFF0000000]
GPU: GPU #0 GeForce RTX 2080 (46x64 cores) Grid(92x128) (122.0 MB used)
SolveKeyGPU Thread GPU#0: creating kangaroos...
SolveKeyGPU Thread GPU#0: 2^20.52 kangaroos [8.3s]
[896.72 MK/s][GPU 896.72 MK/s][Count 2^35.24][Dead 0][51s (Avg 62.2988y)][2.0/4.0MB]
SaveWork: save.work................done [140.0 MB] [01s] Thu Nov 12 23:18:05 2020
[900.67 MK/s][GPU 900.67 MK/s][Count 2^36.34][Dead 0][01:52 (Avg 62.0259y)][2.0/4.0MB]
SaveWork: save.work................done [140.0 MB] [01s] Thu Nov 12 23:19:06 2020
[899.76 MK/s][GPU 899.76 MK/s][Count 2^36.95][Dead 0][02:52 (Avg 62.0887y)][2.0/4.0MB]
SaveWork: save.work................done [140.0 MB] [01s] Thu Nov 12 23:20:06 2020
[896.86 MK/s][GPU 896.86 MK/s][Count 2^37.39][Dead 0][03:53 (Avg 62.289y)][2.0/4.0MB]
Post
Topic
Board Development & Technical Discussion
Merits 7 from 3 users
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 09/11/2020, 11:59:46 UTC
⭐ Merited by LoyceV (4) ,ETFbitcoin (2) ,NotATether (1)
benchmark


  • GeForce GT 640 = 9.11 MKeys/s
  • GeForce GTX 1060 3GB = compressed = 60.61 MKeys/s
  • GeForce GTX 1060 3GB = both = 46.93 MKeys/s
  • GeForce GTX 1070  = compressed = 109 MKeys/s
  • GeForce GTX 1070  = compressed = 85 MKeys/s (with 40k targets)
  • GeForce GTX 1070 TI = compressed = 80 MKeys/s (with 87k targets)
  • GeForce GTX 1080 TI = compressed = 1030 MKeys/s (with 40k targets)
  • GeForce GTX 1080 TI = compressed = 350.28 MKeys/s (-b 224 -t 128 -p 1024)
  • GeForce GTX 1080 TI = compressed = 350.28 MKeys/s
  • GeForce GTX 2070 TI = compressed = 805 MKeys/s (with 200 targets)
  • GeForce RXT 2080 TI = both = 631.57 MKeys/s
  • GeForce GTX 1050 TI = 64 MKeys/s (with 81 targets)
  • Tesla K80 = compressed = 39.76 MKeys/s
  • Tesla K80 = compressed = 68.21 MKeys/s (config)
  • Tesla P100 = compressed = 76 MKeys/s
  • Tesla P100 = compressed = 251 MKeys/s (config)
  • Tesla V100 = compressed = 174 MKeys/s
  • Tesla V100 = compressed = 603 MKeys/s (with 40k targets)  (config)
  • Tesla V100 = compressed = 715 MKeys/s (with 40k targets)  (config = -b 72 -t 512 -p 1024) =














Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 14/02/2020, 01:35:31 UTC
Great ! new version

2080 - 188.16 MKey/s (old 155)

466,284 addresses loaded (8.9MB)
GeForce RTX 2080 4937 / 8192MB | 466284 targets 188.16 MKey/s (215,884,623,360,000 total) [15:23:48:58][2020-02-13.22:33:11] [Info] Checkpoint
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin challenge transaction: ~100 BTC total bounty to solvers!
by
kknd
on 18/11/2019, 00:02:13 UTC
Scam. the pool will never find a solution. And do not share it. The author does not want to show the source code.

