Alice and Bob: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(add detail)
imported>Sandy Harris
No edit summary
Line 10: Line 10:
  |ISBN =0-471-11709-9}} page 23</ref> with two kinds of attacker:
  |ISBN =0-471-11709-9}} page 23</ref> with two kinds of attacker:
* Eve the Eavesdropper, using [[passive attack]]s
* Eve the Eavesdropper, using [[passive attack]]s
* Mallory the Malicious [[active attack]]er
* Mallory the Malicious, using [[active attack]]s
and several other types of player required in various protocols:
and several other types of player required in various protocols:
* Victor the Verifier
* Victor the Verifier

Revision as of 06:52, 30 November 2009

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Alice and Bob, also just A and B, are the standard example users in writing on cryptography and coding theory. Carol and Dave often join them for protocols that require more than two players.

Bruce Schneier extends these [1] with two kinds of attacker:

and several other types of player required in various protocols:

  • Victor the Verifier
  • Peggy the Prover
  • Trent the Trusted third party
  • Walter the Warden

His extensions seem to be in the process of becoming standard as well.

Alice and Bob have an amusing biography on the web.

References

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9 page 23