Knowledge

Alice and Bob

Source đź“ť

81: 202: 22: 142:'s 1978 article "A method for obtaining digital signatures and public-key cryptosystems." They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem". Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the 72:. As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer. 171:
together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone." In 1984, John Gordon delivered his famous "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."
170:
Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business
254:
The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use alliterative mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different
174:
In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy
851:
A significant challenge with understanding climate change is the abstract nature of the problem, and the difficulty in relating it to personal actions and consequences. The names Alice and Bob have been used in this context to illustrate emissions and climate consequences on a personal level.
88:
Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?" is believed to be easier to describe and understand than if the hypothetical people were simply named
2141:
Farbod Khoshnoud, Maziar Ghazinejad, Automated quantum entanglement and cryptography for networks of robotic systems, IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA), IDETC-CIE 2021, Virtual Conference: August 17 – 20, DETC2021-71653,
838:
In experiments involving robotic systems, the terms "Alice Robot" and "Bob Robot" refer to mobile platforms responsible for transmitting quantum information and receiving it with quantum detectors, respectively, within the context of the field of
834:
The names Alice and Bob are often used to name the participants in thought experiments in physics. More alphabetical names, usually of alternating gender, are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)".
2235:
Farbod Khoshnoud, Marco B. Quadrelli, Enrique Galvez, Clarence W. de Silva, Shayan Javaherian, B. Bahr, M. Ghazinejad, A. S. Eddin, M. El-Hadedy, Quantum Brain-Computer Interface, ASEE PSW, 2023, in press.
1709:
Mallet represents an active adversary that not only listens to all communications between Alice and Bob but can also modify the contents of any communication he sees while it is in transit.
163:
began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange." Early on, Alice and Bob were starting to appear in other domains, such as in
504:), who can modify messages, substitute messages, or replay old messages. The difficulty of securing a system against a Mallory is much greater than against an Eve. 2152:
Khoshnoud, Farbod; Aiello, Clarice; Quadrelli, Bruno; Ghazinejad, Maziar; De Silva, Clarence; Khoshnoud, Farbod; Bahr, Behnam; Lamata, Lucas (April 23, 2021).
167:'s 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone." 2109:
Lamata, Lucas; Quadrelli, Marco B.; de Silva, Clarence W.; Kumar, Prem; Kanter, Gregory S.; Ghazinejad, Maziar; Khoshnoud, Farbod (October 12, 2021).
1983: 1413:
Cho, Hyunghoon; Ippolito, Daphne; Yun William Yu (2020). "Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs".
1678:
Mallet maintains the illusion that Alice and Bob are talking to each other rather than to him by intercepting the messages and retransmitting them.
2301:
A short history of Bobs (story and slideshow) in the computing industry, from Alice & Bob to Microsoft Bob and Father of Ethernet Bob Metcalfe
2009:
Frazier, Matthew; Taddese, Biniyam; Antonsen, Thomas; Anlage, Steven M. (February 7, 2013). "Nonlinear Time Reversal in a Wave Chaotic System".
1070: 1447:. Lecture Notes in Computer Science. Vol. 10, 210. University of Pennsylvania and INRIA, CNRS, University of Lorraine. pp. 202–231. 823:. Additionally, Arthur, given the same outcome, prefers a game to take the fewest moves, while Bertha prefers a game to take the most moves. 255:
motives. Other names are much less common and more flexible in use. Sometimes the genders are alternated: Alice, Bob, Carol, Dave, Eve, etc.
424:. For example, Grace may try to force Alice or Bob to implement backdoors in their protocols. Grace may also deliberately weaken standards. 1209:
Cattaneoa, Giuseppe; De Santisa, Alfredo; Ferraro Petrillo, Umberto (April 2008). "Visualization of cryptographic protocols with GRACE".
56:
in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Subsequently, they have become common
2300: 2330: 1854: 2290: 2270: 1942: 1928: 1640: 1535: 1470: 1397: 1298: 367:, who is usually a passive attacker. While they can listen in on messages between Alice and Bob, they cannot modify them. In 1085: 2158:. 2021 ASEE Pacific Southwest Conference - "Pushing Past Pandemic Pedagogy: Learning from Disruption". ASEE Conferences. 1647:
Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob.
1764: 148: 2170: 1967: 1733: 1702: 1671: 819:
Arthur is the "left", "black", or "vertical" player, and Bertha is the "right", "white", or "horizontal" player in a
241: 2320: 861: 763:
Merlin provides answers, and Arthur asks questions. Merlin has unbounded computational ability (like the wizard
1251:
Bennett, Charles H.; Brassard, Gilles; Robert, Jean-Marc (1988). "Privacy Amplification by Public Discussion".
