Jump to content

Characters in cryptography

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Matt Crypto (talk | contribs) at 15:29, 12 April 2004 (=External links= typo). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In cryptography and computer security, there are a number of widely-used names for participants in various protocols.

  1. Alice and Bob. Generally Alice wants to send a message to Bob
  2. Carol, Dave, and so on may be involved when more than two parties are communicating.
  3. Eve, an evesdropper, can spy on messages between Alice and Bob but generally cannot modify them. It is important that she not be able to determine the content of the message being sent.
  4. Trudy, "intruder", is more dangerous than Eve because she can modify messages in transit. It is desired that Alice and Bob be able to detect Trudy's influence, and either ignore the changed message or somehow retreive the correct message anyway.
  5. Mallory, a manipulator, sometimes appears instead of Trudy.
  6. Trent, a trusted arbitrator, is some kind of neutral third party, whose exact role varies with the protocol under discussion.
  7. Peggy, a prover, and Victor, a verifier, often must interact in some way to show that the intended transaction has actually taken place. They are often found in zero knowledge proofs.
  8. Walter, a warden, may be needed to guard Alice and Bob in some respect

]