<<  >> (p.83)
    Author Topic: Pollard's kangaroo ECDLP solver  (Read 62398 times)
    WanderingPhilospher
    Sr. Member
    ****
    Offline Offline

    Activity: 1386
    Merit: 269

    Shooters Shoot...


    View Profile
    April 21, 2021, 12:00:53 PM
     #1641


    Yes, Kangaroo.exe saves in hex format.  The difference is Kangaroo.exe subtracts start range at beginning and then adds back once collision is found. Run -ws option, if you want to see it. I've told you how to do it, the rest is up to you.

    Also, not sure what you are trying to learn how it works. Many articles and this thread alone tell you how it works. And since you've looked at python script you should know as well. Tames find private keys, wilds find offset of private key, both with user defined dp setting.  People have answered you, what don't you believe or understand?  No magic tricks, no speed ups, just the programs and how they were designed.

    Thanks

    I think I wan to know about  elliptic-curves, ecdsa secp256k1 , how kangaroo attack on Elliptic Curve
    now, just read more about secp256k1 calculate (very difficult for me) look over view is ok, but I want to understand on math

    Feel lag knowledge from may people expert on crypto very long time sine bitcoin invented , need to know more a lot


    Who next make record name on Wikipedia with use kangaroo or any challenge puzzle ?
    interesting to have a name on record challenge

    Who found Kangaroo can attack Elliptic Curve?

    However kangaroo is just smart random method. best on low range (115 still on low not yet middle)

    Did bitcoin have some vulnerability that use pubkey on calculate?


    Pollard came up with Kangaroo method. Others saw it could be used for Bitcoin's curve.

    The program starts out with random; it randomly selects starting points, within a specified range, based on start and end range defined by user. Then it takes "calculated" jumps.  The jumps for Kangaroo.exe are basically half of range. If attacking 120 bits, kangaroos average jumps are around 60 bits.  Those jumps create the so called "paths" however, I am to believe that random jumps/points can and will eventually create a collision.

    The pubkey allows for calculations that the Kangaroo.exe can exploit. You can add/subtract points and that is the power with using a kangaroo program versus brute force like bitcrack.
Page 82
Viewing Page: 83