223: 219: 2340: 270:
The original, generic characters. Generally, Alice and Bob want to exchange a message or cryptographic key.
115:
Scientific papers about thought experiments with several participants often used letters to identify them:
159:. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance, 146:, there is no mention of Alice and Bob. The choice of the first three names may have come from the film 2325: 876: 820: 802: 155:
Within a few years, however, references to Alice and Bob in cryptological literature became a common
2183: 964: 1817: 1740:
We model key choices of Alice, Bob and adversary Mallet as independent random variables A, B and M
745: 501: 2285: 2335: 1607: 871: 212: 1812: 1555: 959: 37: 2182:
Khoshnoud, Farbod; Esat, Ibrahim I.; de Silva, Clarence W.; Quadrelli, Marco B. (April 2019).
950:(February 1, 1978). "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". 107:
such as "Mallory" for "malicious" to associate the name with the typical role of that person.
1389: 633:, who usually uses a large number of identities. For example, Sybil may attempt to subvert a 40:, and in other science and engineering literature where there are several participants in a 2028: 1327: 912: 595: 368: 61: 767:). In interactive proof systems, Merlin claims the truth of a statement, and Arthur (like 8: 2096: 2092: 663: 2032: 1331: 594:
to show that the intended transaction has actually taken place. Peggy is often found in
2211: 2052: 2018: 1911: 1850:"Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes" 1830: 1659: 1577: 1476: 1448: 1414: 1358: 1315: 1268: 1191: 1147: 1064: 985: 453: 156: 143: 41: 2294: 2215: 2203: 2074: 2044: 1963: 1938: 1868: 1849: 1834: 1760: 1752: 1729: 1698: 1667: 1636: 1531: 1466: 1393: 1363: 1345: 1294: 977: 658: 634: 314: 2056: 1915: 1581: 1480: 1195: 1151: 25:
Example scenario where communication between Alice and Bob is intercepted by Mallory
2195: 2159: 2122: 2040: 2036: 1903: 1863: 1822: 1567: 1458: 1353: 1335: 1272: 1260: 1218: 1181: 1137: 1103: 989: 969: 902: 840: 786: 160: 2267: 1891: 1438:; Thomé, Emmanuel (2017). "A Kilobit Hidden SNFS Discrete Logarithm Computation". 347:
A generic fifth participant, but rarely used, as "E" is usually reserved for Eve.
2274: 2246: 2097:
Journal of Mechatronic Systems and Control, Volume 49, Issue 3, pp. 124-131, 2021
2070: 1690: 1502: 1383: 1052: 1026: 947: 764: 613: 139: 53: 2127: 2110: 1932: 1462: 915: 896: 470:
who may be called upon to resolve a potential dispute between participants. See
1628: 1595: 1523: 1435: 1286: 1222: 866: 546: 534:
Used as an alternative to the eavesdropper Eve in several South Asian nations.
392:, courier or intermediary. Faythe is used infrequently, and is associated with 176: 2199: 1907: 1599: 97:
as in "How can B send a private message M to A in a public-key cryptosystem?"
2314: 2207: 1887: 1349: 981: 733:, who is an insider with privileged access capable of divulging information. 729: 713: 555: 363: 1783: 1142: 1125: 790: 32:
are fictional characters commonly used as placeholders in discussions about
2048: 1883: 1800: 1721: 1367: 638: 550:, who responds to queries from other participants. Olivia often acts as a " 101: 80: 33: 2279: 2091:
Farbod Khoshnoud, Lucas Lamata, Clarence W. De Silva, Marco B. Quadrelli,
1826: 1237: 1186: 1169: 973: 400:. Faythe may be a repository of key service or courier of shared secrets. 1803:; et al. (1992). "Algebraic Methods for Interactive Proof Systems". 1165: 1121: 785:
Paul asks questions, and Carole provides answers. In the solution of the
768: 164: 130:
The first mention of Alice and Bob in the context of cryptography was in
65: 2164: 1771:
Suppose Alice and Bob wish to exchange keys, and Darth is the adversary.
1572: 1316:"Efficient multiuser quantum cryptography network based on entanglement" 1551: 1439: 1372:
An example from quantum cryptography with Alice, Bob, Carol, and David.
