[Top] [All Lists]

Re: Alice, Bob, ... Foo, bar?

2002-02-22 12:48:46


You can also find the reference in Schneir __Applied_Crytography__ text;
and in 
Pfleeger's __Security_in_Computing__ . 
Koblitz in his __Number_Theory_and_Crypto__  used names like 
'Aida' and 'Bernardo'. 

I like 'Anna' ( think the old morse code naviation system " . _ " = a ;
"_ ." = n; and
''Anna'' is a 'palindrome name' ; You could use also, "Alyssa" (think
Boris (Russion), Bruce. 

Carol, Carl, Carlos, Charles is the "Certificate Authority" 

'Evan' could also be an eavesdropper (just think Evil).  

"Trent" is the "Digital 'Trusted' Notary.  Also known as "Ted". 

Sincerely yours, 

     Joe Tag,Jr. 

On Fri, 22 Feb 2002 12:51:55 -0500 (EST) Robert Guerra
<rguerra(_at_)yahoo(_dot_)com> writes:

The Alice and Bob After Dinner Speech

given at the Zurich Seminar, April 1984

by John Gordon

On Fri, 22 Feb 2002 john(_dot_)dlugosz(_at_)kodak(_dot_)com wrote:

From: John Dlugosz

I know about Alice and Bob in general.  But does anyone have a 
pointer to a
complete list of which names are commonly used, and what Roles 
those names
are used for?  E.g. Eve is used for an evesdropper.  Someone else 
(I forgot
who) can alter packets, though.


Robert Guerra <rguerra(_at_)cpsr(_dot_)org>
Director, Computer Professionals for Social Responsibility (CPSR)

Juno offers FREE or PREMIUM Internet access for less!
Join Juno today!  For your FREE software, visit:

<Prev in Thread] Current Thread [Next in Thread>