traditional names for roles in cryptography
In the field of cryptography, protocols are described and analysed to allow a number of parties to achieve certain goals like communication, authentication, voting etc. Initially these protocol descriptions used single letter variables in the style “Let A and B be parties trying to communicate with the help of a mutually trusted entity C.”. This gave rise to a lot of repetition so a sort of pseudo-standard has arisen that uses first names for some of the standard roles. Common are Alice and Bob as the first two parties in a protocol. If more parties are needed, the following ones are Carol and Dave. Eve is a passive attacker, an eavesdropper. Mallory is an active attacker. Trent is a trusted third party like a mutually known key server. In the field of prove carrying code, there’s Peggy the prover and Victor the verifier. The list at wikipedia (http://en.wikipedia.org/wiki/Characters_in_cryptography) contains even more elements from this bestiary.
Title | traditional names for roles in cryptography |
---|---|
Canonical name | TraditionalNamesForRolesInCryptography |
Date of creation | 2013-03-22 15:13:41 |
Last modified on | 2013-03-22 15:13:41 |
Owner | lieven (1075) |
Last modified by | lieven (1075) |
Numerical id | 6 |
Author | lieven (1075) |
Entry type | Definition |
Classification | msc 94A60 |