Browse Definitions :
Definition

Bitcoin address

A Bitcoin address is a unique identifier that serves as a virtual location where the cryptocurrency can be sent. People can send the cryptocurrency to Bitcoin addresses similarly to the way fiat currencies can often be sent to email addresses. However, the Bitcoin address is not intended to be permanent, but just a token for use in a single transaction. Unlike a digital wallet, a Bitcoin address cannot hold a balance.

The address itself consists of 26-35 alphanumeric characters. This string is the public half of an asymmetric key pair. The standard format for a Bitcoin address is P2PKH (pay to public key hash). Digital wallets or Bitcoin clients generate addresses through cryptographic operations: The software generates a private key through an asymmetric signature algorithm and then derives the public key from the private one. The user signs with the private key and verifies that signature with the public key.

When Bitcoin first started, people could send the currency to an IP address. That was a convenient method for users but it quickly became apparent that it would also be convenient for people launching man-in-the-middle attacks. That method was discontinued and the Bitcoin address was devised as a more secure alternative.

Most other cryptocurrencies use similar technologies for funds transfer. The Bitcoin address is one type of blockchain address.

This was last updated in July 2018

Continue Reading About Bitcoin address

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • privileged access management (PAM)

    Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close