Chapter 4: Keys and addresses

Untitled

A. Public Key Cryptography

Based on these mathematical functions (prime number exponentiation, elliptic curve multiplication), cryptography enables the creation of unforgeable digital signatures. Bitcoin uses elliptic curve addition and multiplication as the basis for its cryptography.

In Bitcoin, we can use public key cryptography to create a key pair that controls access to bitcoins. The key pair consists of a private key and a public key derived from the private key. The public key is used to receive funds, and the private key is used to sign transactions to spend the funds.

B. Private keys

C. Elliptic Curve Cryptography Explained

Elliptic Curve Cryptography (ECC) is a type of asymmetric or public key cryptography based on the discrete logarithm problem as expressed by addition and multiplication on the points of an elliptic curve.

Elliptic Curves are a family of curves which have the formula

$$ y^2 = x^3 + ax + b $$

In Bitcoin, the elliptic curve is used is defined by the following function

$$ y^2 = x^3 + 7 $$

or

$$ y^2 \ mod\ p = (x^3 + 7)\ mod \ p $$