diff --git a/ch04_keys.adoc b/ch04_keys.adoc index e17ebb76..ba62940f 100644 --- a/ch04_keys.adoc +++ b/ch04_keys.adoc @@ -117,7 +117,7 @@ use to pick that number does not matter as long as it is not predictable or repeatable. Bitcoin software uses cryptographically secure random number generators to produce 256 bits of entropy. -More precisely, the private key can be any number between 0 and n - +More precisely, the private key can be any number between 0 and _n_ - 1 inclusive, where _n_ is a constant (_n_ = 1.1578 × 10^77^, slightly less than 2^256^) defined as the order of the elliptic curve used in Bitcoin (see <>). To create such a key, we randomly pick a @@ -343,10 +343,10 @@ find the public key _K_: [source, python] ---- -K = 1E99423A4ED27608A15A2616A2B0E9E52CED330AC530EDCC32C8FFC6A526AEDD * G +K = 1E99423A4ED27608A15A2616A2B0E9E52CED330AC530EDCC32C8FFC6A526AEDD × G ---- -Public key _K_ is defined as a point K = (x, y): +Public key _K_ is defined as a point _K_ = (_x_, _y_): [latexmath] ++++ @@ -1085,9 +1085,9 @@ The "32" stands for the number of characters in the bech32 alphabet .Bech32 typo detection ==== Address: - bc1p9nh05ha8wrljf7ru236awpass:[n]4t2x0d5ctkkywm**v**9sclnm4t0av2vgs4k3au7 + bc1p9nh05ha8wrljf7ru236awpass:[n]4t2x0d5ctkkywmpass:[v]9sclnm4t0av2vgs4k3au7 -Detected errors shown in bold. Generated using the +Detected errors shown in bold and underlined. Generated using the https://oreil.ly/paWIx[bech32 address decoder demo]. ==== diff --git a/ch05_wallets.adoc b/ch05_wallets.adoc index 687e13b7..9f8c7318 100644 --- a/ch05_wallets.adoc +++ b/ch05_wallets.adoc @@ -141,7 +141,7 @@ simply adding the same value to both sides of the equation: [latexmath] ++++ \begin{equation} -K + (123 \times G) =\!= (k + 123) \times G +K + (123 \times G) =\!\!\!= (k + 123) \times G \end{equation} ++++ diff --git a/ch08_signatures.adoc b/ch08_signatures.adoc index 90638695..d2ec2c49 100644 --- a/ch08_signatures.adoc +++ b/ch08_signatures.adoc @@ -845,8 +845,10 @@ Nonlinear:: significantly slows down operations and which, in some cases, has resulted in software accidentally leaking private keys. -Looking at the math of ECDSA, -signatures are created by a mathematical function _F_~_sig_~ +==== ECDSA Algorithm + +Let's look at the math of ECDSA. +Signatures are created by a mathematical function _F_~_sig_~ that produces a signature composed of two values. In ECDSA, those two values are _R_ and _s_. diff --git a/ch12_mining.adoc b/ch12_mining.adoc index a4ab7b5f..f107b2e8 100644 --- a/ch12_mining.adoc +++ b/ch12_mining.adoc @@ -858,7 +858,7 @@ is: ++++ ++++ @@ -870,7 +870,7 @@ Using that formula, and the difficulty bits value 0x1903a30c, we get: ++++ -which in decimal is: +which is: ++++