1126:"Coin Flipping by Telephone a Protocol for Solving Impossible Problems" 1048: 1044: 1022: 1018: 943: 939: 520: 500:. Unlike the passive Eve, Mallory is an active attacker (often used in 471: 226: in this section. Unsourced material may be challenged and removed. 135: 131: 49: 45: 2268:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
1340: 1784:"A Collaborative Access Control Framework for Online Social Networks" 907: 628: 551: 57: 1264: 1110:. Aiken Computation Lab, Harvard University. Technical Report TR-81. 1007:. Santa Barbara California: Instructional Horizons, Inc. p. 10. 201: 21: 1453: 1419: 1208: 104: 2151: 2023: 2093:
Quantum Teleportation for Control of Dynamic Systems and Autonomy
1633:
Applied Cryptography: Protocols, Algorithms, and Source Code in C
1528:
Applied Cryptography: Protocols, Algorithms, and Source Code in C
794: 388: 69: 1984:"Alice and Bob communicate without transferring a single photon" 1291:
Applied Cryptography: Protocols, Algorithms and Source Code in C
798: 2181: 2153: 2184:"Quantum Network of Cooperative Unmanned Autonomous Systems" 2108: 2008: 2262: 1556:"Formalizing and Securing Relationships on Public Networks" 1757:
Cryptography and Network Security: Principles and Practice
100:
The names are conventional, and where relevant may use an
2282:, given at the Zurich Seminar, April 1984, by John Gordon 1412: 2305: 2155:
Modernizing Mechatronics course with Quantum Engineering
1433: 319:
often encountered in situations with stored passwords.
1033:. Cambridge MA: Massachusetts Institute of Technology. 16:
Characters used in cryptography and science literature
1250: 572:, similar to Mallory, but not necessarily malicious. 518:
Used as an alternative to the eavesdropper Eve, from
84:
An example of an "Alice and Bob" used in cryptography
801:") answered them. Paul and Carole were also used in 554:" with some concealed state or information, or as a 1043: 1017: 938: 60:in many scientific and engineering fields, such as 1031:On Digital Signatures and Public-Key Cryptosystems 302:A third participant, usually of malicious intent. 452:, mentioned first by Ian Grigg in the context of 2312: 1314:Xue, Peng; Wang, Kunkun; Wang, Xiaoping (2017). 1086:"Security's inseparable couple: Alice & Bob" 44:. The Alice and Bob characters were invented by 1726:Algorithmic Aspects of Wireless Sensor Networks 1518: 1516: 1108:How to exchange secrets with oblivious transfer 1882: 1057:Cryptographic Communications System and Method 438:for cryptographic standards, but rarely used. 1927: 1745: 1683: 1385:Distributed Systems: Principles and Paradigms 2069: 1621: 1513: 739: 1848:Babai, LászlĂł; Moran, Shlomo (April 1988). 1652: 1313: 1211:Journal of Visual Languages & Computing 1847: 1069:: CS1 maint: location missing publisher ( 2244: 2163: 2126: 2022: 1934:Data Streams: Algorithms and Applications 1867: 1816: 1751: 1714: 1689: 1571: 1452: 1418: 1381: 1357: 1339: 1185: 1141: 963: 906: 894: 612:who appears for interactions that desire 242:Learn how and when to remove this message 1896:Combinatorics, Probability and Computing 1627: 1594: 1522: 1285: 191: 175:Amplification by Public Discussion." In 79: 20: 2245:Rasmussen, Carl Edward (July 4, 2024). 1855:Journal of Computer and System Sciences 1658: 1441:Advances in Cryptology – EUROCRYPT 2017 1238:"The Alice and Bob After Dinner Speech" 2313: 1957: 1610:from the original on December 22, 2021 1530:(Second ed.). Wiley. p. 23. 