[Top] [All Lists]

Re: Alice, Bob, ... Foo, bar?

2002-02-22 13:30:47


    Malcolm: the man in the middle, an active attacker who can alter
messages, forge packets, certificates, etc.

Joe Tag wrote:


You can also find the reference in Schneir __Applied_Crytography__ text;
and in
Pfleeger's __Security_in_Computing__ .
Koblitz in his __Number_Theory_and_Crypto__  used names like
'Aida' and 'Bernardo'.

I like 'Anna' ( think the old morse code naviation system " . _ " = a ; "_
." = n; and
''Anna'' is a 'palindrome name' ; You could use also, "Alyssa" (think
Boris (Russion), Bruce.
Carol, Carl, Carlos, Charles is the "Certificate Authority"
'Evan' could also be an eavesdropper (just think Evil).
"Trent" is the "Digital 'Trusted' Notary.  Also known as "Ted".

Sincerely yours,

     Joe Tag,Jr.

On Fri, 22 Feb 2002 12:51:55 -0500 (EST) Robert Guerra
<rguerra(_at_)yahoo(_dot_)com> writes:

The Alice and Bob After Dinner Speech
given at the Zurich Seminar, April 1984
by John Gordon

On Fri, 22 Feb 2002 john(_dot_)dlugosz(_at_)kodak(_dot_)com wrote:

From: John Dlugosz

I know about Alice and Bob in general.  But does anyone have a pointer
to a
complete list of which names are commonly used, and what Roles  those
are used for?  E.g. Eve is used for an evesdropper.  Someone else
(I forgot who) can alter packets, though.


<Prev in Thread] Current Thread [Next in Thread>