<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wjmelements</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wjmelements"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Wjmelements"/>
	<updated>2026-04-19T01:12:57Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Secp256k1&amp;diff=65599</id>
		<title>Secp256k1</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Secp256k1&amp;diff=65599"/>
		<updated>2018-07-19T22:24:43Z</updated>

		<summary type="html">&lt;p&gt;Wjmelements: added list of currencies using secp256k1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Secp256k1.png|thumb |This is a graph of secp256k1&#039;s elliptic curve &#039;&#039;y&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; = x&amp;lt;sup&amp;gt;3&amp;lt;/sup&amp;gt; + 7&#039;&#039; over the real numbers. Note that because secp256k1 is actually defined over the field Z&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;, its graph will in reality look like random scattered points, not anything like this.]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;secp256k1&#039;&#039;&#039; refers to the parameters of the [[ECDSA]] curve used in Bitcoin, and is defined in &#039;&#039;Standards for Efficient Cryptography (SEC)&#039;&#039; (Certicom Research, http://www.secg.org/sec2-v2.pdf).&lt;br /&gt;
&lt;br /&gt;
secp256k1 was almost never used before Bitcoin became popular, but it is now gaining in popularity due to its several nice properties. Most commonly-used curves have a random structure, but secp256k1 was constructed in a special non-random way which allows for especially efficient computation. As a result, it is often more than 30% faster than other curves if the implementation is sufficiently optimized. Also, unlike the popular NIST curves, secp256k1&#039;s constants were selected in a predictable way, which significantly reduces the possibility that the curve&#039;s creator inserted any sort of backdoor into the curve.&lt;br /&gt;
&lt;br /&gt;
=== Technical details ===&lt;br /&gt;
&lt;br /&gt;
As excerpted from &#039;&#039;Standards&#039;&#039;: &lt;br /&gt;
&lt;br /&gt;
The elliptic curve domain parameters over F&#039;&#039;&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;&#039;&#039; associated with a Koblitz curve secp256k1 are specified&lt;br /&gt;
by the sextuple T = (&#039;&#039;p,a,b,G,n,h&#039;&#039;) where the finite field F&#039;&#039;&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;&#039;&#039; is defined by:&lt;br /&gt;
* &#039;&#039;p&#039;&#039; = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFC2F&lt;br /&gt;
* = 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;32&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;9&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;8&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;7&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;6&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;4&amp;lt;/sup&amp;gt; - 1&lt;br /&gt;
&lt;br /&gt;
The curve &#039;&#039;E&#039;&#039;: &#039;&#039;y&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; = x&amp;lt;sup&amp;gt;3&amp;lt;/sup&amp;gt;+ax+b&#039;&#039; over F&#039;&#039;&amp;lt;sub&amp;gt;p&amp;lt;/sub&amp;gt;&#039;&#039; is defined by:&lt;br /&gt;
* &#039;&#039;a&#039;&#039; = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;br /&gt;
* &#039;&#039;b&#039;&#039; = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000007&lt;br /&gt;
&lt;br /&gt;
The base point G in compressed form is:&lt;br /&gt;
* &#039;&#039;G&#039;&#039; = 02 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798&lt;br /&gt;
and in uncompressed form is:&lt;br /&gt;
* &#039;&#039;G&#039;&#039; = 04 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798 483ADA77 26A3C465 5DA4FBFC 0E1108A8 FD17B448 A6855419 9C47D08F FB10D4B8&lt;br /&gt;
Finally the order &#039;&#039;n&#039;&#039; of &#039;&#039;G&#039;&#039; and the cofactor are:&lt;br /&gt;
* &#039;&#039;n&#039;&#039; = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE BAAEDCE6 AF48A03B BFD25E8C D0364141&lt;br /&gt;
* &#039;&#039;h&#039;&#039; = 01&lt;br /&gt;
&lt;br /&gt;
=== Properties ===&lt;br /&gt;
&lt;br /&gt;
* secp256k1 has characteristic &#039;&#039;p&#039;&#039;, it is defined over the prime field ℤ&amp;lt;sub&amp;gt;&#039;&#039;p&#039;&#039;&amp;lt;/sub&amp;gt;. Some other curves in common use have characteristic &#039;&#039;2&#039;&#039;, and are defined over a binary Galois field &#039;&#039;GF(2&amp;lt;sup&amp;gt;n&amp;lt;/sup&amp;gt;)&#039;&#039;, but secp256k1 is not one of them.&lt;br /&gt;
* As the &#039;&#039;a&#039;&#039; constant is zero, the &#039;&#039;ax&#039;&#039; term  in the curve equation is always zero, hence the curve equation becomes &#039;&#039;y&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; = x&amp;lt;sup&amp;gt;3&amp;lt;/sup&amp;gt; + 7&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Cryptocurrencies ===&lt;br /&gt;
This list is incomplete. You can help by expanding it.&lt;br /&gt;
&lt;br /&gt;
* Bitcoin&lt;br /&gt;
* Ethereum&lt;br /&gt;
* EOS&lt;br /&gt;
* Litecoin&lt;br /&gt;
* Dash&lt;br /&gt;
* Dogecoin&lt;br /&gt;
* Zcash&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [https://bitcoin.stackexchange.com/questions/21907/what-does-the-curve-used-in-bitcoin-secp256k1-look-like What does secp256k1 look like] (Bitcoin stack exchange answer by Pieter Wuille)&lt;br /&gt;
&lt;br /&gt;
[[es:Secp256k1]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Technical]]&lt;/div&gt;</summary>
		<author><name>Wjmelements</name></author>
	</entry>
</feed>