traditional names for roles in cryptography
In the field of cryptography, protocols are described and analysed to allow a number of parties to achieve certain goals like communication, authentication, voting etc. Initially these protocol descriptions used single letter variables in the style “Let A and B be parties trying to communicate with the help of a mutually trusted entity C.”. This gave rise to a lot of repetition so a sort of pseudo-standard has arisen that uses first names for some of the standard roles. Common are Alice and Bob as the first two parties in a protocol. If more parties are needed, the following ones are Carol and Dave. Eve is a passive attacker, an eavesdropper. Mallory is an active attacker. Trent is a trusted third party like a mutually known key server. In the field of prove carrying code, there’s Peggy the prover and Victor the verifier. The list at wikipedia (http://en.wikipedia.org/wiki/Characters_in_cryptography) contains even more elements from this bestiary.
|Title||traditional names for roles in cryptography|
|Date of creation||2013-03-22 15:13:41|
|Last modified on||2013-03-22 15:13:41|
|Last modified by||lieven (1075)|