Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Alice and Bob

From Wikipedia, the free encyclopedia
Characters used in cryptography and science literature

Example scenario where communication between Alice and Bob is intercepted by Mallory

Alice and Bob are fictional characters commonly used as placeholders in discussions aboutcryptographic systems andprotocols,[1] and in other science and engineering literature where there are several participants in athought experiment. The Alice and Bob characters were created byRon Rivest,Adi Shamir, andLeonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems".[2] Subsequently, they have become commonarchetypes in many scientific and engineering fields, such asquantum cryptography,game theory andphysics.[3] As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer.

Overview

[edit]
An example of an "Alice and Bob" used in cryptography

Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?"[2] is believed to be easier to describe and understand than if the hypothetical people were simply namedA andB as in "How can B send a private message M to A in a public-key cryptosystem?"

The names are conventional, and where relevant may use analliterativemnemonic such as "Mallory" for "malicious" to associate the name with the typical role of that person.

History

[edit]

Scientific papers about thought experiments with several participants often used letters to identify them:A,B,C, etc.

The first mention of Alice and Bob in the context of cryptography was inRivest,Shamir, andAdleman's 1978 article "A method for obtaining digital signatures and public-key cryptosystems."[2] They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem".[2]: 121  Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing theRSA cryptosystem, there is no mention of Alice and Bob.[4][5] The choice of the first three names may have come from the filmBob & Carol & Ted & Alice.[6]

Within a few years, however, references to Alice and Bob in cryptological literature became a commontrope. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance,Michael Rabin began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange."[7] Early on, Alice and Bob were starting to appear in other domains, such as inManuel Blum's 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone."[8]

Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone."[9] In 1984, John Gordon delivered his famous[10] "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."[11]

In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy Amplification by Public Discussion."[12] InBruce Schneier's bookApplied Cryptography, other characters are listed.[13]

Cast of characters

[edit]

Cryptographic systems

[edit]
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(May 2023) (Learn how and when to remove this message)

The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use alliterative mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different motives. Other names are much less common and more flexible in use. Sometimes the genders are alternated: Alice, Bob, Carol, Dave, Eve, etc.[14]

Alice andBobThe original, generic characters. Generally, Alice and Bob want to exchange a message or cryptographic key.
Carol,Carlos orCharlieA generic third participant.
Chuck orChadA third participant, usually of malicious intent.[15]
CraigApassword cracker, often encountered in situations with stored passwords.
Dan,Dave orDavidA generic fourth participant.
ErinA generic fifth participant, but rarely used, as "E" is usually reserved for Eve.
Eve orYvesAneavesdropper, who is usually a passive attacker. While they can listen in on messages between Alice and Bob, they cannot modify them. Inquantum cryptography, Eve may also represent theenvironment.[clarification needed]
FaytheAtrustedadvisor, courier or intermediary. Faythe is used infrequently, and is associated withfaith andfaithfulness. Faythe may be a repository of key service or courier of shared secrets.[citation needed]
FrankA generic sixth participant.
GraceAgovernment representative. For example, Grace may try to force Alice or Bob to implement backdoors in their protocols. Grace may also deliberately weaken standards.[16]
HeidiAmischievous designer for cryptographic standards, but rarely used.[17]
IvanAnissuer, mentioned first by Ian Grigg in the context ofRicardian contracts.[18]
JudyAjudge who may be called upon to resolve a potential dispute between participants. SeeJudge Judy.
Mallory[19][20][21] or (less commonly)Mallet[22][23][24][25] orDarth[26]Amalicious attacker. Associated with Trudy, anintruder. Unlike the passive Eve, Mallory is an active attacker (often used inman-in-the-middle attacks), who can modify messages, substitute messages, or replay old messages. The difficulty of securing a system against a Mallory is much greater than against an Eve.
Michael orMikeUsed as an alternative to the eavesdropper Eve, frommicrophone.
NiajUsed as an alternative to the eavesdropper Eve in several South Asian nations.[27]
OliviaAnoracle, who responds to queries from other participants. Olivia often acts as a "black box" with some concealed state or information, or as arandom oracle.
OscarAnopponent, similar to Mallory, but not necessarily malicious.
Peggy orPatAprover, who interacts with theverifier to show that the intended transaction has actually taken place. Peggy is often found inzero-knowledge proofs.
RupertArepudiator who appears for interactions that desirenon-repudiation.
SybilApseudonymous attacker, who usually uses a large number of identities. For example, Sybil may attempt to subvert areputation system. SeeSybil attack.
Trent orTedAtrustedarbitrator, who acts as aneutral third party.
TrudyAnintruder.
Victor[19] orVanna[28]A verifier, who requires proof from theprover.
WalterAwarden, who may guard Alice and Bob.
WendyAwhistleblower, who is an insider with privileged access capable of divulging information.