Is everyone who doesn't want to show the code a cheater? I have seen the source code and I can confirm that it is clean.

true ? view source ?
Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
kknd
on 21/06/2019, 21:20:14 UTC
GeForce RTX 2080 3232/8192MB | 1681330 targets 134.23 MKey/s (142,544,994,304,000 total) [12:06:01:53][2019-06-27.20:35:53] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 135.27 MKey/s (142,553,120,768,000 total) [12:06:02:54][2019-06-27.20:36:53] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 134.23 MKey/s (142,561,247,232,000 total) [12:06:03:54][2019-06-27.20:37:54] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 135.27 MKey/s (142,569,373,696,000 total) [12:06:04:55][2019-06-27.20:38:54] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 136.39 MKey/s (142,577,500,160,000 total) [12:06:05:55][2019-06-27.20:39:55] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 135.34 MKey/s (142,585,626,624,000 total) [12:06:06:55][2019-06-27.20:40:55] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 135.34 MKey/s (142,593,753,088,000 total) [12:06:07:56][2019-06-27.20:41:55] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681330 targets 135.27 MKey/s (142,601,879,552,000 total) [12:06:08:56][2019-06-27.20:42:56] [Info] Checkpoint

this Smiley
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
kknd
on 21/06/2019, 00:26:04 UTC
any for windows ? 2080ti to test

I modified some code for catching bit90 with small memory
need someone to test Grin


/**********************************************************************
* Copyright (c) 2017, Jochen Hoenicke *
* *
* Compile with: *
* gcc -O2 -I secp256k1/src/ -I secp256k1/ break_short.c -lgmp *
**********************************************************************/

#include "libsecp256k1-config.h"

#include
#include
#include

#include

#include "include/secp256k1.h"
#include "secp256k1.c"

//#define  MEM_SIZE    31  //for 64GB
#define  MEM_SIZE    30  //for 32GB
//#define  MEM_SIZE    29  //for 16GB
//#define  MEM_SIZE    28  //for 8GB
#define  CHECK_BITS  90

