View Single Post
  #54  
Old 01-20-2018, 04:33
contextrax contextrax is offline
Friend
 
Join Date: Aug 2017
Posts: 43
Rept. Given: 0
Rept. Rcvd 17 Times in 7 Posts
Thanks Given: 4
Thanks Rcvd at 72 Times in 19 Posts
contextrax Reputation: 17
ECDLP Solved

Start date 2017.08.22
Solution found on 2018.01.19

The two colliding points was both found on my own computers.
Number of points collected is 11.423.593
Total number of iteration used is 0x1AE3F1`AE655476 (7 568 976 546 976 886)
The probability for solving at this point was 71.2% (Using both negation and frobenius map). This is a bit on the unlucky side. I was really hoping to get a solution before this.
The average number of iteration to find a distinguish point is 0x277E13F9. If I was to do this again I would lower this value.
Fastest point was found after only 0x2D iterations and the longest run to find one was 0x2`9F20FA67 iterations
Loading all points into memory required 348 Meg of RAM and it took about 3.5 min to load them and to calculate the solution.


Different CPU speeds running the solver v1.47:
Intel Core i7-6700 @ 3.40 GHz was able to get 52 million iterations/sec. (4 cores + HT)
Intel Core i5-4590 @ 3.30 GHz got 31 million iterations/sec
Intel Core i5-4250U @ 1.30 GHz got 14 million iterations/sec. (2 cores + HT)

Code:
Target: "Armadillo v9.64 Public"

Optimal Normal Base Type II
BasepointInit: 1570789295 (0x5DA057AF)
ONB2 Base.X  : 4089747062247003654720736468506441
ONB2 Base.Y  : 10111618751385367037406972360317044
ONB2 Pub.X   : 2127081270816270912006137526418476
ONB2 Pub.Y   : 7206819234412870204027887633390168
Secret       : 1984557253727814641989266002264698
Pub = Secret*Base

Code:
---- Start Keygen -----
Using HK symmetric key: BDA4FA1C
Key bytes before encryption: 1B 2E BD A4 FA 1C
Basepointinit set to : 0x5DA057AF (1570789295)
seed128 string  : "PVTKEYECCRND1516390685"
Using secret key: 1984557253727814641989266002264698
Curve SEED      : 1570789295
Base Point x    : 4089747062247003654720736468506441
Base Point y    : 10111618751385367037406972360317044
Public Point x  : 2127081270816270912006137526418476
Public Point y  : 7206819234412870204027887633390168
Private key     : 1984557253727814641989266002264698
key bytes       : 0A 84 04 23 16 01 48 41 43 4B 45 52 4D 41 4E 40 48 41 43 4B 2E 4E 45 54
prng string     : MAODAFJOEACPMLOJOOPPNDFIDKGJIIIENBJECGKF

User : hackerman@hack.net
Key : 000014-588113-2R0T9R-E9YFYX-45W1QA-Z7X7WV-A36KAY-8CDJZF-WP5JUM-8PBHCB
Reply With Quote
The Following 9 Users Gave Reputation+1 to contextrax For This Useful Post:
cjack (01-27-2018), copyleft (01-23-2018), deepzero (01-26-2018), HooK (02-28-2018), MarcElBichon (01-21-2018), mr.exodia (01-20-2018), niculaita (01-20-2018), TechLord (01-21-2018), tonyweb (01-21-2018)
The Following 14 Users Say Thank You to contextrax For This Useful Post:
Abaddon (01-22-2018), Apuromafo (03-04-2019), cachito (01-20-2018), cjack (01-27-2018), heXer (01-22-2018), HooK (02-28-2018), niculaita (01-20-2018), revert (02-18-2018), sendersu (01-25-2018), Stingered (01-22-2018), T-rad (01-20-2018), WaSt3d_ByTes (01-28-2018)