Alice and Bob
Alice and Bob are fictional characters commonly used as a placeholder name in cryptology, and in other science and engineering literature where there are several participants in a thought experiment. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics. As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to humans; they refer to generic agents which might be different computers or even different programs running on a single computer.
Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?" is believed to be easier to describe and understand than "How can B send a private message M to A in a public-key cryptosystem?"
In cryptography and computer security, Alice and Bob are used extensively as participants in discussions about cryptographic protocols or systems. The names are conventional, and where relevant may use a rhyming mnemonic to associate the name with the typical role of that person.
Scientific papers about thought experiments with several participants often used letters to identify them, "A", "B", and "C", etc. The first mention of Alice and Bob in the context of cryptography was in Rivest, Shamir, and Adleman's 1978 article "A method for obtaining digital signatures and public-key cryptosystems." They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem".:121 Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the RSA cryptosystem, there is no mention of Alice and Bob. Possibly the choice of the first three names came from the film Bob & Carol & Ted & Alice.
Within a few years, however, reference to Alice and Bob in cryptological literature became a common trope. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance, Michael Rabin began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange." Early on, Alice and Bob were starting to appear in other domains, such as in Manuel Blum's 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone."
Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone." In 1984, John Gordon delivered his famous "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."
In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy Amplification by Public Discussion." In Bruce Schneier's book Applied Cryptography, other characters are listed.
Cast of charactersEdit
The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use rhyming mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different motives. Other names are much less common, and flexible in use. Sometimes the sexes are alternated: Alice, Bob, Carol, Dave, Eve ...
- Alice and Bob. The original, generic characters. Generally, Alice and Bob want to exchange a message or cryptographic key.
- Carol, Carlos or Charlie. A generic third participant.
- Chuck. A third participant, usually of malicious intent.
- Craig. A password cracker, often encountered in situations with stored passwords.
- Dan, Dave or David. A generic fourth participant.
- Erin. A generic fifth participant, but rarely used, as "E" is usually reserved for Eve.
- Eve. An eavesdropper, who is usually a passive attacker. While they can listen in on messages between Alice and Bob, they cannot modify them. In quantum cryptography, Eve may also represent the environment.[clarification needed]
- Faythe. A trusted advisor, courier or intermediary. Faythe is used infrequently, and is associated with Faith and Faithfulness. Faythe may be a repository of key service or courier of shared secrets.
- Frank. A generic sixth participant.
- Grace. A government representative. For example, Grace may try to force Alice or Bob to implement backdoors in their protocols. Grace may also deliberately weaken standards.
- Heidi. A mischievous designer for cryptographic standards, but rarely used.
- Ivan. An Issuer, mentioned first by Ian Grigg in the context of Ricardian contracts.
- Judy. A judge who may be called upon to resolve a potential dispute between participants.
- Mallory or (less commonly) Mallet A malicious attacker. Associated with Trudy, an intruder. Unlike the passive Eve, Mallory/Mallet is an active attacker (often used in man-in-the-middle attacks), who can modify messages, substitute messages, or replay old messages. The difficulty of securing a system against Mallory/Mallet is much greater than against Eve.
- Michael, or Mike. Used as an alternative to the eavesdropper Eve. See Microphone.
- Niaj. Used as an alternative to the eavesdropper Eve in several South Asian nations.
- Olivia. An oracle, who provides external data to smart contracts residing on distributed ledger (commonly referred to as blockchain) systems.
- Oscar. An opponent, similar to Mallory, but not necessarily malicious.
- Peggy, or Pat. A prover, who interacts with the verifier to show that the intended transaction has actually taken place. Peggy is often found in zero-knowledge proofs.
- Rupert. A repudiator who appears for interactions that desire Non-repudiation.
- Sybil. A pseudonymous attacker, who usually uses a large number of identities. For example, Sybil may attempt to subvert a reputation system. See Sybil attack.
- Trent or Ted. A trusted arbitrator, who acts as a neutral third party.
- Trudy. An intruder.
- Victor, or Vanna. A verifier, who requires proof from the prover.
- Walter. A warden, who may guard Alice and Bob.
- Wendy. A whistleblower, who is an insider with privileged access capable of divulging information.
For interactive proof systems there are other characters:
- Arthur and Merlin: Merlin provides answers, and Arthur asks questions. Merlin has unbounded computational ability (like the wizard Merlin). In interactive proof systems, Merlin claims the truth of a statement, and Arthur (like King Arthur), questions him to verify the claim.
- Paul and Carole. Paul asks questions, and Carole provides answers. In the solution of the Twenty Questions problem, "Paul" asked questions (standing in for Paul Erdős) and "Carole" answered them (Carole is an anagram of "oracle"). Paul and Carole were also used in combinatorial games, in the roles of Pusher and Chooser.
- Arthur and Bertha. Arthur is the "Left", "Black", or "Vertical" player, and Bertha is the "Right", "White", or "Horizontal" player in a combinatorial game. Additionally, Arthur, given the same outcome, prefers a game to take the fewest moves. Bertha likewise prefers a game to take the most number of moves.
The names Alice and Bob are also often used to name the participants in thought experiments in physics. More alphabetical names are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)".
- Rivest, R. L.; Shamir, A.; Adleman, L. (1978-02-01). "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Communications of the ACM. 21 (2): 120–126. CiteSeerX 10.1.1.607.2677. doi:10.1145/359340.359342. ISSN 0001-0782.