/* giant steps are 2^25 */
#define GSTEP ((uint64_t)1<

#define NUMPUBKEYS  17
unsigned char rawpubkeys[NUMPUBKEYS][33] = {
{ 0x03,0x29,0xc4,0x57,0x4a,0x4f,0xd8,0xc8,0x10,0xb7,0xe4,0x2a,0x4b,0x39,0x88,0x82,0xb3,0x81,0xbc,0xd8,0x5e,0x40,0xc6,0x88,0x37,0x12,0x91,0x2d,0x16,0x7c,0x83,0xe7,0x3a },//== 1Kh22PvXERd2xpTQk3ur6pPEqFeckCJfAr#85
{ 0x03,0x5c,0x38,0xbd,0x9a,0xe4,0xb1,0x0e,0x8a,0x25,0x08,0x57,0x00,0x6f,0x3c,0xfd,0x98,0xab,0x15,0xa6,0x19,0x6d,0x9f,0x4d,0xfd,0x25,0xbc,0x7e,0xcc,0x77,0xd7,0x88,0xd5 },//== 1L12FHH2FHjvTviyanuiFVfmzCy46RRATU#90
{ 0x02,0x96,0x7a,0x59,0x05,0xd6,0xf3,0xb4,0x20,0x95,0x9a,0x02,0x78,0x9f,0x96,0xab,0x4c,0x32,0x23,0xa2,0xc4,0xd2,0x76,0x2f,0x81,0x7b,0x78,0x95,0xc5,0xbc,0x88,0xa0,0x45 },//== 19eVSDuizydXxhohGh8Ki9WY9KsHdSwoQC#95
{ 0x03,0xd2,0x06,0x3d,0x40,0x40,0x2f,0x03,0x0d,0x4c,0xc7,0x13,0x31,0x46,0x88,0x27,0xaa,0x41,0xa8,0xa0,0x9b,0xd6,0xfd,0x80,0x1b,0xa7,0x7f,0xb6,0x4f,0x8e,0x67,0xe6,0x17 },//== 1KCgMv8fo2TPBpddVi9jqmMmcne9uSNJ5F#100
{ 0x03,0xbc,0xf7,0xce,0x88,0x7f,0xfc,0xa5,0xe6,0x2c,0x9c,0xab,0xbd,0xb7,0xff,0xa7,0x1d,0xc1,0x83,0xc5,0x2c,0x04,0xff,0x4e,0xe5,0xee,0x82,0xe0,0xc5,0x5c,0x39,0xd7,0x7b },//== 1CMjscKB3QW7SDyQ4c3C3DEUHiHRhiZVib#105
{ 0x03,0x09,0x97,0x6b,0xa5,0x57,0x09,0x66,0xbf,0x88,0x91,0x96,0xb7,0xfd,0xf5,0xa0,0xf9,0xa1,0xe9,0xab,0x34,0x05,0x56,0xec,0x29,0xf8,0xbb,0x60,0x59,0x96,0x16,0x16,0x7d },//== 12JzYkkN76xkwvcPT6AWKZtGX6w2LAgsJg#110
{ 0x02,0x48,0xd3,0x13,0xb0,0x39,0x8d,0x49,0x23,0xcd,0xca,0x73,0xb8,0xcf,0xa6,0x53,0x2b,0x91,0xb9,0x67,0x03,0x90,0x2f,0xc8,0xb3,0x2f,0xd4,0x38,0xa3,0xb7,0xcd,0x7f,0x55 },//== 1NLbHuJebVwUZ1XqDjsAyfTRUPwDQbemfv#115
{ 0x02,0xce,0xb6,0xcb,0xbc,0xdb,0xdf,0x5e,0xf7,0x15,0x06,0x82,0x15,0x0f,0x4c,0xe2,0xc6,0xf4,0x80,0x7b,0x34,0x98,0x27,0xdc,0xdb,0xdd,0x1f,0x2e,0xfa,0x88,0x5a,0x26,0x30 },//== 17s2b9ksz5y7abUm92cHwG8jEPCzK3dLnT#120
{ 0x02,0x33,0x70,0x9e,0xb1,0x1e,0x0d,0x44,0x39,0xa7,0x29,0xf2,0x1c,0x2c,0x44,0x3d,0xed,0xb7,0x27,0x52,0x82,0x29,0x71,0x3f,0x00,0x65,0x72,0x1b,0xa8,0xfa,0x46,0xf0,0x0e },//== 1PXAyUB8ZoH3WD8n5zoAthYjN15yN5CVq5#125
{ 0x03,0x63,0x3c,0xbe,0x3e,0xc0,0x2b,0x94,0x01,0xc5,0xef,0xfa,0x14,0x4c,0x5b,0x4d,0x22,0xf8,0x79,0x40,0x25,0x96,0x34,0x85,0x8f,0xc7,0xe5,0x9b,0x1c,0x09,0x93,0x78,0x52 },//== 1Fo65aKq8s8iquMt6weF1rku1moWVEd5Ua#130
{ 0x02,0x14,0x5d,0x26,0x11,0xc8,0x23,0xa3,0x96,0xef,0x67,0x12,0xce,0x0f,0x71,0x2f,0x09,0xb9,0xb4,0xf3,0x13,0x5e,0x3e,0x0a,0xa3,0x23,0x0f,0xb9,0xb6,0xd0,0x8d,0x1e,0x16 },//== 16RGFo6hjq9ym6Pj7N5H7L1NR1rVPJyw2v#135
{ 0x03,0x1f,0x6a,0x33,0x2d,0x3c,0x5c,0x4f,0x2d,0xe2,0x37,0x8c,0x01,0x2f,0x42,0x9c,0xd1,0x09,0xba,0x07,0xd6,0x96,0x90,0xc6,0xc7,0x01,0xb6,0xbb,0x87,0x86,0x0d,0x66,0x40 },//== 1QKBaU6WAeycb3DbKbLBkX7vJiaS8r42Xo#140
{ 0x03,0xaf,0xdd,0xa4,0x97,0x36,0x9e,0x21,0x9a,0x2c,0x1c,0x36,0x99,0x54,0xa9,0x30,0xe4,0xd3,0x74,0x09,0x68,0xe5,0xe4,0x35,0x24,0x75,0xbc,0xff,0xce,0x31,0x40,0xda,0xe5 },//== 19GpszRNUej5yYqxXoLnbZWKew3KdVLkXg#145
{ 0x03,0x13,0x78,0x07,0x79,0x0e,0xa7,0xdc,0x6e,0x97,0x90,0x1c,0x2b,0xc8,0x74,0x11,0xf4,0x5e,0xd7,0x4a,0x56,0x29,0x31,0x5c,0x4e,0x4b,0x03,0xa0,0xa1,0x02,0x25,0x0c,0x49 },//== 1MUJSJYtGPVGkBCTqGspnxyHahpt5Te8jy#150
{ 0x03,0x5c,0xd1,0x85,0x4c,0xae,0x45,0x39,0x1c,0xa4,0xec,0x42,0x8c,0xc7,0xe6,0xc7,0xd9,0x98,0x44,0x24,0xb9,0x54,0x20,0x9a,0x8e,0xea,0x19,0x7b,0x9e,0x36,0x4c,0x05,0xf6 },//== 1AoeP37TmHdFh8uN72fu9AqgtLrUwcv2wJ#155
{ 0x02,0xe0,0xa8,0xb0,0x39,0x28,0x2f,0xaf,0x6f,0xe0,0xfd,0x76,0x9c,0xfb,0xc4,0xb6,0xb4,0xcf,0x87,0x58,0xba,0x68,0x22,0x0e,0xac,0x42,0x0e,0x32,0xb9,0x1d,0xdf,0xa6,0x73 },//== 1NBC8uXJy1GiJ6drkiZa1WuKn51ps7EPTv#160
{ 0x02,0x5f,0x86,0x4e,0x8c,0xa1,0xe1,0x5a,0x54,0x1e,0xfa,0x6a,0x65,0x9b,0x4a,0x6e,0xb1,0xe3,0xab,0x4a,0xe8,0xeb,0x80,0xcf,0x7f,0x0b,0xdc,0xad,0xfb,0x16,0x52,0x5b,0x18 },//== 1PvaqLqRAivje7CactLR55xQBYvBeaDrXN
};