1293:. Hoboken, NJ: John Wiley & Sons. 1235: 1002: 888: 805:, in the roles of pusher and chooser. 771:), questions him to verify the claim. 2280:The Alice and Bob After-Dinner Speech 1720: 1550: 1500: 1102: 1083: 898:Internet Security Glossary, Version 2 186: 149:Bob & Carol & Ted & Alice 1962:. CRC Press. pp. 71, 175, 176. 1799: 1174:ACM Transactions on Computer Systems 1164: 1120: 934: 932: 930: 928: 224:adding citations to reliable sources 195: 13: 2075:"209: Notes on Special Relativity" 14: 2352: 2256: 1434:Fried, Joshua; Gaudry, Pierrick; 925: 846: 793:) asked questions and Carole (an 1501:Grigg, Ian (November 24, 2002). 200: 2238: 2229: 2175: 2145: 2135: 2102: 2085: 2063: 2002: 1976: 1951: 1921: 1876: 1841: 1793: 1776: 1697:. Addison-Wesley. p. 616. 1588: 1544: 1540:. Table 2.1: Dramatis Personae. 1494: 1427: 1406: 1375: 1307: 1279: 1244: 1229: 1202: 1170:"How to exchange (Secret) keys" 1084:Brown, Bob (February 7, 2005). 789:problem, Paul (standing in for 717:, who may guard Alice and Bob. 211:needs additional citations for 183:, other characters are listed. 2331:Thought experiments in physics 2082:An example with several names. 2041:10.1103/physrevlett.110.063902 1666:. Network Press. p. 130. 1158: 1114: 1096: 1077: 1037: 1011: 996: 697:, who requires proof from the 337:A generic fourth participant. 1: 1937:. Now Publishers. p. 3. 1892:"Three Thresholds for a Liar" 1392:. p. 171;399–402. 1382:Tanenbaum, Andrew S. (2007). 882: 410:A generic sixth participant. 371:, Eve may also represent the 288:A generic third participant. 2247:"Alice, Bob and the Climate" 1958:Conway, John Horton (2000). 1869:10.1016/0022-0000(88)90028-1 1005:Encyclopedia of Cryptography 748:there are other characters: 496:. Associated with Trudy, an 7: 2128:10.3390/electronics10202483 1463:10.1007/978-3-319-56620-7_8 1236:Gordon, John (April 1984). 862:Diffie–Hellman key exchange 855: 75: 10: 2357: 2286:Geek Song: "Alice and Bob" 2273:December 17, 2008, at the 1600:"Who are Alice & Bob?" 1223:10.1016/j.jvlc.2007.05.001 877:Security protocol notation 829: 110: 2200:10.1142/S2301385019500055 1908:10.1017/S0963548300000080 1253:SIAM Journal on Computing 1003:Newton, David E. (1997). 952:Communications of the ACM 901:. Network Working Group. 895:R. Shirey (August 2007). 746:interactive proof systems 740:Interactive proof systems 590:, who interacts with the 502:man-in-the-middle attacks 422:government representative 2306:XKCD #177: Alice and Bob 2263:History of Alice and Bob 1759:. Pearson. p. 317. 1728:. Springer. p. 67. 1059:. Cambridge MA. 4405829. 2321:Cryptographic protocols 2011:Physical Review Letters 1695:.NET Framework Security 1143:10.1145/1008908.1008911 1055:(September 20, 1983) . 872:Public-key cryptography 2111:"Quantum Mechatronics" 1662:; et al. (2000). 1598:(September 23, 2010), 85: 26: 1827:10.1145/146585.146605 1635:. Wiley. p. 44. 1503:"Ivan The Honourable" 1390:Pearson Prentice Hall 1187:10.1145/357360.357368 1124:(November 10, 1981). 