Questions tagged [math]

31 questions
17
votes
3 answers

How do you derive the private key from two signatures that share the same k value?

I wrote my own ECDSA signature algorithm just for the purpose of creating unit tests. With it I created two signatures which went into transaction 56ec7ca7df..., sending from 1GXFXm3es.... These signatures used the same k values, although k values…
Thorkil Værge
  • 1,047
  • 8
  • 24
9
votes
3 answers

How is Bitcoin governed by mathematics?

I keep hearing talks from Bitcoin evangelists that claim Bitcoin isn't governed by any central authority, rather it's governed by mathematics. What exactly do they mean when they say "governed by mathematics"? That the network is secure by means…
lolololol ol
  • 213
  • 1
  • 4
8
votes
0 answers

How does this field multiplication in libsecp256k1 work?

I'm looking at libsecp256k1's codebase, for learning reasons (doubt I can contribute with anything useful there). While looking at the field implementation, the implementation of secp256k1_fe_mul_inner in both 10x26 and 5x52 is a little strange to…
Davidson Souza
  • 906
  • 3
  • 10
6
votes
1 answer

Mixing Unequal Inputs

Let's say have 3 inputs (alice, bob, satoshi): 0.3, 1.3, 1.6. We can mix these inputs for example like this: 0.3, 0.3, 0.3, 0.3, 0.3, 0.3, 0.3, 0.3, 0.3, 0.3, 0.1, 0.1. Or like this: 1.3, 1.3, 0.3, 0.3. Traditionally it is mixed like this…
nopara73
  • 796
  • 5
  • 21
6
votes
2 answers

How much entropy is lost alphabetising your mnemonics?

Yes I know this is a horrible idea and not BIP39 compliant, but please help satisfy my curiosity with this "thought experiment" and applied maths exercise. Two questions, one for 12 words, the other for 24. Assuming "perfectly random" entropy to…
HansBKK
  • 405
  • 1
  • 10
5
votes
1 answer

Are there risks to using the same private key for both ECDSA and Schnorr signatures?

I think I've seen a comment by Greg Maxwell about this but am having trouble finding it. I think there was some risk when signing the same message with the same key with both algorithms? In this related question, I see that ECDSA signature outputs…
pinhead
  • 4,932
  • 2
  • 23
  • 38
4
votes
1 answer

Low-s value in bitcoin signature

What are the problems related in using the "normal" ( bigger than N/2) value of the s number in transaction signature and why we use the lower one? Is it about the math behind the ecdsa?
dc_Bita98
  • 394
  • 3
  • 14
4
votes
1 answer

Why is the Schnorr verification formula working and actually verifying the validity of a signature?

Reading the bottom of page 2 of the Musig Paper we can find that a Schnorr Signature for a cyclic Group G of prime order p with generator g is a tuple (R,s) where R = gr for a random secret r and s=r+cx where c = H(X,R,m) for a message m, some…
Rene Pickhardt
  • 11,670
  • 8
  • 35
4
votes
1 answer

Is BIP 32 Technology Cryptographic Curve Agnostic?

Does BIP 32 always implicitly assume secp256k1 elliptic curve cryptography (ECC) is to be applied, or can BIP 32 technology also be applied to create extended public or private keys that can readily be converted to say ed25519 private/public…
skaht
  • 3,017
  • 1
  • 12
  • 23
4
votes
1 answer

Jimmy Song 'Programming Bitcoin' book math doubt

I guess this is a math question and not a bitcoin question, but I would have a hard time expressing the doubt in a math forum, whereas here, maybe someone who knows the book and has the right knowledge can answer me easily. In chapter 1, exercise 8,…
rubdottocom
  • 181
  • 4
2
votes
1 answer

Needed maths for full understanding

I often come across papers written in the Bitcoin space involving some math that I am not formally versed in. Could anyone point out general topics in math that I should have a formal grasp on in order to really understand cryptography?
jojeyh
  • 178
  • 4
2
votes
2 answers

bitcoin lock script simple math

I want to create a bitcoin locking script that takes 3 numbers, each of them are less than 8 and if sum of 3 numbers are 15 then script will return true. How can i do that? The one who will redeem the transaction needs to provide only these 3…
2
votes
1 answer

weak transaction in secp256k1

My question is related to weak signature vulnerability testing where a hypothetical attacker does not know the values of the nonce or private key itself, but can determine that the nonce 'k1' is designed by private key 'd' to message hash z , such…
Ironic
  • 23
  • 4
1
vote
2 answers

how to calculate Entropy from series of outcome?

I want to generate my own private key with dice and/or other very entropic phenomenon. But how can I calculate if my data have a good entropy ? I mean if I throw dice in a certain way too much time maybe my outcome will not be trully random, maybe…
1
vote
1 answer

How to calculate coins mined per day?

Sorry for the noob question I'm pretty new to crypto coins and all this stuff. :) I wonder why the formula / gives the mined coins as a result...Formula mentioned on xmg.minerclaim.comQuote: "XMG/Day" is calculated…
Fipsi
  • 113
  • 1
  • 4
1
2 3