02-10-2018, 02:42 PM

Hello all,

VERY LONG POST ! Sorry :-(

if I had recovered my wallet the whole world would know it :-( but I'm not giving up...damn pre-sale :-)

I'm going crazy in analyze the encseed generation for ETHE Pre-Sale wallet.

I tried Hashcat and JTR on p3 instances with 8 Tesla GPU...but I re-discovered that force is weak than wiliness.

I need, if is it possibile, to some one that understand cryptography better than me, so ANY help is really appreciated...also if someone will be critic, but not offensive, I'll appreciate because probably I have a wrong vision in my strategy. I want to being helped in cracking password but I have the need to divide the KEY from the SEED...I explain here so nobody can access to my wallet; something like public/private key method.

THE GOAL IS understand how many bytes are reserved for the KEY=pbkdf2(PW) and how many are for the SEED in the ENCSEED.

I tried everywhere to find a standard, a description, a blog, a note in the internet for understand how the encseed is produced not in terms of algorithms but, instead, in terms of quantity.

So...until now I have gained this informations

***ONE***

https://blog.ethereum.org/2014/07/09/how...r-presale/ I know that ENCSEED=encrypt(KEY, SEED) so in the encseed and, for what I understand, I can find the encrypted password that is given from the function pbkdf2(the-damn-string-I-wrote) then KEY=pbkdf2(PW).

***TWO***

Now from here https://en.wikipedia.org/wiki/PBKDF2 I know that pbkdf2 is a pseudo random function that generates, through a lot of iterations, a very strong key bytes for the password.

The problem is that I'm not able to understand which is the range of the byte lenght requested by Ethereum pre-sale wallet, because having this information I could be able to split my password [KEY=pbkdf2(MyDamnString)] from my SEED through a decryption function.

Having this results could make me in position to be helped in cracking password without giving the SEED that would complete the informations for access to my wallet.

So supposing that my encseed is the following...not actually my encseed

encseed=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

This encseed is 640 bytes long.

-How many bytes for the KEY ?

-How many bytes for the SEED ?

Is there any one that can help me...I don't want a solution but if someone knows where to study I would appreciate it a lot ?

ITHANK YOU in advance

VERY LONG POST ! Sorry :-(

if I had recovered my wallet the whole world would know it :-( but I'm not giving up...damn pre-sale :-)

I'm going crazy in analyze the encseed generation for ETHE Pre-Sale wallet.

I tried Hashcat and JTR on p3 instances with 8 Tesla GPU...but I re-discovered that force is weak than wiliness.

I need, if is it possibile, to some one that understand cryptography better than me, so ANY help is really appreciated...also if someone will be critic, but not offensive, I'll appreciate because probably I have a wrong vision in my strategy. I want to being helped in cracking password but I have the need to divide the KEY from the SEED...I explain here so nobody can access to my wallet; something like public/private key method.

THE GOAL IS understand how many bytes are reserved for the KEY=pbkdf2(PW) and how many are for the SEED in the ENCSEED.

I tried everywhere to find a standard, a description, a blog, a note in the internet for understand how the encseed is produced not in terms of algorithms but, instead, in terms of quantity.

So...until now I have gained this informations

***ONE***

https://blog.ethereum.org/2014/07/09/how...r-presale/ I know that ENCSEED=encrypt(KEY, SEED) so in the encseed and, for what I understand, I can find the encrypted password that is given from the function pbkdf2(the-damn-string-I-wrote) then KEY=pbkdf2(PW).

***TWO***

Now from here https://en.wikipedia.org/wiki/PBKDF2 I know that pbkdf2 is a pseudo random function that generates, through a lot of iterations, a very strong key bytes for the password.

The problem is that I'm not able to understand which is the range of the byte lenght requested by Ethereum pre-sale wallet, because having this information I could be able to split my password [KEY=pbkdf2(MyDamnString)] from my SEED through a decryption function.

Having this results could make me in position to be helped in cracking password without giving the SEED that would complete the informations for access to my wallet.

So supposing that my encseed is the following...not actually my encseed

encseed=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

This encseed is 640 bytes long.

-How many bytes for the KEY ?

-How many bytes for the SEED ?

Is there any one that can help me...I don't want a solution but if someone knows where to study I would appreciate it a lot ?

ITHANK YOU in advance