BIP-32 link fix

This commit is contained in:
Adam B 2023-04-15 16:52:15 +02:00
parent 83480de077
commit 3a36457c60
No known key found for this signature in database
GPG Key ID: 9ED7B5FB86547DAD

8
41.md
View File

@ -46,14 +46,14 @@ The following abbreviations are used:
- `SK` secret key (32 bytes) - `SK` secret key (32 bytes)
- `PK` public key - `PK` public key
- `ESK` extended secret key, consisting of private key part (32 bytes) and 'chain code' part (32 bytes), as defined in (BIP-32)[https://bips.xyz/32]. - `ESK` extended secret key, consisting of private key part (32 bytes) and 'chain code' part (32 bytes), as defined in [BIP-32](https://bips.xyz/32).
- `EPK` extended public key, consisting of public key part (33 bytes) and 'chain code' part (32 bytes), as defined in (BIP-32)[https://bips.xyz/32]. - `EPK` extended public key, consisting of public key part (33 bytes) and 'chain code' part (32 bytes), as defined in [BIP-32](https://bips.xyz/32).
- `CC` is the chain code (hidden part of the extended key; term from BIP-32) - `CC` is the chain code (hidden part of the extended key; term from BIP-32)
## Implementation ## Implementation
Generation of keys uses key derivation used by Bitcoin (BIP-32 'Hierarchically Deterministic')[https://bips.xyz/32] wallets. Generation of keys uses key derivation used by Bitcoin [BIP-32 'Hierarchically Deterministic'](https://bips.xyz/32) wallets.
Verification operates on public keys only, taking use of the BIP-32 property that a public key derived from the corresponding public key of an extended private key is the same as the one corresponding to the derived private key. Verification operates on public keys only, taking use of the BIP-32 property that a public key derived from the corresponding public key of an extended private key is the same as the one corresponding to the derived private key.
@ -62,7 +62,7 @@ Verification operates on public keys only, taking use of the BIP-32 property tha
This is intended to be run on safe and trusted hardware. This is intended to be run on safe and trusted hardware.
A (BIP-32)[https://bips.xyz/32] seed is generated by any means (probably using BIP-39 words is the best idea). A [BIP-32](https://bips.xyz/32) seed is generated by any means (probably using BIP-39 words is the best idea).
The extended private keys are then derived iteratively: The extended private keys are then derived iteratively:
``` ```