CRYPTODEEP
CRYPTODEEP

CRYPTODEEP

Financial security of data and secp256k1 elliptic curve cryptography against weak ECDSA signatures in BITCOIN cryptocurrency [email protected] - Email for all questions. The creators of the software are not responsible for the use of materials Donation Address: ♥ BTC: 1Lw2gTnMpxRUNBU85Hg4ruTwnpUPKdf3nV ♥ETH: 0xaBd66CF90898517573f19184b3297d651f7b90bf ♥ YooMoney.ru/to/410011415370470


Implement Frey-Rück Attack to get the secret key “K” (NONCE)

14 Oct 2022 11 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we implement an efficient Frey-Rück Attack algorithm for signing ECDSAa transaction on the Bitcoin blockchain. In our earlier posts, we touched on the topic of signature vulnerability several times ECDSA. With a...

Tesla BrainWallet traps from Bitcoin wallets beware of phishing and popular passphrases

22 Sep 2022 4 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH There are many forms to create a Bitcoin wallet. One of the first methods to create a Bitcoin wallet was known as  BrainWallet .BrainWallet convenient in the sense that it allows you to store in memory or in a notebook  » passphr...

Coingecko & Agent Ftpupload create beautiful crypto wallet addresses, but keep the private key safe

17 Sep 2022 5 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH Over the years, a whole cult has formed in the crypto community to create beautiful addresses for crypto wallets. Everyone can generate a «beautiful» address for themselves, which will not only be unique, but will also contain a cer...

Cryptocurrency of Bitcoin against QIANSHI quantum computer from Chinese search engine giant Baidu Inc.

16 Sep 2022 3 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In pursuit of qubits,  Baidu Inc  , as the leader among Chinese search engines, does not lag behind its Western competitor  Alphabet Inc. In August 2022, Chinese search engine giant Baidu Inc developed its own quantum computer,...

MrRobotQR scan QR codes from search engines in search of private keys of Bitcoin Wallets

15 Sep 2022 3 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH       We all know the phrase:  «Everything that gets on the Internet, remains in it forever and becomes publicly available.» Down to hidden content. The  2021 году pandemic brought back popularity  QR-кодов. For  the first time Q...

Bitcoin Wallet Recovery via ECDSA Short Signatures

14 Sep 2022 4 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH We all know that the disclosure of the secret key in the ECDSA signature can lead to the complete recovery of the Bitcoin Wallet. In our earlier articles, we looked at weaknesses and vulnerabilities in blockchain transactions, bu...

Reducing the private key through scalar multiplication using the ECPy + Google Colab library

13 Sep 2022 10 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   In this article, we will try to show how you can reduce the private key knowing only the leak from the «BLOCKCHAIN ​​FOLBIT LEAKS» list and the public key from «UTXO» .In the experimental part, we will use the 08ReducePrivateK...

Speed ​​up secp256k1 with endomorphism

12 Sep 2022 5 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   In this article, we will look  secp256k1 at the endomorphism acceleration function that helps in optimizing the validation  ECDSA for the Bitcoin cryptocurrency, but first, a little history. 12 января 2009 года Satoshi Nakam...

Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range

9 Sep 2022 6 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   In this article, we will look at the fastest algorithm for ECDLP from the field of computational number theory, Pollard’s kangaroo is also called Pollard’s lambda algorithm. Pollard’s kangaroo method computes  discrete logarit...

Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166

8 Sep 2022 3 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   In this article, we will create a tool that will generate Bitcoin Addresses (P2PKH) using the CVE-2008-0166 vulnerability. This is a research project to find BTC coins on earlier versions of the Bitcoin Core software client. R...