
A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves
Author(s) -
Azine Houria,
Bencherif Mohamed Abdelkader,
Abderrezak Guessoum
Publication year - 2019
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v13.i3.pp910-918
Subject(s) - nist , elliptic curve digital signature algorithm , surprise , cryptography , span (engineering) , computer science , elliptic curve , elliptic curve cryptography , mathematics , computer security , encryption , public key cryptography , mathematical analysis , engineering , psychology , social psychology , civil engineering , natural language processing
Bitcoin uses elliptic curve cryptography for its keys and signatures, but the specific secp256k1 curve used is rather unusual. The ECDSA keys used to generate Bitcoin addresses and sign transactions are derived from some specific parameters. Due to this characteristic, several questions come up concerning Satoshi’s choice of this curve rather than that of the NIST standard secp256r1 curve. Former President Dan Brown’s address to Bitcoin users on the Bitcoin talk.org online forum concerning the use of secp256k1 in Bitcoin of SECG showed his surprise to see someone uses SECG secp256k1 instead of secp256r1 of NIST. In this article, we will analyze the random secp256r1 curve and the Koblitz Secp256k1 curve (parameters, equation, automorphism…), by giving the strengths and weaknesses of each one of them, in order to justify the choice of Bitcoin’s creator, and then we will tackle the mining using the new graphic cards.