Alice and Bob: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (subpages) |
imported>Sandy Harris (add detail) |
||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
'''Alice''' and '''Bob''', also just '''A''' and '''B''', are the standard example users in writing on [[cryptography]] and [[coding theory]]. Carol and Dave | '''Alice''' and '''Bob''', also just '''A''' and '''B''', are the standard example users in writing on [[cryptography]] and [[coding theory]]. Carol and Dave often join them for protocols that require more than two players. | ||
[[Bruce Schneier]] extends these <ref name="schneier">{{citation | |||
| first = Bruce | last = Schneier | | first = Bruce | last = Schneier | ||
| title = Applied Cryptography | | title = Applied Cryptography | ||
| date = 2nd edition, 1996, | | date = 2nd edition, 1996, | ||
| publisher = John Wiley & Sons | | publisher = John Wiley & Sons | ||
|ISBN =0-471-11709-9}} page 23</ref> with | |ISBN =0-471-11709-9}} page 23</ref> with two kinds of attacker: | ||
* Eve the Eavesdropper, using [[passive attack]]s | |||
* Mallory the Malicious [[active attack]]er | |||
and several other types of player required in various protocols: | |||
* Victor the Verifier | |||
* Peggy the Prover | |||
* Trent the Trusted third party | |||
* Walter the Warden | |||
His extensions seem to be in the process of becoming standard as well. | |||
Alice and Bob have an amusing [http://www.conceptlabs.co.uk/alicebob.html biography] on the web. | Alice and Bob have an amusing [http://www.conceptlabs.co.uk/alicebob.html biography] on the web. |
Revision as of 01:12, 29 December 2008
Alice and Bob, also just A and B, are the standard example users in writing on cryptography and coding theory. Carol and Dave often join them for protocols that require more than two players.
Bruce Schneier extends these [1] with two kinds of attacker:
- Eve the Eavesdropper, using passive attacks
- Mallory the Malicious active attacker
and several other types of player required in various protocols:
- Victor the Verifier
- Peggy the Prover
- Trent the Trusted third party
- Walter the Warden
His extensions seem to be in the process of becoming standard as well.
Alice and Bob have an amusing biography on the web.
References
- ↑ Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9 page 23