diff --git a/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md b/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md
index f917dc2f7c747841dd0c43a7eb7e6aea2f520d4f..d98560b04d6ea49c578312bde5132ff3a96fb2ad 100644
--- a/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md
+++ b/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md
@@ -45,12 +45,12 @@ This base64 string encodes a sequence of bytes whose structure is defined below.
 
 Symmetric encryption algorithm : aes256
 
-aes256 key : scrypt of user passphrase with the following parameters:
-Seed generated from scrypt with the following parameters:
-password: passphrase
-salt: sha256("dewif" ++ passphrase)
-N : 4096
-r: 16
+aes256 key : scrypt of user passphrase with the following parameters:  
+Seed generated from scrypt with the following parameters:  
+password: passphrase  
+salt: sha256("dewif" ++ passphrase)  
+N : 4096  
+r: 16  
 p: 1
 
 Encrypted datas :
@@ -63,11 +63,11 @@ The public key serves as a checksum. To check that the `.dewif` file is not corr
 
 Example 1:
 
-Seed generated from scrypt with the following parameters:
-password: "password"
-salt: "salt"
-N : 4096
-r: 16
+Seed generated from scrypt with the following parameters:  
+password: "password"  
+salt: "salt"  
+N : 4096  
+r: 16  
 p: 1
 
 ```txt
@@ -84,12 +84,12 @@ DEWIF base 64 string (with zeroing aes key):
 
 Symmetric encryption algorithm : aes256
 
-aes256 key : scrypt of user passphrase with the following parameters:
-Seed generated from scrypt with the following parameters:
-password: passphrase
-salt: sha256("dewif" ++ passphrase)
-N : 4096
-r: 16
+aes256 key : scrypt of user passphrase with the following parameters:  
+Seed generated from scrypt with the following parameters:  
+password: passphrase  
+salt: sha256("dewif" ++ passphrase)  
+N : 4096  
+r: 16  
 p: 1
 
 Encrypted datas :