Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 980

secp256k1

What is secp256k1?

secp256k1A Koblitz elliptic curve defined by SEC 2, providing ~128-bit security and used by Bitcoin, Ethereum, and many other blockchains for ECDSA and Schnorr signatures.


secp256k1 is the elliptic curve y^2 = x^3 + 7 over the prime field 2^256 - 2^32 - 977, specified in SEC 2 (Standards for Efficient Cryptography). It is a Koblitz curve with a special j-invariant of 0, which enables endomorphism-based scalar multiplication and very fast software implementations. It offers roughly 128 bits of security with 32-byte keys and 64-byte ECDSA signatures (or 64-byte BIP-340 Schnorr signatures). Although NIST prefers secp256r1 (P-256), secp256k1 became the de facto standard for cryptocurrencies after Bitcoin adopted it in 2009, and is used by Ethereum, Bitcoin Cash, Litecoin, and most EVM chains for transaction signing and address derivation.

Examples

  1. 01

    Bitcoin uses ECDSA over secp256k1 (and Schnorr via BIP-340 since Taproot).

  2. 02

    Ethereum addresses are derived from the Keccak-256 hash of the secp256k1 public key.

Frequently asked questions

What is secp256k1?

A Koblitz elliptic curve defined by SEC 2, providing ~128-bit security and used by Bitcoin, Ethereum, and many other blockchains for ECDSA and Schnorr signatures. It belongs to the Cryptography category of cybersecurity.

What does secp256k1 mean?

A Koblitz elliptic curve defined by SEC 2, providing ~128-bit security and used by Bitcoin, Ethereum, and many other blockchains for ECDSA and Schnorr signatures.

How does secp256k1 work?

secp256k1 is the elliptic curve y^2 = x^3 + 7 over the prime field 2^256 - 2^32 - 977, specified in SEC 2 (Standards for Efficient Cryptography). It is a Koblitz curve with a special j-invariant of 0, which enables endomorphism-based scalar multiplication and very fast software implementations. It offers roughly 128 bits of security with 32-byte keys and 64-byte ECDSA signatures (or 64-byte BIP-340 Schnorr signatures). Although NIST prefers secp256r1 (P-256), secp256k1 became the de facto standard for cryptocurrencies after Bitcoin adopted it in 2009, and is used by Ethereum, Bitcoin Cash, Litecoin, and most EVM chains for transaction signing and address derivation.

How do you defend against secp256k1?

Defences for secp256k1 typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for secp256k1?

Common alternative names include: SEC2 secp256k1, Bitcoin curve.

Related terms