Alice and Bob

Alice and Bob

The names Alice and Bob are commonly used placeholder names for archetypal characters in fields such as cryptography and physics. The names are used for convenience; for example, "Alice sends a message to Bob encrypted with his public key" is easier to follow than "Party A sends a message to Party B encrypted by Party B's public key." Following the alphabet, the specific names have evolved into common parlance within these fields—helping technical topics to be explained in a more understandable fashion.

In cryptography and computer security, there are a number of widely used names for the participants in discussions and presentations about various protocols. The names are conventional, somewhat self-suggestive, sometimes humorous, and effectively act as metasyntactic variables.

In typical implementations of these protocols, it is understood that the actions attributed to characters such as Alice or Bob need not always be carried out by human parties directly, but also by a trusted automated agent (such as a computer program) on their behalf. Despite the advantage of Alice and Bob's distinct genders in reducing ambiguity, there has been little tendency to introduce inanimate parties so they could be referred by neuter pronouns.

Contents

List of characters

An example of an "Alice and Bob" analogy used in cryptography.
Alice and Bob diagram used to explain public-key cryptography.

This list is drawn mostly from the book Applied Cryptography by Bruce Schneier. Alice and Bob are archetypes in cryptography; Eve is also common. Names further down the alphabet are less common.

  • Alice and Bob. Generally, Alice wants to send a message to Bob. These names were used by Ron Rivest in the 1978 Communications of the ACM article presenting the RSA cryptosystem, and in A Method for Obtaining Digital Signatures and Public-Key Cryptosystems published April 4, 1977, revised September 1, 1977 as technical Memo LCS/TM82. Rivest denies that these names have any relation to the 1969 movie Bob & Carol & Ted & Alice as occasionally suggested by others.[citation needed]
  • Carol, Carlos or Charlie, as a third participant in communications.
  • Chuck, as a third participant usually of malicious intent.[1]
  • Dave, a fourth participant, and so on alphabetically.
  • Eve, an eavesdropper, is usually a passive attacker. While she can listen in on messages between Alice and Bob, she cannot modify them. In quantum cryptography, Eve may also represent the environment.
  • Mallory, a malicious attacker (less commonly called Trudy, an intruder.); unlike Eve, Mallory can modify messages, substitute her own messages, replay old messages, and so on. The difficulty of securing a system against Mallory is much greater than against Eve.
  • Peggy, a prover, and Victor, a verifier, often must interact in some way to show that the intended transaction has actually taken place. They are often found in zero-knowledge proofs.
  • Trent, a trusted arbitrator, is some kind of neutral third party, whose exact role varies with the protocol under discussion.
  • Walter, a warden, may be needed to guard Alice and Bob in some respect, depending on the protocol being discussed.

Although an interactive proof system is not quite a cryptographic protocol, it is sufficiently related to mention the cast of characters its literature features:

  • Arthur and Merlin: In interactive proof systems, the prover has unbounded computational ability and is hence associated with Merlin, the powerful wizard. He claims the truth of a statement, and Arthur, the wise king, questions him to verify the claim. These two characters also give the name for two complexity classes, namely MA and AM.

A similar pair of characters is Paul and Carole. The characters were introduced in the solution of the Twenty Questions problem,[2] where "Paul", who asked questions, stood for Paul Erdős and "Carole", who answered them, was an anagram of "oracle". They were further used in certain combinatorial games in the roles of Pusher and Chooser respectively, and have since been used in various roles.[3]

See also

Notes

  1. ^ Tanenbaum, Andrew S. (2007), Distributed Systems: Principles and Paradigms, Pearson Prentice Hall, p. 171;399–402, ISBN 978-0-13-239227-3, http://books.google.com/?id=DL8ZAQAAIAAJ 
  2. ^ Spencer, Joel; Winkler, Peter (1992), "Three Thresholds for a Liar", Combinatorics, Probability and Computing 1 (01): 81–93, doi:10.1017/S0963548300000080, http://math.dartmouth.edu/~pw/papers/3thresh.ps 
  3. ^ Muthukrishnan, S. (2005), Data Streams: Algorithms and Applications, Now Publishers, p. 3, ISBN 978-1-933019-14-7, http://algo.research.googlepages.com/eight.ps 

References

  • C.H. Lindsey, Regulation of Investigatory Powers Bill: Some Scenarios, 2000, [1].

External links


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Alice and Bob — Эту страницу предлагается объединить с Алиса, Боб и Ева. Пояснение причин и обсуждение на странице Википедия:К объединению/15 июля 2012. Обсуждение длит …   Википедия

  • Alice and Bob — noun Two people wishing to communicate securely with each other, Alice sending Bob information …   Wiktionary

  • Alice und Bob — sind Synonyme für Sender und Empfänger einer Nachricht. Sie werden verwendet, um Erklärungen auf den Gebieten der Kryptographie, der Netzwerkprotokolle und der Physik zu vereinfachen. Sie stellen also metasyntaktische Variablen dar und werden… …   Deutsch Wikipedia

  • Princess Alice and the Broken Arrow — Infobox Album Name = Princess Alice And The Broken Arrow Type = Studio album Artist = Magnum Released = 26 March 2007 Recorded = Mad Hat Studios, Wolverhampton United Kingdom 2005 2006 Genre = Rock Melodic Rock Progressive rock Length = 62:47… …   Wikipedia

  • Alice Cooper — Cooper at the Scream Awards, 2007 Background information Birth name Vincent Damon Furnier Born …   Wikipedia

  • Bob und Alice — Alice und Bob sind Synonyme für Sender und Empfänger einer Nachricht. Sie werden verwendet, um Erklärungen auf den Gebieten der Kryptographie und Physik zu vereinfachen. Sie stellen also metasyntaktische Variablen dar und werden verwendet, da… …   Deutsch Wikipedia

  • Alice — may refer to: * Alice (given name)Royal Princesses* Princess Alice of the United Kingdom (Grand Duchess of Hesse) * Princess Alice, Countess of Athlone * Princess Alice, Duchess of Gloucester * Princess Alice of Battenberg (Princess Andrew of… …   Wikipedia

  • Bob — may refer to:* A diminutive of Robert * Bob (physics), the weight at the end of a pendulum * BOB (band), a UK indie pop band * Bob (song), a song by Weird Al Yankovic from Poodle Hat * Bob , a song by the Red Hot Chili Peppers from the album One… …   Wikipedia

  • Alice Comedies — Julius et Alice (Dawn Evelyn Paris) dans Alice s Egg Plant, 1925 Genre courts métrages animés Noir Blanc Créateur(s) …   Wikipédia en Français

  • Alice Comedy — Alice Comedies Alice Comedies Julius et Alice (Dawn Evelyn Paris) dans Alice s Egg Plant, 1925 Genre courts métrages animés Noir Blanc Créateur(s) …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”