only weak private keys,and private key under 2^130 with exposed public key is possible to break using bags and Pollard kangaroo algo