974:10.1145/359340.359342 596:zero-knowledge proofs 192:Cryptographic systems 83: 24: 2341:History of computing 1960:On Numbers and Games 436:mischievous designer 369:quantum cryptography 220:improve this article 181:Applied Cryptography 62:quantum cryptography 2291:Alice and Bob jokes 2165:10.18260/1-2--38241 2033:2013PhRvL.110f3902F 1660:Perkins, Charles L. 1573:10.5210/fm.v2i9.548 1332:2017NatSR...745928X 803:combinatorial games 664:neutral third party 482:or (less commonly) 454:Ricardian contracts 1805:Journal of the ACM 1753:Stallings, William 1664:Firewalls: 24seven 1554:(September 1997). 1320:Scientific Reports 821:combinatorial game 494:malicious attacker 187:Cast of characters 86: 42:thought experiment 27: 2326:Placeholder names 2295:Quantum Computing 2073:(March 5, 2000). 1944:978-1-933019-14-7 1929:Muthukrishnan, S. 1642:978-0-471-59756-8 1537:978-0-471-11709-4 1472:978-3-319-56619-1 1399:978-0-13-239227-3 1341:10.1038/srep45928 1300:978-0-471-59756-8 1104:Rabin, Michael O. 827: 826: 737: 736: 635:reputation system 252: 251: 244: 2348: 2251: 2250: 2242: 2236: 2233: 2227: 2226: 2224: 2222: 2188:Unmanned Systems 2179: 2173: 2169: 2167: 2149: 2143: 2139: 2133: 2132: 2130: 2106: 2100: 2089: 2083: 2081: 2079: 2071:David Mermin, N. 2067: 2061: 2060: 2026: 2006: 2000: 1999: 1997: 1995: 1990:. April 16, 2013 1988:physicsworld.com 1980: 1974: 1973: 1955: 1949: 1948: 1925: 1919: 1918: 1880: 1874: 1873: 1871: 1845: 1839: 1838: 1820: 1797: 1791: 1790: 1788: 1780: 1774: 1773: 1749: 1743: 1742: 1718: 1712: 1711: 1691:LaMacchia, Brian 1687: 1681: 1680: 1656: 1650: 1649: 1625: 1619: 1618: 1617: 1615: 1592: 1586: 1585: 1575: 1548: 1542: 1541: 1520: 1511: 1510: 1498: 1492: 1491: 1489: 1487: 1456: 1446: 1431: 1425: 1424: 1422: 1410: 1404: 1403: 1379: 1373: 1371: 1361: 1343: 1311: 1305: 1304: 1283: 1277: 1276: 1248: 1242: 1241: 1233: 1227: 1226: 1206: 1200: 1199: 1189: 1162: 1156: 1155: 1145: 1118: 1112: 1111: 1100: 1094: 1093: 1081: 1075: 1074: 1068: 1060: 1041: 1035: 1034: 1015: 1009: 1008: 1000: 994: 993: 967: 936: 923: 919: 910: 908:10.17487/RFC4949 892: 841:quantum robotics 787:Twenty Questions 751: 750: 662:, who acts as a 315:password cracker 258: 257: 247: 240: 236: 233: 227: 204: 196: 144:RSA cryptosystem 2356: 2355: 2351: 2350: 2349: 2347: 2346: 2345: 2311: 2310: 2275:Wayback Machine 2259: 2254: 2243: 2239: 2234: 2230: 2220: 2218: 2180: 2176: 2150: 2146: 2140: 2136: 2107: 2103: 2090: 2086: 2077: 2068: 2064: 2007: 2003: 1993: 1991: 1982: 1981: 1977: 1970: 1956: 1952: 1945: 1926: 1922: 1881: 1877: 1846: 1842: 1798: 1794: 1786: 1782: 1781: 1777: 1767: 1750: 1746: 1736: 1719: 1715: 1705: 1688: 1684: 1674: 1657: 1653: 1643: 1629:Schneier, Bruce 1626: 1622: 1613: 1611: 1596:Schneier, Bruce 1593: 1589: 1549: 1545: 1538: 1524:Schneier, Bruce 1521: 1514: 1499: 1495: 1485: 1483: 1473: 1444: 1436:Heninger, Nadia 1432: 1428: 1411: 1407: 1400: 1380: 1376: 1312: 1308: 1301: 1287:Schneier, Bruce 1284: 1280: 1265:10.1137/0217014 1249: 1245: 1234: 1230: 1207: 1203: 1163: 1159: 1130:ACM SIGACT News 1119: 1115: 1101: 1097: 1082: 1078: 1062: 1061: 1042: 1038: 1016: 1012: 1001: 997: 965:10.1.1.607.2677 937: 926: 893: 889: 885: 858: 849: 832: 742: 614:non-repudiation 248: 237: 231: 228: 217: 205: 194: 189: 113: 78: 54:Leonard Adleman 17: 12: 11: 5: 2354: 2344: 2343: 2338: 2336:Fictional duos 2333: 2328: 2323: 2309: 2308: 2303: 2298: 2288: 2283: 2277: 2265: 2258: 2257:External links 2255: 2253: 2252: 2237: 2228: 2194:(2): 137–145. 2174: 2144: 2134: 2101: 2084: 2062: 2001: 1975: 1968: 1950: 1943: 1920: 1888:Winkler, Peter 1875: 1862:(2): 254–276. 1840: 1818:10.1.1.41.9477 1811:(4): 859–868. 