Interactive proof systems

[edit]

Forinteractive proof systems there are other characters:

Arthur andMerlinMerlin provides answers, and Arthur asks questions.[29] Merlin has unbounded computational ability (like the wizardMerlin). In interactive proof systems, Merlin claims the truth of a statement, and Arthur (likeKing Arthur), questions him to verify the claim.
Paul andCarolePaul asks questions, and Carole provides answers. In the solution of theTwenty Questions problem,[30] Paul (standing in forPaul Erdős) asked questions and Carole (ananagram of "oracle") answered them. Paul and Carole were also used incombinatorial games, in the roles of pusher and chooser.[31]
Arthur andBerthaArthur is the "left", "black", or "vertical" player, and Bertha is the "right", "white", or "horizontal" player in acombinatorial game. Additionally, Arthur, given the same outcome, prefers a game to take the fewest moves, while Bertha prefers a game to take the most moves.[32]

Physics

[edit]

The names Alice and Bob are often used to name the participants in thought experiments in physics.[33][34] More alphabetical names, usually of alternating gender, are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)".[35]

In experiments involving robotic systems, the terms "Alice Robot" and "Bob Robot" refer to mobile platforms responsible for transmitting quantum information and receiving it with quantum detectors, respectively, within the context of the field ofquantum robotics.[36][37][38][39][40][41]

See also

[edit]

