<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Secp256k1</id>
	<title>Secp256k1 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Secp256k1"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Secp256k1&amp;action=history"/>
	<updated>2026-05-15T15:20:02Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Secp256k1&amp;diff=6780&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;&lt;amp/&gt; '''secp256k1''' refers to the parameters of the ECDSA curve used in Bitcoin, and is defined in ''Standards for Efficient Cryptography (SEC)'' (Certicom Research, ht...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Secp256k1&amp;diff=6780&amp;oldid=prev"/>
		<updated>2019-07-10T06:41:38Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;amp/&amp;gt; &amp;#039;&amp;#039;&amp;#039;secp256k1&amp;#039;&amp;#039;&amp;#039; refers to the parameters of the &lt;a href=&quot;/ECDSA&quot; class=&quot;mw-redirect&quot; title=&quot;ECDSA&quot;&gt;ECDSA&lt;/a&gt; curve used in Bitcoin, and is defined in &amp;#039;&amp;#039;Standards for Efficient Cryptography (SEC)&amp;#039;&amp;#039; (Certicom Research, ht...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;amp/&amp;gt;&lt;br /&gt;
'''secp256k1''' refers to the parameters of the [[ECDSA]] curve used in Bitcoin, and is defined in ''Standards for Efficient Cryptography (SEC)'' (Certicom Research, http://www.secg.org/sec2-v2.pdf).&lt;br /&gt;
&lt;br /&gt;
secp256k1 was almost never used before Bitcoin became popular, but it is now gaining in popularity due to its several nice properties. Most commonly-used curves have a random structure, but secp256k1 was constructed in a special non-random way which allows for especially efficient computation. As a result, it is often more than 30% faster than other curves if the implementation is sufficiently optimized. Also, unlike the popular NIST curves, secp256k1's constants were selected in a predictable way, which significantly reduces the possibility that the curve's creator inserted any sort of backdoor into the curve.&lt;br /&gt;
&lt;br /&gt;
=== Technical details ===&lt;br /&gt;
&lt;br /&gt;
As excerpted from ''Standards'': &lt;br /&gt;
&lt;br /&gt;
The elliptic curve domain parameters over F''&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;'' associated with a Koblitz curve secp256k1 are specified&lt;br /&gt;
by the sextuple T = (''p,a,b,G,n,h'') where the finite field F''&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;'' is defined by:&lt;br /&gt;
* ''p'' = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFC2F&lt;br /&gt;
* = 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;32&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;9&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;8&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;7&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;6&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;4&amp;lt;/sup&amp;gt; - 1&lt;br /&gt;
&lt;br /&gt;
The curve ''E'': ''y&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; = x&amp;lt;sup&amp;gt;3&amp;lt;/sup&amp;gt;+ax+b'' over F''&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;'' is defined by:&lt;br /&gt;
* ''a'' = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;br /&gt;
* ''b'' = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000007&lt;br /&gt;
&lt;br /&gt;
The base point G in compressed form is:&lt;br /&gt;
* ''G'' = 02 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798&lt;br /&gt;
and in uncompressed form is:&lt;br /&gt;
* ''G'' = 04 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798 483ADA77 26A3C465 5DA4FBFC 0E1108A8 FD17B448 A6855419 9C47D08F FB10D4B8&lt;br /&gt;
Finally the order ''n'' of ''G'' and the cofactor are:&lt;br /&gt;
* ''n'' = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE BAAEDCE6 AF48A03B BFD25E8C D0364141&lt;br /&gt;
* ''h'' = 01&lt;br /&gt;
&lt;br /&gt;
=== Properties ===&lt;br /&gt;
&lt;br /&gt;
* secp256k1 has characteristic ''p'', it is defined over the prime field ℤ&amp;lt;sub&amp;gt;''p''&amp;lt;/sub&amp;gt;. Some other curves in common use have characteristic ''2'', and are defined over a binary Galois field ''GF(2&amp;lt;sup&amp;gt;n&amp;lt;/sup&amp;gt;)'', but secp256k1 is not one of them.&lt;br /&gt;
* As the ''a'' constant is zero, the ''ax'' term  in the curve equation is always zero, hence the curve equation becomes ''y&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; = x&amp;lt;sup&amp;gt;3&amp;lt;/sup&amp;gt; + 7''.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [https://bitcoin.stackexchange.com/questions/21907/what-does-the-curve-used-in-bitcoin-secp256k1-look-like What does secp256k1 look like] (Bitcoin stack exchange answer by Pieter Wuille)&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://bitcoin.it/ http://bitcoin.it/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Technology]]&lt;br /&gt;
[[Category:Cryptographic algorithms]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>