Questions tagged [cryptography]
Concerning the broad subject of cryptography and its narrow application in Bitcoin protocol and applications.
296
questions
3
votes
0
answers
46
views
What is exactly Randstorm vulnerability?
I've read the article from Unciphered about it, multiple times, and still fail to understand it
It basically says that wallets generated by BitcoinJs front end library from 2011 to 2015 are vulnerable ...
0
votes
0
answers
40
views
Can I recover my investment? I've been scammed [duplicate]
I am a victim of a scam. There is a company saying that they can recover what was stolen, it's almost 200 k euros and according to them, I am required to top up the balance of your secure crypto ...
0
votes
1
answer
50
views
Is it possible to reduce the field size without disrupting generation of public keys?
I have a curious question, i am aware of the curve parameters of secp256k1. i was wondering if its possible to reduce to field to a 130 bit or lower without disrupting the actual functionality.. what ...
0
votes
0
answers
46
views
Bitcoin Core VM and hardware SHA256
It has come to my attention recently that linux machines store info about their cryptographic capabilities in /proc/crypto.
A baremetal machine I have shows sha256_ssse3 in the sha256 module parameter,...
0
votes
0
answers
33
views
How to know the number of digits in the decimals place in division results (ECC SECP256K1)?
p - is the order of the finite field
n - is the order of the group. Private keys can range from 1 (the generator point G) to n - 1.
All the private keys (Priv) lie in certain ranges of 2.
2^a < ...
4
votes
1
answer
413
views
Why does BIP-340 use secp256k1?
If the entire Taproot/Schnorr soft-fork was going to implement an entirely new signing scheme anyway that was completely independent from the previous ECDSA scheme, why did it use secp256k1?
Couldn't ...
1
vote
1
answer
46
views
What is one word seed word exactly?
I have the following code
import hashlib
import binascii
def word_to_private_key(word):
sha256_hash = hashlib.sha256(word.encode()).digest()
private_key = binascii.hexlify(sha256_hash).decode(...
0
votes
0
answers
86
views
Is it safe to share half of the private key in WIF format?
Assuming I would generate my keys on https://www.bitaddress.org.
Is it safe to share the following four pieces of data?
One half of the private key.
The public key.
An SHA512 hash of the private key.
...
2
votes
1
answer
187
views
Why is the challenge scalar multiplied with the private key scalar In the Schnorr identification protocol?
If Alice wants to prove to Bob she is the holder of private key x, without exposing x, they can use the Schnorr identification protocol which has the public function sG = kG + exG and the private ...
1
vote
0
answers
99
views
Decrypting wallet
I'm seeking assistance with understanding the technical aspects of how Electrum wallets handle parsing errors and potential solutions for resolving them. My friend has encountered a recurring issue ...
0
votes
1
answer
101
views
Public key factors - but what's next?
Let's say I found (I know, impossible) public key factors. What to do with them next to compute original private key for that public key?
0
votes
0
answers
56
views
Unconfirmed bitcoins deposit from online casion. they paid a fee of 1.82 on a 4k withdrawal.. what do I do? [duplicate]
I made a bitcoin withdrawal from a online casino of $4000. They sent me the payment but it won't confirm. I see they payed a fee of $1.82 so I'm sure thats why it hasnt confirmed yet but Its been a ...
2
votes
1
answer
219
views
Probability of Generating a Bitcoin Address with Specific Starting and Ending Characters
I've recently come across a situation where scammers are generating (bitcoin) addresses that have the same starting and ending characters. This is concerning as many people, including myself, often ...
8
votes
1
answer
164
views
Why doesn't Bitcoin Core use auxiliary randomness when performing Schnorr signatures?
BIP340 recommends using auxiliary randomness in generation of the Schnorr signature nonce, as follows:
Using unpredictable randomness additionally increases protection against other side-channel ...
11
votes
3
answers
4k
views
How can I manually (on paper) calculate a Bitcoin public key from a private key?
I am interested in generating a Bitcoin address by hand for security's sake. After I choose/generate a private key, how do I generate the public key?
From there, how would I double check my work?
...