Edited ch04_keys.adoc with Atlas code editor

develop
clenser 7 months ago
parent a477a3f8b4
commit 0bdacb416d

@ -42,7 +42,7 @@ Based on these mathematical functions, cryptography enables the creation
of unforgeable digital signatures. Bitcoin uses
elliptic curve addition and multiplication as the basis for its cryptography.
In Bitcoin, we can use public key cryptography to create a key pair that
In Bitcoin, we can use public key cryptography to create a ((("key pairs", id="key-pair")))((("public keys", "purpose of")))((("private keys", "purpose of")))key pair that
controls access to bitcoins. The key pair consists of a private key
and a public key derived from the private key. The public key is used to
receive funds, and the private key is used to sign transactions to spend
@ -66,7 +66,7 @@ pairs, each consisting of a private key and a public key. The private
key (k) is a number, usually derived from a number picked at random.
From the private key, we
use elliptic curve multiplication, a one-way cryptographic function, to
generate a public((("public key cryptography", startref="pub-key"))) key (K).
generate a public((("public key cryptography", startref="pub-key")))((("key pairs", startref="key-pair"))) key (K).
.Why Use Asymmetric Cryptography (Public/Private Keys)?
****

Loading…
Cancel
Save