Alice and Bob: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(→‎History: Network World link)
imported>Sandy Harris
Line 23: Line 23:


{{quotation| The most familiar names in network security are neither vendors nor geeks: Try Alice and Bob. ...}}
{{quotation| The most familiar names in network security are neither vendors nor geeks: Try Alice and Bob. ...}}
{{quotation|RSA co-founder Rivest, who is a Massachusetts Institute of Technology (MIT) professor, says he came up with Alice and Bob to be able to use "A" and "B" for notation, and that by having one male and one female, the pronouns "he" and "she" could be used in descriptions. Rivest says it is possible that Alice came to mind because he is something of an Alice in Wonderland buff.}}
{{quotation|RSA co-founder Rivest ... says he came up with Alice and Bob to be able to use "A" and "B" for notation, and that by having one male and one female, the pronouns "he" and "she" could be used in descriptions. Rivest says it is possible that Alice came to mind because he is something of an Alice in Wonderland buff.<ref>{{citation
<ref>{{citation
| url = http://www.networkworld.com/news/2005/020705widernetaliceandbob.html
| url = http://www.networkworld.com/news/2005/020705widernetaliceandbob.html
| journal = Network World
| journal = Network World

Revision as of 19:05, 10 August 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Alice and Bob, also just A and B, are the standard example users in writing on cryptography and coding theory. Carol and Dave often join them for protocols that require more than two players.

Bruce Schneier extends these [1] with two kinds of attacker:

and several other types of player required in various protocols:

  • Victor the Verifier
  • Peggy the Prover
  • Trent the Trusted third party
  • Walter the Warden

His extensions seem to be in the process of becoming standard as well.

History

Alice and Bob seem to have been introduced in the original paper on the RSA algorithm for public key cryptography.

The most familiar names in network security are neither vendors nor geeks: Try Alice and Bob. ...

RSA co-founder Rivest ... says he came up with Alice and Bob to be able to use "A" and "B" for notation, and that by having one male and one female, the pronouns "he" and "she" could be used in descriptions. Rivest says it is possible that Alice came to mind because he is something of an Alice in Wonderland buff.[2]

Alice and Bob have an amusing biography on the web.

Now there are hundreds of papers written about Alice and Bob. Over the years Alice and Bob have tried to defraud insurance companies, they've played poker for high stakes by mail, and they've exchanged secret messages over tapped telephones.

If we put together snippets from lots of papers, we get a fascinating picture of their lives. This may be the first time a definitive biography of Alice and Bob has been given. ...

Against all odds, over a noisy telephone line, tapped by the tax authorities and the secret police, Alice will happily attempt, with someone she doesn't trust, whom she cannot hear clearly, and who is probably someone else, to fiddle her tax returns and to organise a coup d'etat, while at the same time minimising the cost of the phone call.

A coding theorist is someone who doesn't think Alice is crazy.[3]

The similar name of the film Bob & Carol & Ted & Alice and subsequent TV show appears to be just a coincidence.

References

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9 page 23
  2. "Security's inseparable couple", Network World, Feb 2005
  3. John Gordon (1984), The Story of Alice and Bob