Skip to main content
The 2024 Developer Survey results are live! See the results

Questions tagged [cryptography]

Concerning the broad subject of cryptography and its narrow application in Bitcoin protocol and applications.

3 votes
0 answers
46 views

What is exactly Randstorm vulnerability?

I've read the article from Unciphered about it, multiple times, and still fail to understand it It basically says that wallets generated by BitcoinJs front end library from 2011 to 2015 are vulnerable ...
Maltoon Yezi's user avatar
0 votes
0 answers
40 views

Can I recover my investment? I've been scammed [duplicate]

I am a victim of a scam. There is a company saying that they can recover what was stolen, it's almost 200 k euros and according to them, I am required to top up the balance of your secure crypto ...
wnni Källerfors's user avatar
0 votes
1 answer
50 views

Is it possible to reduce the field size without disrupting generation of public keys?

I have a curious question, i am aware of the curve parameters of secp256k1. i was wondering if its possible to reduce to field to a 130 bit or lower without disrupting the actual functionality.. what ...
Melwyn's user avatar
  • 9
0 votes
0 answers
46 views

Bitcoin Core VM and hardware SHA256

It has come to my attention recently that linux machines store info about their cryptographic capabilities in /proc/crypto. A baremetal machine I have shows sha256_ssse3 in the sha256 module parameter,...
RooSoft's user avatar
  • 167
0 votes
0 answers
33 views

How to know the number of digits in the decimals place in division results (ECC SECP256K1)?

p - is the order of the finite field n - is the order of the group. Private keys can range from 1 (the generator point G) to n - 1. All the private keys (Priv) lie in certain ranges of 2. 2^a < ...
Maltoon Yezi's user avatar
4 votes
1 answer
413 views

Why does BIP-340 use secp256k1?

If the entire Taproot/Schnorr soft-fork was going to implement an entirely new signing scheme anyway that was completely independent from the previous ECDSA scheme, why did it use secp256k1? Couldn't ...
fiatjaf's user avatar
  • 631
1 vote
1 answer
46 views

What is one word seed word exactly?

I have the following code import hashlib import binascii def word_to_private_key(word): sha256_hash = hashlib.sha256(word.encode()).digest() private_key = binascii.hexlify(sha256_hash).decode(...
Asif Iqbal's user avatar
0 votes
0 answers
86 views

Is it safe to share half of the private key in WIF format?

Assuming I would generate my keys on https://www.bitaddress.org. Is it safe to share the following four pieces of data? One half of the private key. The public key. An SHA512 hash of the private key. ...
Ohumeronen's user avatar
2 votes
1 answer
187 views

Why is the challenge scalar multiplied with the private key scalar In the Schnorr identification protocol?

If Alice wants to prove to Bob she is the holder of private key x, without exposing x, they can use the Schnorr identification protocol which has the public function sG = kG + exG and the private ...
yonson's user avatar
  • 53
1 vote
0 answers
99 views

Decrypting wallet

I'm seeking assistance with understanding the technical aspects of how Electrum wallets handle parsing errors and potential solutions for resolving them. My friend has encountered a recurring issue ...
Dirk's user avatar
  • 11
0 votes
1 answer
101 views

Public key factors - but what's next?

Let's say I found (I know, impossible) public key factors. What to do with them next to compute original private key for that public key?
pbies's user avatar
  • 159
0 votes
0 answers
56 views

Unconfirmed bitcoins deposit from online casion. they paid a fee of 1.82 on a 4k withdrawal.. what do I do? [duplicate]

I made a bitcoin withdrawal from a online casino of $4000. They sent me the payment but it won't confirm. I see they payed a fee of $1.82 so I'm sure thats why it hasnt confirmed yet but Its been a ...
That one dude's user avatar
2 votes
1 answer
219 views

Probability of Generating a Bitcoin Address with Specific Starting and Ending Characters

I've recently come across a situation where scammers are generating (bitcoin) addresses that have the same starting and ending characters. This is concerning as many people, including myself, often ...
Oliver Offing's user avatar
8 votes
1 answer
164 views

Why doesn't Bitcoin Core use auxiliary randomness when performing Schnorr signatures?

BIP340 recommends using auxiliary randomness in generation of the Schnorr signature nonce, as follows: Using unpredictable randomness additionally increases protection against other side-channel ...
Matthew Leon's user avatar
11 votes
3 answers
4k views

How can I manually (on paper) calculate a Bitcoin public key from a private key?

I am interested in generating a Bitcoin address by hand for security's sake. After I choose/generate a private key, how do I generate the public key? From there, how would I double check my work? ...
Peter Bergman's user avatar

15 30 50 per page
1
2 3 4 5
20