1792: 1775: 1766:978-0133354690 1765: 1744: 1734: 1724:, ed. (2009). 1713: 1703: 1682: 1672: 1651: 1641: 1620: 1587: 1543: 1536: 1512: 1493: 1471: 1426: 1405: 1398: 1374: 1306: 1299: 1278: 1259:(2): 210–229. 1243: 1228: 1217:(2): 258–290. 1201: 1180:(2): 175–193. 1157: 1113: 1095: 1076: 1045:Rivest, Ron L. 1036: 1029:(April 1977). 1019:Rivest, Ron L. 1010: 995: 958:(2): 120–126. 940:Rivest, Ron L. 924: 921:Informational. 886: 884: 881: 880: 879: 874: 869: 867:Martin Gardner 864: 857: 854: 848: 847:Climate Change 845: 831: 828: 825: 824: 817: 807: 806: 783: 773: 772: 761: 741: 738: 735: 734: 725: 719: 718: 709: 703: 702: 692: 682: 681: 674: 668: 667: 653: 643: 642: 624: 618: 617: 606: 600: 599: 584: 574: 573: 566: 560: 559: 542: 536: 535: 532: 526: 525: 516: 506: 505: 490: 476: 475: 464: 458: 457: 446: 440: 439: 432: 426: 425: 418: 412: 411: 408: 402: 401: 383: 377: 376: 359: 349: 348: 345: 339: 338: 335: 321: 320: 310: 304: 303: 300: 290: 289: 286: 272: 271: 268: 250: 249: 208: 206: 199: 193: 190: 188: 185: 177:Bruce Schneier 112: 109: 77: 74: 15: 9: 6: 4: 3: 2: 2353: 2342: 2339: 2337: 2334: 2332: 2329: 2327: 2324: 2322: 2319: 2318: 2316: 2307: 2304: 2302: 2299: 2296: 2292: 2289: 2287: 2284: 2281: 2278: 2276: 2272: 2269: 2266: 2264: 2261: 2260: 2248: 2241: 2232: 2217: 2213: 2209: 2205: 2201: 2197: 2193: 2189: 2185: 2178: 2172: 2166: 2161: 2157: 2156: 2148: 2138: 2129: 2124: 2120: 2116: 2112: 2105: 2098: 2094: 2088: 2076: 2072: 2066: 2058: 2054: 2050: 2046: 2042: 2038: 2034: 2030: 2025: 2020: 2017:(6): 063902. 2016: 2012: 2005: 1989: 1985: 1979: 1971: 1969:9781568811277 1965: 1961: 1954: 1946: 1940: 1936: 1935: 1930: 1924: 1917: 1913: 1909: 1905: 1901: 1897: 1893: 1889: 1885: 1884:Spencer, Joel 1879: 1870: 1865: 1861: 1857: 1856: 1851: 1844: 1836: 1832: 1828: 1824: 1819: 1814: 1810: 1806: 1802: 1801:Lund, Carsten 1796: 1785: 1779: 1772: 1768: 1762: 1758: 1754: 1748: 1741: 1737: 1735:9783642054334 1731: 1727: 1723: 1722:Dolev, Shlomi 1717: 1710: 1706: 1704:9780672321849 1700: 1696: 1692: 1686: 1679: 1675: 1673:9780782125290 1669: 1665: 1661: 1655: 1648: 1644: 1638: 1634: 1630: 1624: 1609: 1605: 1601: 1597: 1591: 1583: 1579: 1574: 1569: 1565: 1561: 1557: 1553: 1547: 1539: 1533: 1529: 1525: 1519: 1517: 1508: 1504: 1497: 1482: 1478: 1474: 1468: 1464: 1460: 1455: 1450: 1443: 1442: 1437: 1430: 1421: 1416: 1409: 1401: 1395: 1391: 1387: 1386: 1378: 1369: 1365: 1360: 1355: 1351: 1347: 1342: 1337: 1333: 1329: 1325: 1321: 1317: 1310: 1302: 1296: 1292: 1288: 1282: 1274: 1270: 1266: 1262: 1258: 1254: 1247: 1239: 1232: 1224: 1220: 1216: 1212: 1205: 1197: 1193: 1188: 1183: 1179: 1175: 1171: 1167: 1161: 1153: 1149: 1144: 1139: 1135: 1131: 1127: 1123: 1117: 1109: 1105: 1099: 1091: 1087: 1080: 1072: 1066: 1058: 1054: 1050: 1046: 1040: 1032: 1028: 1024: 1020: 1014: 1006: 999: 991: 987: 983: 979: 975: 971: 966: 961: 957: 953: 949: 945: 941: 935: 933: 931: 929: 922: 917: 914: 909: 904: 900: 899: 891: 887: 878: 875: 873: 870: 868: 865: 863: 860: 859: 853: 844: 842: 836: 822: 818: 816: 812: 809: 808: 804: 800: 796: 792: 788: 784: 782: 778: 775: 774: 770: 766: 762: 760: 756: 753: 752: 749: 747: 732: 731: 730:whistleblower 726: 724: 721: 720: 716: 715: 710: 708: 705: 704: 700: 696: 693: 691: 687: 684: 683: 679: 675: 673: 670: 669: 665: 661: 660: 654: 652: 648: 645: 644: 640: 636: 632: 630: 625: 623: 620: 619: 615: 611: 607: 605: 602: 601: 597: 