demining / Lattice-Attack

One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
https://cryptodeeptech.ru/lattice-attack
28 stars 7 forks source link

Lattice-Attack file and algorithmLLL.py File #1

Open isaacfth opened 1 year ago

isaacfth commented 1 year ago

Hi, Where is the Lattice-Attack file and algorithmLLL.py File that we use to do the math?

Korzach commented 11 months ago

Hi, Where is the Lattice-Attack file and algorithmLLL.py File that we use to do the math?

https://github.com/demining/Lattice-Attack/issues/1#issue-1746316168

demining commented 11 months ago

@Korzach We did not make this script publicly available. Since this undermines older versions of the ECDSA algorithm, all you need to do is identify weak transactions, my "Lattice Attack" script does this automatically. Weak transactions can be identified by forging the ECDSA signature. In the video review https://youtu.be/YP4Xj6gUcf4 I call this fake signatures. “Lattice Attack” script identifies vulnerable bits and makes fake signatures and sets NONCES properly so that the original bits are the same. Next comes the reduction of all NONCES values from fake signatures and ultimately NONCES equals zero and ultimately the hidden number problem (HNP) is solved, and the hidden number is the private key. Blockchain is huge and the fact that there are vulnerabilities and weaknesses there, I would advise you to check all Bitcoin addresses. If you want to buy the script "Lattice Attack". As a guarantor I will use the autonomous payment system for cryptocurrencies "BTCPay". You can pay using the link: https://btcpays.org/order/33560650