typedef struct hashtable_entry {
    uint32_t x2;
    uint32_t x3;
    uint32_t exponent;
} hashtable_entry;

#define HASH_SIZE (2*GSTEP)
hashtable_entry table[HASH_SIZE];
secp256k1_ge pubkeys[NUMPUBKEYS];

int main(int argc, char **argv) {
    secp256k1_context *ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE);

    int next = 0;
    
    for (int i = 0; i < NUMPUBKEYS; i++) {
        if (!secp256k1_eckey_pubkey_parse(&pubkeys, rawpubkeys, 33)) {
            printf("Unparsable pubkey %2d\n", i);
            return -1;
        }
    }

    printf("Check bit = %d only, pubkey is:\n",CHECK_BITS);
    for(uint32_t i= 0;i<33;i++)
      printf("%02x",rawpubkeys[CHECK_BITS/5 - 17]);
    printf("\n");
      

    int shift_gmax;
    shift_gmax = CHECK_BITS - MEM_SIZE*2 -1;
    if(shift_gmax <0 ){
       printf("Error, CHECK_BITS too small =%d, should >= %d\n",CHECK_BITS, MEM_SIZE*2 +1);
       return 1;
    }

    unsigned int skip_bits;
    skip_bits = CHECK_BITS - MEM_SIZE -2;
    //printf("skip bits %d\n",skip_bits);

    uint64_t skip;
    uint64_t g_max;
    skip  = (uint64_t)0x1 << skip_bits;
    g_max = ((uint64_t)0x1 << shift_gmax)* (uint64_t)(GSTEP);
    //printf("skip %016lx gmax %016lx\n",skip,g_max);

    uint128_t rstart,rend;
    uint64_t start_hi,start_lo;
    uint64_t end_hi,end_lo;

    rstart   = (uint128_t)skip *(uint128_t)(HASH_SIZE);
    rend     = (uint128_t)g_max*(uint128_t)(HASH_SIZE)-1;
    start_lo = rstart;
    start_hi = rstart>>64;
    end_lo   = rend;
    end_hi   = rend>>64;

    uint64_t one_table_bytes;
    one_table_bytes = (uint64_t)&table[1] - (uint64_t)&table[0];

    printf("Build Hash, MEM size = %dGB\n", (uint32_t)(HASH_SIZE*one_table_bytes>>30));
    secp256k1_gej pt;
    secp256k1_gej_set_ge(&pt, &secp256k1_ge_const_g);
    for (uint64_t i = 1; i < GSTEP; i++) {
        secp256k1_fe x,zinv;
        secp256k1_fe_storage xst;

        secp256k1_fe_inv_var(&zinv, &pt.z);
        secp256k1_fe_sqr(&zinv, &zinv);
        secp256k1_fe_mul(&x, &pt.x, &zinv);
        secp256k1_fe_to_storage(&xst, &x);
        uint32_t entry = xst.n[0] & (HASH_SIZE-1);
        while (table[entry].exponent != 0) {
            entry = (entry + (xst.n[1] | 1)) & (HASH_SIZE - 1);
        }
        table[entry].exponent = i;
        table[entry].x2 = (uint32_t)xst.n[2];
        table[entry].x3 = (uint32_t)xst.n[3];
        secp256k1_gej_add_ge_var(&pt, &pt, &secp256k1_ge_const_g, NULL);
    }

    secp256k1_ge ptgstep;
    secp256k1_gej_neg(&pt, &pt);
    secp256k1_gej_double_var(&pt, &pt, NULL);


    secp256k1_ge_set_gej(&ptgstep, &pt);