References

[edit]
  1. ^R. Shirey (August 2007).Internet Security Glossary, Version 2. Network Working Group.doi:10.17487/RFC4949.RFC4949.Informational.
  2. ^abcdRivest, Ron L.;Shamir, Adi;Adleman, Len (February 1, 1978). "A Method for Obtaining Digital Signatures and Public-key Cryptosystems".Communications of the ACM.21 (2):120–126.CiteSeerX 10.1.1.607.2677.doi:10.1145/359340.359342.ISSN 0001-0782.S2CID 2873616.
  3. ^Newton, David E. (1997).Encyclopedia of Cryptography. Santa Barbara California: Instructional Horizons, Inc. p. 10.
  4. ^Rivest, Ron L.;Shamir, Adi;Adleman, Len (April 1977).On Digital Signatures and Public-Key Cryptosystems. Cambridge MA: Massachusetts Institute of Technology.
  5. ^Rivest, Ron L.;Shamir, Adi;Adleman, Len (September 20, 1983) [1977].Cryptographic Communications System and Method. Cambridge MA. 4405829.{{cite book}}: CS1 maint: location missing publisher (link)
  6. ^Brown, Bob (February 7, 2005)."Security's inseparable couple: Alice & Bob".NetworkWorld.
  7. ^Rabin, Michael O. (1981).How to exchange secrets with oblivious transfer. Aiken Computation Lab, Harvard University. Technical Report TR-81.
  8. ^Blum, Manuel (November 10, 1981)."Coin Flipping by Telephone a Protocol for Solving Impossible Problems".ACM SIGACT News.15 (1):23–27.doi:10.1145/1008908.1008911.S2CID 19928725.
  9. ^Blum, Manuel (1983)."How to exchange (Secret) keys".ACM Transactions on Computer Systems.1 (2):175–193.doi:10.1145/357360.357368.S2CID 16304470.
  10. ^Cattaneoa, Giuseppe; De Santisa, Alfredo; Ferraro Petrillo, Umberto (April 2008). "Visualization of cryptographic protocols with GRACE".Journal of Visual Languages & Computing.19 (2):258–290.doi:10.1016/j.jvlc.2007.05.001.
  11. ^Gordon, John (April 1984)."The Alice and Bob After Dinner Speech". Zurich.
  12. ^Bennett, Charles H.; Brassard, Gilles; Robert, Jean-Marc (1988). "Privacy Amplification by Public Discussion".SIAM Journal on Computing.17 (2):210–229.doi:10.1137/0217014.S2CID 5956782.
  13. ^Schneier, Bruce (2015).Applied Cryptography: Protocols, Algorithms and Source Code in C. Hoboken, NJ: John Wiley & Sons.ISBN 978-0-471-59756-8.
  14. ^Xue, Peng; Wang, Kunkun; Wang, Xiaoping (2017)."Efficient multiuser quantum cryptography network based on entanglement".Scientific Reports.7 (1): 45928.Bibcode:2017NatSR...745928X.doi:10.1038/srep45928.ISSN 2045-2322.PMC 5379677.PMID 28374854. An example from quantum cryptography with Alice, Bob, Carol, and David.
  15. ^Tanenbaum, Andrew S. (2007).Distributed Systems: Principles and Paradigms.Pearson Prentice Hall. p. 171;399–402.ISBN 978-0-13-239227-3.
  16. ^Cho, Hyunghoon; Ippolito, Daphne; Yun William Yu (2020). "Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs".arXiv:2003.11511 [cs.CR].
  17. ^Fried, Joshua; Gaudry, Pierrick;Heninger, Nadia; Thomé, Emmanuel (2017). "A Kilobit Hidden SNFS Discrete Logarithm Computation".Advances in Cryptology – EUROCRYPT 2017(PDF). Lecture Notes in Computer Science. Vol. 10, 210. University of Pennsylvania and INRIA, CNRS, University of Lorraine. pp. 202–231.arXiv:1610.02874.doi:10.1007/978-3-319-56620-7_8.ISBN 978-3-319-56619-1.S2CID 12341745. RetrievedOctober 12, 2016.
  18. ^Grigg, Ian (November 24, 2002)."Ivan The Honourable".iang.org.
  19. ^abSchneier, Bruce (1996).Applied Cryptography: Protocols, Algorithms, and Source Code in C (Second ed.). Wiley. p. 23.ISBN 978-0-471-11709-4. Table 2.1: Dramatis Personae.
  20. ^Szabo, Nick (September 1997)."Formalizing and Securing Relationships on Public Networks".First Monday.2 (9).doi:10.5210/fm.v2i9.548.S2CID 33773111.
  21. ^Schneier, Bruce (September 23, 2010),"Who are Alice & Bob?",YouTube,archived from the original on December 22, 2021, retrievedMay 2, 2017
  22. ^Schneier, Bruce (1994).Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley. p. 44.ISBN 978-0-471-59756-8.Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob.
