Alice and Bob: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: '''Alice''' and '''Bob''', also just '''A''' and '''B''', are the standard example users in writing on cryptography and coding theory. Carol and Dave join them for protocols which require ...)
 
imported>Sandy Harris
(new page)
Line 4: Line 4:
  | date = 2nd edition, 1996,  
  | date = 2nd edition, 1996,  
  | publisher = John Wiley & Sons
  | publisher = John Wiley & Sons
  |ISBN =0-471-11709-9}}p 23</ref>with many others such as Eve the Eavesdropper and Victor the Verifier. His extensions seem to be in the process of becoming standard as well.
  |ISBN =0-471-11709-9}} page 23</ref> with many others such as Eve the Eavesdropper and Victor the Verifier. His extensions seem to be in the process of becoming standard as well.


Alice and Bob have an amusing [http://www.conceptlabs.co.uk/alicebob.html biography] on the web.
Alice and Bob have an amusing [http://www.conceptlabs.co.uk/alicebob.html biography] on the web.

Revision as of 05:00, 28 November 2008

Alice and Bob, also just A and B, are the standard example users in writing on cryptography and coding theory. Carol and Dave join them for protocols which require more players. Bruce Schneier extends these [1] with many others such as Eve the Eavesdropper and Victor the Verifier. His extensions seem to be in the process of becoming standard as well.

Alice and Bob have an amusing biography on the web.

References

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9 page 23