Alice and Bob: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 1: | Line 1: | ||
'''Alice''' and '''Bob''', also just '''A''' and '''B''', are the standard example users in writing on cryptography and coding theory. Carol and Dave join them for protocols which require more players. [[Bruce Schneier]] extends these <ref name="schneier">{{citation | '''Alice''' and '''Bob''', also just '''A''' and '''B''', are the standard example users in writing on [[cryptography]] and [[coding theory]]. Carol and Dave sometimes join them for protocols which require more players. [[Bruce Schneier]] extends these <ref name="schneier">{{citation | ||
| first = Bruce | last = Schneier | | first = Bruce | last = Schneier | ||
| title = Applied Cryptography | | title = Applied Cryptography |
Revision as of 04:10, 28 November 2008
Alice and Bob, also just A and B, are the standard example users in writing on cryptography and coding theory. Carol and Dave sometimes join them for protocols which require more players. Bruce Schneier extends these [1] with others such as Eve the Eavesdropper, Victor the Verifier, and Trent the Trusted third party. His extensions seem to be in the process of becoming standard as well.
Alice and Bob have an amusing biography on the web.
References
- ↑ Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9 page 23