Movatterモバイル変換


[0]ホーム

URL:


  1. Glossary
  2. Placeholder names

Placeholder names

Placeholder names are commonly used in cryptography to indicate the participants in a conversation, without resorting to terminology such as "Party A," "eavesdropper," and "malicious attacker."

The most commonly used names are:

  • Alice andBob, two parties who want to send messages to each other, occasionally joined byCarol, a third participant
  • Eve, a passive attacker who is eavesdropping on Alice and Bob's conversation
  • Mallory, an active attacker ("man-in-the-middle") who is able to modify their conversation and replay old messages

[8]ページ先頭

©2009-2026 Movatter.jp