A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves
Bitcoin uses elliptic curve cryptography for its keys and signatures, but the specific secp256k1 curve used is rather unusual. The ECDSA keys used to generate Bitcoin addresses and sign transactions are derived from some specific parameters. Due to this characteristic, several questions come up conc...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2019-03-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02582 am a22003133u 4500 | ||
---|---|---|---|
001 | ijeecs15610_10734 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Houria, Azine |e author |
100 | 1 | 0 | |a Bencherif Mohamed Abdelkader ,College of Computer and Information Sciences « Center of Smart Robotics ResearchKing » Saud University,Guessoum Abderezzak,Department of Electronics «LATSI Signal Processing and Imaging Laboratory» Blida1 University Algeria |e contributor |
700 | 1 | 0 | |a Mohamed Abdelkader, Bencherif |e author |
700 | 1 | 0 | |a Abderezzak, Guessoum |e author |
245 | 0 | 0 | |a A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves |
260 | |b Institute of Advanced Engineering and Science, |c 2019-03-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/15610 | ||
520 | |a Bitcoin uses elliptic curve cryptography for its keys and signatures, but the specific secp256k1 curve used is rather unusual. The ECDSA keys used to generate Bitcoin addresses and sign transactions are derived from some specific parameters. Due to this characteristic, several questions come up concerning Satoshi's choice of this curve rather than that of the NIST standard secp256r1 curve. Former President Dan Brown's address to Bitcoin users on the Bitcoin talk.org online forum concerning the use of secp256k1 in Bitcoin of SECG showed his surprise to see someone uses SECG secp256k1 instead of secp256r1 of NIST.In this article, we will analyze the random secp256r1 curve and the Koblitz Secp256k1 curve (parameters, equation, automorphism...), by giving the strengths and weaknesses of each one of them, in order to justify the choice of Bitcoin's creator, and then we will tackle the mining using the new graphic cards. | ||
540 | |a Copyright (c) 2018 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |a scopus | ||
690 | |a Elliptic curve;Secp256r1; Secp256k1 ; Koblitz curve ; Pollard algorithm ;Random seed ;ANSI ;X9 ; NIST ;SECG ; GLV; Bitcoin ; Mining ; PCU,GPU ; ASIC | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 13, No 3: March 2019; 910-918 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v13.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/15610/10734 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/15610/10734 |z Get fulltext |