#schnorr-signature #signature-verification #bitcoin #ethereum

no-std k256

secp256k1 elliptic curve library written in pure Rust with support for ECDSA signing/verification/public-key recovery, Taproot Schnorr signatures (BIP340), Elliptic Curve Diffie-Hellman (ECDH), and general-purpose secp256k1 elliptic curve group operations which can be used to implement arbitrary protocols

55 releases

0.14.0-pre.2 Sep 22, 2024
0.14.0-pre.0 Jun 5, 2024
0.13.4 Sep 20, 2024
0.13.3 Jan 8, 2024
0.0.0 Dec 5, 2019

#38 in Cryptography

Download history 223555/week @ 2024-08-22 221075/week @ 2024-08-29 245431/week @ 2024-09-05 250252/week @ 2024-09-12 253674/week @ 2024-09-19 261585/week @ 2024-09-26 285517/week @ 2024-10-03 271201/week @ 2024-10-10 290053/week @ 2024-10-17 275808/week @ 2024-10-24 252825/week @ 2024-10-31 236754/week @ 2024-11-07 241338/week @ 2024-11-14 247763/week @ 2024-11-21 248211/week @ 2024-11-28 221921/week @ 2024-12-05

1,002,912 downloads per month
Used in 2,674 crates (246 directly)

Apache-2.0 OR MIT

325KB
6.5K SLoC

RustCrypto: secp256k1 (K-256) elliptic curve

crate Docs Build Status Apache2/MIT licensed Rust Version Project Chat

secp256k1 (a.k.a. K-256) elliptic curve library written in pure Rust with support for ECDSA signing/verification/public-key recovery, Taproot Schnorr signatures as defined in BIP340, Elliptic Curve Diffie-Hellman (ECDH), and general-purpose secp256k1 elliptic curve group operations which can be used to implement arbitrary group-based protocols.

Uses traits and base types from the elliptic-curve crate.

Optionally includes a secp256k1 arithmetic feature providing scalar and point types (projective/affine) with support for constant-time scalar multiplication. Additionally, implements traits from the group crate which can be used to generically construct group-based protocols.

Documentation

Security Notes

This crate has been audited by NCC Group, which found a high severity issue in the ECDSA/secp256k1 implementation and another high severity issue in the Schnorr/secp256k1 signature implementation, both of which have since been corrected. We would like to thank Entropy for funding the audit.

This crate has been designed with the goal of ensuring that secret-dependent secp256k1 operations are performed in constant time (using the subtle crate and constant-time formulas). However, it is not suitable for use on processors with a variable-time multiplication operation (e.g. short circuit on multiply-by-zero / multiply-by-one, such as certain 32-bit PowerPC CPUs and some non-ARM microcontrollers).

USE AT YOUR OWN RISK!

Supported Algorithms

About secp256k1 (K-256)

secp256k1 is a Koblitz curve commonly used in cryptocurrency applications. The "K-256" name follows NIST notation where P = prime fields, B = binary fields, and K = Koblitz curves.

The curve is specified as secp256k1 by Certicom's SECG in "SEC 2: Recommended Elliptic Curve Domain Parameters":

https://www.secg.org/sec2-v2.pdf

secp256k1 is primarily notable for usage in Bitcoin and other cryptocurrencies, particularly in conjunction with the Elliptic Curve Digital Signature Algorithm (ECDSA). Owing to its wide deployment in these applications, secp256k1 is one of the most popular and commonly used elliptic curves.

Minimum Supported Rust Version

Rust 1.73 or higher.

Minimum supported Rust version can be changed in the future, but it will be done with a minor version bump.

SemVer Policy

  • All on-by-default features of this library are covered by SemVer
  • MSRV is considered exempt from SemVer as noted above

License

All crates licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~2–3MB
~64K SLoC