593: 589: 585: 583: 579: 576: 575: 571: 567: 565: 562: 561: 557: 556:random oracle 553: 549: 548: 543: 541: 538: 537: 533: 531: 528: 527: 523: 522: 517: 515: 511: 508: 507: 503: 499: 495: 491: 489: 485: 481: 478: 477: 473: 469: 465: 463: 460: 459: 455: 451: 447: 445: 442: 441: 437: 433: 431: 428: 427: 423: 419: 417: 414: 413: 409: 407: 404: 403: 399: 395: 391: 390: 384: 382: 379: 378: 374: 370: 366: 365: 360: 358: 354: 351: 350: 346: 344: 341: 340: 336: 334: 330: 326: 323: 322: 318: 316: 311: 309: 306: 305: 301: 299: 295: 292: 291: 287: 285: 281: 277: 274: 273: 269: 267: 263: 260: 259: 256: 246: 243: 235: 225: 221: 215: 214: 209:This section 207: 203: 198: 197: 184: 182: 178: 172: 168: 166: 162: 161:Michael Rabin 158: 153: 151: 150: 145: 141: 137: 133: 128: 126: 122: 118: 108: 106: 103: 98: 96: 92: 82: 73: 71: 67: 63: 59: 55: 51: 47: 43: 39: 35: 34:cryptographic 31: 30:Alice and Bob 23: 19: 2240: 2231: 2221:September 7, 2219:. Retrieved 2191: 2187: 2177: 2154: 2147: 2137: 2121:(20): 2483. 2118: 2114: 2104: 2087: 2065: 2014: 2010: 2004: 1992:. Retrieved 1987: 1978: 1959: 1953: 1933: 1923: 1902:(1): 81–93, 1899: 1895: 1878: 1859: 1853: 1843: 1808: 1804: 1795: 1778: 1770: 1756: 1747: 1739: 1725: 1716: 1708: 1694: 1685: 1677: 1663: 1654: 1646: 1632: 1623: 1612:, retrieved 1603: 1590: 1563: 1560:First Monday 1559: 1546: 1527: 1506: 1496: 1484:. Retrieved 1440: 1429: 1408: 1384: 1377: 1326:(1): 45928. 1323: 1319: 1309: 1290: 1281: 1256: 1252: 1246: 1231: 1214: 1210: 1204: 1177: 1173: 1166:Blum, Manuel 1160: 1136:(1): 23–27. 1133: 1129: 1122:Blum, Manuel 1116: 1107: 1098: 1090:NetworkWorld 1089: 1079: 1056: 1053:Adleman, Len 1039: 1030: 1027:Adleman, Len 1013: 1004: 998: 955: 951: 948:Adleman, Len 920: 897: 890: 850: 837: 833: 814: 810: 780: 776: 758: 754: 743: 728: 722: 712: 706: 698: 694: 689: 685: 677: 671: 656: 650: 646: 639:Sybil attack 629:pseudonymous 627: 621: 609: 603: 591: 587: 581: 577: 569: 563: 545: 539: 529: 519: 513: 509: 497: 493: 487: 483: 479: 467: 461: 449: 443: 435: 429: 421: 415: 405: 398:faithfulness 397: 393: 386: 380: 372: 364:eavesdropper 362: 356: 352: 342: 332: 328: 324: 313: 307: 297: 293: 283: 279: 275: 265: 261: 253: 238: 229: 218:Please help 213:verification 210: 180: 173: 169: 154: 147: 129: 124: 120: 116: 114: 102:alliterative 99: 94: 90: 87: 36:systems and 29: 28: 18: 2115:Electronics 1552:Szabo, Nick 1486:October 12, 1049:Shamir, Adi 1023:Shamir, Adi 944:Shamir, Adi 769:King Arthur 373:environment 165:Manuel Blum 66:game theory 2315:Categories 1454:1610.02874 1420:2003.11511 883:References 791:Paul ErdĹ‘s 695:A verifier 659:arbitrator 610:repudiator 521:microphone 472:Judge Judy 58:archetypes 50:Adi Shamir 46:Ron Rivest 2297:-related) 2216:149842737 2208:2301-3850 2024:1207.1667 1835:207170996 1813:CiteSeerX 1350:2045-2322 1240:. Zurich. 1065:cite book 982:0001-0782 960:CiteSeerX 552:black box 38:protocols 2293:(mainly 2271:Archived 2057:35907279 2049:23432243 1994:June 19, 1931:(2005). 1916:45707043 1890:(1992), 1755:(1998). 1693:(2002). 1631:(1994). 1608:archived 1582:33773111 1526:(1996). 1507:iang.org 1481:12341745 1368:28374854 1289:(2015). 1196:16304470 1168:(1983). 1152:19928725 1106:(1981). 