From 11f990e8dd192c3e4ede8263bbb300a35ec7e070 Mon Sep 17 00:00:00 2001 From: Max Giraldo Date: Tue, 17 Oct 2017 17:01:52 -0500 Subject: [PATCH] Fix typo in 01_0_Introducing_Bitcoin.md --- 01_0_Introducing_Bitcoin.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/01_0_Introducing_Bitcoin.md b/01_0_Introducing_Bitcoin.md index 6b8fe67..bda330c 100644 --- a/01_0_Introducing_Bitcoin.md +++ b/01_0_Introducing_Bitcoin.md @@ -65,7 +65,7 @@ A message (or more commonly, a hash of a message) can be signed with a private k ### What Is a Hash Function? -A hash function is an algorithm frequently used with cryptograpy. It's a way to map a large, arbitrary amount of data to a small, fixed amount of data. Hash functions used in cryptography are one-way and collision-resistant, meaning that a hash can very reliably be linked to the original data, but the original data can not be regenerated from the hash. Hashes thus allow the transmission of small amounts of data to represent large amounts of data, which can be important for efficiency and storage requirements. +A hash function is an algorithm frequently used with cryptography. It's a way to map a large, arbitrary amount of data to a small, fixed amount of data. Hash functions used in cryptography are one-way and collision-resistant, meaning that a hash can very reliably be linked to the original data, but the original data can not be regenerated from the hash. Hashes thus allow the transmission of small amounts of data to represent large amounts of data, which can be important for efficiency and storage requirements. ### Public-Key Cryptography — In Short