  23. ^Perkins, Charles L.; et al. (2000).Firewalls: 24seven. Network Press. p. 130.ISBN 9780782125290.Mallet maintains the illusion that Alice and Bob are talking to each other rather than to him by intercepting the messages and retransmitting them.
  24. ^LaMacchia, Brian (2002)..NET Framework Security. Addison-Wesley. p. 616.ISBN 9780672321849.Mallet represents an active adversary that not only listens to all communications between Alice and Bob but can also modify the contents of any communication he sees while it is in transit.
  25. ^Dolev, Shlomi, ed. (2009).Algorithmic Aspects of Wireless Sensor Networks. Springer. p. 67.ISBN 9783642054334.We model key choices of Alice, Bob and adversary Mallet as independent random variables A, B and M [...]
  26. ^Stallings, William (1998).Cryptography and Network Security: Principles and Practice. Pearson. p. 317.ISBN 978-0133354690.Suppose Alice and Bob wish to exchange keys, and Darth is the adversary.
  27. ^"A Collaborative Access Control Framework for Online Social Networks"(PDF).
  28. ^Lund, Carsten; et al. (1992). "Algebraic Methods for Interactive Proof Systems".Journal of the ACM.39 (4):859–868.CiteSeerX 10.1.1.41.9477.doi:10.1145/146585.146605.S2CID 207170996.
  29. ^Babai, László; Moran, Shlomo (April 1988)."Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes".Journal of Computer and System Sciences.36 (2):254–276.doi:10.1016/0022-0000(88)90028-1.
  30. ^Spencer, Joel;Winkler, Peter (1992),"Three Thresholds for a Liar",Combinatorics, Probability and Computing,1 (1):81–93,doi:10.1017/S0963548300000080,S2CID 45707043
  31. ^Muthukrishnan, S. (2005).Data Streams: Algorithms and Applications. Now Publishers. p. 3.ISBN 978-1-933019-14-7.[permanent dead link]
  32. ^Conway, John Horton (2000).On Numbers and Games. CRC Press. pp. 71, 175, 176.ISBN 9781568811277.
  33. ^"Alice and Bob communicate without transferring a single photon".physicsworld.com. April 16, 2013. RetrievedJune 19, 2017.
  34. ^Frazier, Matthew; Taddese, Biniyam; Antonsen, Thomas; Anlage, Steven M. (February 7, 2013). "Nonlinear Time Reversal in a Wave Chaotic System".Physical Review Letters.110 (6): 063902.arXiv:1207.1667.Bibcode:2013PhRvL.110f3902F.doi:10.1103/physrevlett.110.063902.PMID 23432243.S2CID 35907279.
  35. ^David Mermin, N. (March 5, 2000)."209: Notes on Special Relativity"(PDF). An example with several names.
  36. ^Farbod Khoshnoud, Lucas Lamata, Clarence W. De Silva, Marco B. Quadrelli,Quantum Teleportation for Control of Dynamic Systems and Autonomy,Journal of Mechatronic Systems and Control, Volume 49, Issue 3, pp. 124-131, 2021.
  37. ^Lamata, Lucas; Quadrelli, Marco B.; de Silva, Clarence W.; Kumar, Prem; Kanter, Gregory S.; Ghazinejad, Maziar; Khoshnoud, Farbod (October 12, 2021)."Quantum Mechatronics".Electronics.10 (20): 2483.doi:10.3390/electronics10202483.
  38. ^ Farbod Khoshnoud, Maziar Ghazinejad, Automated quantum entanglement and cryptography for networks of robotic systems, IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA), IDETC-CIE 2021, Virtual Conference: August 17 – 20, DETC2021-71653, 2021.
  39. ^Khoshnoud, Farbod; Aiello, Clarice; Quadrelli, Bruno; Ghazinejad, Maziar; De Silva, Clarence; Khoshnoud, Farbod; Bahr, Behnam; Lamata, Lucas (April 23, 2021).Modernizing Mechatronics course with Quantum Engineering. 2021 ASEE Pacific Southwest Conference - "Pushing Past Pandemic Pedagogy: Learning from Disruption". ASEE Conferences.doi:10.18260/1-2--38241.PDF
  40. ^Khoshnoud, Farbod; Esat, Ibrahim I.; de Silva, Clarence W.; Quadrelli, Marco B. (April 2019)."Quantum Network of Cooperative Unmanned Autonomous Systems".Unmanned Systems.07 (2):137–145.doi:10.1142/S2301385019500055.ISSN 2301-3850.S2CID 149842737. RetrievedSeptember 7, 2023.
  41. ^Farbod Khoshnoud, Marco B. Quadrelli, Enrique Galvez, Clarence W. de Silva, Shayan Javaherian, B. Bahr, M. Ghazinejad, A. S. Eddin, M. El-Hadedy, Quantum Brain-Computer Interface, ASEE PSW, 2023, in press.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Alice_and_Bob&oldid=1277393652"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp