1
0
mirror of https://github.com/bitcoinbook/bitcoinbook synced 2024-11-22 16:18:11 +00:00

Edited ch04_keys.adoc with Atlas code editor

This commit is contained in:
clenser 2023-10-16 23:35:40 +00:00
parent a477a3f8b4
commit 0bdacb416d

View File

@ -42,7 +42,7 @@ Based on these mathematical functions, cryptography enables the creation
of unforgeable digital signatures. Bitcoin uses of unforgeable digital signatures. Bitcoin uses
elliptic curve addition and multiplication as the basis for its cryptography. elliptic curve addition and multiplication as the basis for its cryptography.
In Bitcoin, we can use public key cryptography to create a key pair that In Bitcoin, we can use public key cryptography to create a ((("key pairs", id="key-pair")))((("public keys", "purpose of")))((("private keys", "purpose of")))key pair that
controls access to bitcoins. The key pair consists of a private key controls access to bitcoins. The key pair consists of a private key
and a public key derived from the private key. The public key is used to and a public key derived from the private key. The public key is used to
receive funds, and the private key is used to sign transactions to spend receive funds, and the private key is used to sign transactions to spend
@ -66,7 +66,7 @@ pairs, each consisting of a private key and a public key. The private
key (k) is a number, usually derived from a number picked at random. key (k) is a number, usually derived from a number picked at random.
From the private key, we From the private key, we
use elliptic curve multiplication, a one-way cryptographic function, to use elliptic curve multiplication, a one-way cryptographic function, to
generate a public((("public key cryptography", startref="pub-key"))) key (K). generate a public((("public key cryptography", startref="pub-key")))((("key pairs", startref="key-pair"))) key (K).
.Why Use Asymmetric Cryptography (Public/Private Keys)? .Why Use Asymmetric Cryptography (Public/Private Keys)?
**** ****