    //secp256k1_gej_set_infinity(&pt);
    

    printf("Search bits = %d\n",CHECK_BITS);
    //skip some point by power of 2, we dont care 0 to start point
    //TODO update to random postion in a region
    for (uint64_t i = 0; i < skip_bits; i+=1) {
      secp256k1_gej_double_var(&pt, &pt, NULL);
    }

    printf("Search Keys....  from %lx%016lx to %lx%016lx\n",start_hi,start_lo, end_hi,end_lo);
    for (uint64_t i = skip; i < g_max; i++) {

//        for (int j = next; j < NUMPUBKEYS; j++) {
            secp256k1_gej diff;
            secp256k1_fe x,zinv;
            secp256k1_fe_storage xst;

            secp256k1_gej_add_ge_var(&diff, &pt, &pubkeys[CHECK_BITS/5 - 17], NULL);//check
            secp256k1_fe_inv_var(&zinv, &diff.z);
            secp256k1_fe_sqr(&zinv, &zinv);
            secp256k1_fe_mul(&x, &diff.x, &zinv);
            secp256k1_fe_to_storage(&xst, &x);


            uint32_t entry = xst.n[0] & (HASH_SIZE-1);
            while (table[entry].exponent != 0) {
                //if (table[entry].x == (uint32_t) xst.n[2]) {
                if ((table[entry].x2 == (uint32_t)xst.n[2]) && (table[entry].x3 == (uint32_t)xst.n[3])) {

                    uint128_t key = (uint128_t) i *  (uint128_t) (2 * GSTEP);

                    uint128_t key1 = key - table[entry].exponent ;
                    uint128_t key2 = key + table[entry].exponent;

          uint64_t key1lo = key1;
          uint64_t key1hi = (key1 >> 64);
          uint64_t key2lo = key2;
          uint64_t key2hi = (key2 >> 64);
                    printf("Found private key %2d: %lx%016lx or %lx%016lx\n", CHECK_BITS,  key1hi,key1lo,key2hi,key2lo);

                    FILE *fp = fopen("key.log","a+");
                    fprintf(fp,"Found private, i=%16lx, x 2 x %16lx, exp=%x\n",(uint64_t)i+1,GSTEP,table[entry].exponent);
                    fclose(fp);
 
//                    next++;
                    //if (next == NUMPUBKEYS)
                        return 0;
                }        
                entry = (entry + (xst.n[1] | 1)) & (HASH_SIZE - 1);
            }
         //   if (j == next)
         //       break;
        //}
        //
        secp256k1_gej_add_ge_var(&pt, &pt, &ptgstep, NULL);
    }
    return 0;
}

Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
kknd
on 17/06/2019, 04:44:17 UTC
2080 , any source to try ?
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
kknd
on 13/05/2019, 15:03:39 UTC
try this kknd
-b 36 -t 512 -p 2800

