Speed ​​up secp256k1 with endomorphism

In this article, we will look  secp256k1 at the endomorphism acceleration function that helps in optimizing the validation  ECDSA for the Bitcoin cryptocurrency, but first, a little history. 12 января 2009 года Satoshi Nakamoto sent Hal Finney   in the earliest bitcoin transactions  10 BTC. That Satoshi Nakamoto chose Hal as the first recipient of Bitcoins is not surprising. Satoshi had great respect for Hal, who established…

Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range

In this article, we will look at the fastest algorithm for ECDLP from the field of computational number theory, Pollard's kangaroo is also called Pollard's lambda algorithm. Pollard's kangaroo method computes  discrete logarithms  in arbitrary cyclic groups. It is applied if the discrete logarithm is known to lie in a certain range, say  [ a , b ], and then has…

Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166

In this article, we will create a tool that will generate Bitcoin Addresses (P2PKH) using the CVE-2008-0166 vulnerability. This is a research project to find BTC coins on earlier versions of the Bitcoin Core software client. Random number generator that generates  predictable numbers  CVE-2008-0166 VAIM-OpenSSL 0.9.8/1.0.0 Detected The critical vulnerability version  OpenSSL 0.9.8 CVE-2008-0166 was  populated with process ID only. Due to differences between endianness…

Useful and efficient algorithms for secp256k1 elliptic curve

In this article, we will consider several useful and efficient algorithms for an elliptic curve  E  over a field  GF(p)  given by the short Weierstrass equation у^2 = х^3 + Ах + В  Algorithm for generating a point on curve  E  Algorithm for adding points  Doubling Point Algorithm  Algorithm for finding an integer multiple point  Algorithm for finding an integer multiple point (scalar multiplication)…

How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins

In this article, we will learn how to check the balance of Bitcoin coins in a large amount of data using the bitcoin-checker.py Python script for  this . The result of checking the Python script bitcoin-checker.py We will also learn how to convert the public key of Bitcoin  PUBKEY (HEX) to Bitcoin Address  (Base58) All this big work is done  by the Python script  pubtoaddr.py…

The very first serious vulnerability in Blockchain and how to get the public key Bitcoin ECDSA RSZ value from the RawTX file

In this article, we will talk about extracting signature values  ECDSA R, S, Z ​​from the Bitcoin blockchain, but first, let's remember the very first serious vulnerability in the blockchain transaction that was discovered by  Niels Schneider  ( Nils Schneider aka  tcatm  ) Bitcoin developer and owner  of "BitcoinWatch"  &  "BitcoinCharts". 4.1 History of dangerous random attacks on Bitcoin Document  [PDF]: Private Key Recovery Combination Attacks: On Extreme Fragility of Popular…

The biggest hack in the history of Bitcoin

Bitcoin Wallet Silk Road this is probably the largest hack in the history of Bitcoin, since the balance of coins was 69,369  BTC  in terms of dollars, the amount exceeded more than  $1 billion . This notorious bitcoin wallet  1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx  was tied to a darknet marketplace that was closed in 2013 and its creator, Ross Ulbricht. In 2019, an encrypted wallet.dat file was…