Bob And Alice
   HOME

TheInfoList



OR:

Alice and Bob are
fictional characters In fiction, a character (or speaker, in poetry) is a person or other being in a narrative (such as a novel, Play (theatre), play, Radio series, radio or television series, music, film, or video game). The character may be entirely fictional or b ...
commonly used as placeholders in discussions about
cryptographic Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
systems and protocols, and in other science and engineering literature where there are several participants in a
thought experiment A thought experiment is a hypothetical situation in which a hypothesis, theory, or principle is laid out for the purpose of thinking through its consequences. History The ancient Greek ''deiknymi'' (), or thought experiment, "was the most anci ...
. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Subsequently, they have become common
archetype The concept of an archetype (; ) appears in areas relating to behavior, historical psychology, and literary analysis. An archetype can be any of the following: # a statement, pattern of behavior, prototype, "first" form, or a main model that ot ...
s in many scientific and engineering fields, such as quantum cryptography,
game theory Game theory is the study of mathematical models of strategic interactions among rational agents. Myerson, Roger B. (1991). ''Game Theory: Analysis of Conflict,'' Harvard University Press, p.&nbs1 Chapter-preview links, ppvii–xi It has appli ...
and
physics Physics is the natural science that studies matter, its fundamental constituents, its motion and behavior through space and time, and the related entities of energy and force. "Physical science is that department of knowledge which r ...
. As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer.


Overview

Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?" is believed to be easier to describe and understand than if the hypothetical people were simply named ''A'' and ''B'' as in "How can B send a private message M to A in a public-key cryptosystem?" The names are conventional, and where relevant may use an alliterative
mnemonic A mnemonic ( ) device, or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding. Mnemonics make use of elaborative encoding, retrieval cues, and imag ...
to associate the name with the typical role of that person.


History

Scientific papers about thought experiments with several participants often used letters to identify them, ''A'', ''B'', and ''C'', etc. The first mention of Alice and Bob in the context of cryptography was in
Rivest Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intell ...
, Shamir, and
Adleman Adleman is a surname. Notable people with the surname include: * Leonard Adleman (born 1945), American theoretical computer scientist and professor of computer science and molecular biology * Robert H. Adleman (1919–1995), American novelist and h ...
's 1978 article "A method for obtaining digital signatures and public-key cryptosystems." They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem". Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the
RSA cryptosystem RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly ...
, there is no mention of Alice and Bob. Possibly the choice of the first three names came from the film '' Bob & Carol & Ted & Alice''. Within a few years, however, references to Alice and Bob in cryptological literature became a common
trope Trope or tropes may refer to: Arts, entertainment, and media * Trope (cinema), a cinematic convention for conveying a concept * Trope (literature), a figure of speech or common literary device * Trope (music), any of a variety of different things ...
. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance,
Michael Rabin Michael Rabin ( ; May 2, 1936January 19, 1972) was an American violinist. He has been described as "one of the most talented and tragic violin virtuosi of his generation". His complete Niccolò Paganini, Paganini "24 Caprices" for solo violin are ...
began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange." Early on, Alice and Bob were starting to appear in other domains, such as in Manuel Blum's 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone." Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone." In 1984, John Gordon delivered his famous "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob." In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy Amplification by Public Discussion." In Bruce Schneier's book ''Applied Cryptography'', other characters are listed.


Cast of characters

The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use alliterative mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different motives. Other names are much less common and more flexible in use. Sometimes the genders are alternated: Alice, Bob, Carol, Dave, Eve, etc. For interactive proof systems there are other characters:


Physics

The names Alice and Bob are also often used to name the participants in thought experiments in physics. More alphabetical names are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)". An example with several names.


See also

*
Diffie–Hellman key exchange Diffie–Hellman key exchangeSynonyms of Diffie–Hellman key exchange include: * Diffie–Hellman–Merkle key exchange * Diffie–Hellman key agreement * Diffie–Hellman key establishment * Diffie–Hellman key negotiation * Exponential key exc ...
* Martin Gardner *
Public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
*
Security protocol notation In cryptography, security (engineering) protocol notation, also known as protocol narrations and Alice & Bob notation, is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the cont ...


References


External links


History of Alice and Bob

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems


given at the Zurich Seminar, April 1984, by John Gordon
Geek Song: "Alice and Bob"


(mainly
Quantum Computing Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Though ...
-related)
A short history of Bobs (story and slideshow) in the computing industry, from Alice & Bob to Microsoft Bob and Father of Ethernet Bob Metcalfe

XKCD #177: Alice and Bob
{{DEFAULTSORT:Alice And Bob Cryptographic protocols Placeholder names Thought experiments in physics Fictional duos History of computing