-b 200 -t 512 -p 512
Quote
C:\Users\admin\Desktop\bitcrack>clBitCrack.exe -d 0 -b 200 -t 512 -p 512  -----
[2019-05-12.23:11:56] [Info] Loading ' c3.txt'
[2019-05-12.23:11:56] [Info] Compression: both
[2019-05-12.23:11:56] [Info] Starting at: F9F882DF6F85D35711C4298BDB870F16916F13C
[2019-05-12.23:11:56] [Info] Ending at:   FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDC
[2019-05-12.23:11:56] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2019-05-12.23:11:56] [Info] Compiling OpenCL kernels...
[2019-05-12.23:11:56] [Info] Initializing GeForce RTX 2080
[2019-05-12.23:12:03] [Info] Generating 52,428,800 starting points (2000.0MB)
[2019-05-12.23:12:10] [Info] 10.0%
[2019-05-12.23:12:11] [Info] 20.0%
[2019-05-12.23:12:12] [Info] 30.0%
[2019-05-12.23:12:13] [Info] 40.0%
[2019-05-12.23:12:15] [Info] 50.0%
[2019-05-12.23:12:16] [Info] 60.0%
[2019-05-12.23:12:17] [Info] 70.0%
[2019-05-12.23:12:18] [Info] 80.0%
[2019-05-12.23:12:20] [Info] 90.0%
[2019-05-12.23:12:21] [Info] 100.0%
[2019-05-12.23:12:21] [Info] Done
[2019-05-12.23:12:22] [Info] Loading addresses from '01btc.txt'
[2019-05-12.23:12:32] [Info] 1,681,329 addresses loaded (32.1MB)
GeForce RTX 2080 3232/8192MB | 1681329 targets 135.27 MKey/s (52,931,539,763,200 total) [4:13:01:43][2019-05-13.11:53:49] [Info] Checkpoint

-b 36 -t 512 -p 2800
Quote
C:\Users\admin\Desktop\bitcrack>clBitCrack.exe -d 0 -b 36 -t 512 -p 2800
[2019-05-13.12:01:25] [Info] Loading ' c3.txt'
[2019-05-13.12:01:25] [Info] Compression: both
[2019-05-13.12:01:25] [Info] Starting at: F9F882DF6F85D35711C4298BDB870F16916F13
[2019-05-13.12:01:25] [Info] Ending at:   FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6
[2019-05-13.12:01:25] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2019-05-13.12:01:25] [Info] Compiling OpenCL kernels...
[2019-05-13.12:01:25] [Info] Initializing GeForce RTX 2080
[2019-05-13.12:01:31] [Info] Generating 51,609,600 starting points (1968.8MB)
[2019-05-13.12:01:38] [Info] 10.0%
[2019-05-13.12:01:39] [Info] 20.0%
[2019-05-13.12:01:40] [Info] 30.0%
[2019-05-13.12:01:41] [Info] 40.0%
[2019-05-13.12:01:43] [Info] 50.0%
[2019-05-13.12:01:44] [Info] 60.0%
[2019-05-13.12:01:45] [Info] 70.0%
[2019-05-13.12:01:46] [Info] 80.0%
[2019-05-13.12:01:47] [Info] 90.0%
[2019-05-13.12:01:48] [Info] 100.0%
[2019-05-13.12:01:48] [Info] Done
[2019-05-13.12:01:48] [Info] Loading addresses from '01btc.txt'
[2019-05-13.12:01:57] [Info] 1,681,329 addresses loaded (32.1MB)
GeForce RTX 2080 3182/8192MB | 1681329 targets 135.39 MKey/s (52,991,521,587,200 total) [4:13:10:04][2019-05-13.12:02:26] [Info] Checkpoint
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
kknd
on 13/05/2019, 02:21:09 UTC
Any pool to join ? RTX 2080

Quote
GeForce RTX 2080 3232/8192MB | 1681329 targets 135.27 MKey/s (41,063,232,307,200 total) [3:12:33:56][2019-05-12.10:46:31] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681329 targets 134.23 MKey/s (41,071,358,771,200 total) [3:12:34:56][2019-05-12.10:47:31] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681329 targets 134.16 MKey/s (41,079,485,235,200 total) [3:12:35:56][2019-05-12.10:48:31] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681329 targets 135.27 MKey/s (41,087,611,699,200 total) [3:12:36:56][2019-05-12.10:49:31] [Info] Checkpoint
GeForce RTX 2080 3232/8192MB | 1681329 targets 135.34 MKey/s (41,095,738,163,200 total) [3:12:37:57][2019-05-12.10:50:32] [Info] Checkpoint


GeForce RTX 2080 3232/8192MB | 1681329 targets 134.16 MKey/s (41,079,485,235,200 total) [3:12:35:56][2019-05-12.10:48:31] [Info] Checkpoint  !!!!
you are getting only 134MKey/s ?
check this
he is getting 5x to 10x faster

To search for a compressed key, the speed is even higher.
bat file: cuBitCrack.exe -c address -b 112 -t 512 -p 512 -o key.txt    




1681329 targets   Grin