856:See also 678:intruder 657:trusted 631:attacker 592:verifier 570:opponent 498:intruder 387:trusted 232:May 2023 179:'s book 105:mnemonic 76:Overview 2029:Bibcode 1604:YouTube 1359:5379677 1328:Bibcode 1273:5956782 990:2873616 830:Physics 795:anagram 510:Michael 480:Mallory 389:advisor 284:Charlie 140:Adleman 127:, etc. 111:History 70:physics 2214:  2206:  2055:  2047:  1966:  1941:  1914:  1833:  1815:  1763:  1732:  1701:  1670:  1639:  1614:May 2, 1580:  1534:  1479:  1469:  1396:  1366:  1356:  1348:  1297:  1271:  1194:  1150:  988:  980:  962:  815:Bertha 811:Arthur 799:oracle 781:Carole 765:Merlin 759:Merlin 755:Arthur 714:warden 707:Walter 699:prover 686:Victor 637:. See 604:Rupert 588:prover 547:oracle 540:Olivia 484:Mallet 450:issuer 381:Faythe 280:Carlos 138:, and 136:Shamir 132:Rivest 52:, and 2212:S2CID 2142:2021. 2078:(PDF) 2053:S2CID 2019:arXiv 1912:S2CID 1831:S2CID 1787:(PDF) 1578:S2CID 1566:(9). 1477:S2CID 1449:arXiv 1445:(PDF) 1415:arXiv 1269:S2CID 1192:S2CID 1148:S2CID 986:S2CID 723:Wendy 690:Vanna 672:Trudy 647:Trent 622:Sybil 578:Peggy 564:Oscar 488:Darth 468:judge 430:Heidi 416:Grace 406:Frank 394:faith 333:David 308:Craig 294:Chuck 276:Carol 262:Alice 157:trope 2223:2023 2204:ISSN 2045:PMID 1996:2017 1964:ISBN 1939:ISBN 1761:ISBN 1730:ISBN 1699:ISBN 1668:ISBN 1637:ISBN 1616:2017 1532:ISBN 1488:2016 1467:ISBN 1394:ISBN 1364:PMID 1346:ISSN 1295:ISBN 1071:link 978:ISSN 916:4949 813:and 797:of " 779:and 777:Paul 757:and 744:For 530:Niaj 514:Mike 462:Judy 444:Ivan 396:and 357:Yves 343:Erin 329:Dave 298:Chad 264:and 93:and 68:and 2196:doi 2171:PDF 2160:doi 2123:doi 2037:doi 2015:110 1904:doi 1864:doi 1823:doi 1568:doi 1459:doi 1354:PMC 1336:doi 1261:doi 1219:doi 1182:doi 1138:doi 970:doi 913:RFC 903:doi 688:or 676:An 651:Ted 649:or 582:Pat 580:or 568:An 544:An 512:or 486:or 448:An 361:An 355:or 353:Eve 331:or 325:Dan 296:or 282:or 266:Bob 222:by 2317:: 2210:. 2202:. 2192:07 2190:. 2186:. 2119:10 2117:. 2113:. 2095:, 2051:. 2043:. 2035:. 2027:. 2013:. 1986:. 1910:, 1898:, 1894:, 1886:; 1860:36 1858:. 1852:. 1829:. 1821:. 1809:39 1807:. 1769:. 1738:. 1707:. 1676:. 1645:. 1606:, 1602:, 1576:. 1562:. 1558:. 1515:^ 1505:. 1475:. 1465:. 1457:. 1388:. 1362:. 1352:. 1344:. 1334:. 1322:. 1318:. 1267:. 1257:17 1255:. 1215:19 1213:. 1190:. 1176:. 1172:. 1146:. 1134:15 1132:. 1128:. 1088:. 1067:}} 1063:{{ 1051:; 1047:; 1025:; 1021:; 984:. 976:. 968:. 956:21 954:. 946:; 942:; 927:^ 911:. 843:. 727:A 711:A 701:. 680:. 666:. 655:A 641:. 626:A 616:. 608:A 598:. 586:A 558:. 524:. 492:A 474:. 466:A 456:. 434:A 420:A 385:A 375:. 327:, 312:A 278:, 152:. 134:, 123:, 119:, 64:, 48:, 2249:. 2225:. 2198:: 2168:. 2162:: 2131:. 2125:: 2099:. 2080:. 2059:. 2039:: 2031:: 2021:: 1998:. 1972:. 1947:. 1906:: 1900:1 1872:. 1866:: 1837:. 1825:: 1789:. 1584:. 1570:: 1564:2 1509:. 1490:. 1461:: 1451:: 1423:. 1417:: 1402:. 1370:. 1338:: 1330:: 1324:7 1303:. 1275:. 1263:: 1225:. 1221:: 1198:. 1184:: 1178:1 1154:. 1140:: 1092:. 1073:) 992:. 972:: 918:. 905:: 317:, 245:) 239:( 234:) 230:( 216:. 125:C 121:B 117:A 95:B 91:A

Index


cryptographic
protocols
thought experiment
Ron Rivest
Adi Shamir
Leonard Adleman
archetypes
quantum cryptography
game theory
physics

alliterative
mnemonic
Rivest
Shamir
Adleman
RSA cryptosystem
Bob & Carol & Ted & Alice
trope
Michael Rabin
Manuel Blum
Bruce Schneier

verification
improve this article
adding citations to reliable sources
Learn how and when to remove this message
password cracker
eavesdropper

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