请输入您要查询的字词:

 

单词 TraditionalNamesForRolesInCryptography
释义

traditional names for roles in cryptography


In the field of cryptography, protocols are described and analysed to allow a number of parties to achieve certain goals like communication, authentication, voting etc. Initially these protocol descriptions used single letter variables in the style “Let A and B be parties trying to communicate with the help of a mutually trusted entity C.”. This gave rise to a lot of repetition so a sort of pseudo-standard has arisen that uses first names for some of the standard roles.Common are Alice and Bob as the first two parties in a protocol. If more parties are needed, the following ones are Carol and Dave. Eve is a passive attacker, an eavesdropper. Mallory is an active attacker. Trent is a trusted third party like a mutually known key server. In the field of prove carrying code, there’s Peggy the prover and Victor the verifier. The list at wikipedia (http://en.wikipedia.org/wiki/Characters_in_cryptography) contains even more elements from this bestiary.

随便看

 

数学辞典收录了18232条数学词条,基本涵盖了常用数学知识及数学英语单词词组的翻译及用法,是数学学习的有利工具。

 

Copyright © 2000-2023 Newdu.com.com All Rights Reserved
更新时间:2025/5/4 19:55:32