- Newton, David E. (1997). Encyclopedia of Cryptography. Santa Barbara California: Instructional Horizons, Inc. p. 10.
- Rivest, R. L., A. Shamir, and L. Adleman. “On Digital Signatures and Public-Key Cryptosystems.” Cambridge MA: Massachusetts Institute of Technology, April 1977.
- Rivest, R. L., A. Shamir, and L. Adleman. Cryptographic Communications System and Method. 4405829. Cambridge MA, filed December 14, 1977, and issued September 20, 1983.
- Bob Brown (7 February 2005). "Security's inseparable couple: Alice & Bob". NetworkWorld.
- Rabin, Michael O. How to exchange secrets with oblivious transfer. Technical Report TR-81, Aiken Computation Lab, Harvard University, 1981.
- Blum, Manuel. “Coin Flipping by Telephone a Protocol for Solving Impossible Problems.” ACM SIGACT News 15, no. 1 (November 10, 1981): 23–27.
- Blum, Manuel (1983). "How to exchange (Secret) keys". ACM Transactions on Computer Systems. 1 (2): 175–193. doi:10.1145/357360.357368.
- doi: 10.1016/j.jvlc.2007.05.001
- Gordon, John. “The Alice and Bob After Dinner Speech.” Zurich, April 1984. http://downlode.org/Etext/alicebob.html.
- Bennett, Charles H.; Brassard, Gilles; Robert, Jean-Marc (1988). "Privacy Amplification by Public Discussion". SIAM Journal on Computing. 17 (2): 210–229. doi:10.1137/0217014.
- Schneier, Bruce. Applied Cryptography: Protocols, Algorithms and Source Code in C. Hoboken, NJ: John Wiley & Sons, 2015.
- Xue, Peng; Wang, Kunkun; Wang, Xiaoping (2017). "Efficient multiuser quantum cryptography network based on entanglement". Scientific Reports. 7 (1). doi:10.1038/srep45928. ISSN 2045-2322. An example from quantum cryptography with Alice, Bob, Carol, and David.
- Tanenbaum, Andrew S. (2007), Distributed Systems: Principles and Paradigms, Pearson Prentice Hall, p. 171;399–402, ISBN 978-0-13-239227-3
- Cho, Hyunghoon; Ippolito, Daphne; Yun William Yu (2020). "Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs". arXiv:2003.11511 [cs.CR].
- Fried, Joshua; Gaudry, Pierrick; Heninger, Nadia; Thomé, Emmanuel (2016). A kilobit hidden SNFS discrete logarithm computation (PDF). Lecture Notes in Computer Science. 10210. University of Pennsylvania and INRIA, CNRS, University of Lorraine. pp. 202–231. arXiv:1610.02874. doi:10.1007/978-3-319-56620-7_8. ISBN 978-3-319-56619-1. Retrieved 2016-10-12.
- Grigg, Ian (2002-11-24). "Ivan The Honourable". iang.org.
- Bruce Schneier (1996), Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, ISBN 9780471117094, p. 23: Table 2.1: Dramatis Personae
- Szabo, Nick (September 1997). "Formalizing and Securing Relationships on Public Networks". First Monday. 2 (9). doi:10.5210/fm.v2i9.548.
- Schneier (2010-09-23), Bruce Schneier - Who are Alice & Bob?, retrieved 2017-05-02
- Bruce Schneier (1994), Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, ISBN 9780471597568, p. 44: "Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob."
- Charles L. Perkins et al. (2000), Firewalls: 24seven, Network Press, ISBN 9780782125290, p. 130: "Mallet maintains the illusion that Alice and Bob are talking to each other rather than to him by intercepting the messages and retransmitting them."
- Brian LaMacchia (2002), .NET Framework Security, Addison-Wesley, ISBN 9780672321849, p. 616: "Mallet represents an active adversary that not only listens to all communications between Alice and Bob but can also modify the contents of any communication he sees while it is in transit."
- Shlomi Dolev, ed. (2009), Algorithmic Aspects of Wireless Sensor Networks, Springer, ISBN 9783642054334, p. 67: "We model key choices of Alice, Bob and adversary Mallet as independent random variables A, B and M [...]"
- Carsten Lund; et al. (1992). "Algebraic Methods for Interactive Proof Systems". Journal of the ACM. 39 (4): 859–868. CiteSeerX 10.1.1.41.9477. doi:10.1145/146585.146605.
- Spencer, Joel; Winkler, Peter (1992), "Three Thresholds for a Liar", Combinatorics, Probability and Computing, 1 (1): 81–93, doi:10.1017/S0963548300000080
- Muthukrishnan, S. (2005), Data Streams: Algorithms and Applications, Now Publishers, p. 3, ISBN 978-1-933019-14-7
- Conway, John Horton (2000). On Numbers and Games. CRC Press. pp. 71, 175, 176. ISBN 9781568811277.
- "Alice and Bob communicate without transferring a single photon - physicsworld.com". physicsworld.com. 16 April 2013. Retrieved 2017-06-19.
- Frazier, Matthew; Taddese, Biniyam; Antonsen, Thomas; Anlage, Steven M. (2013-02-07). "Nonlinear Time Reversal in a Wave Chaotic System". Physical Review Letters. 110 (6): 063902. arXiv:1207.1667. Bibcode:2013PhRvL.110f3902F. doi:10.1103/physrevlett.110.063902. PMID 23432243.
- N. David Mermin (5 March 2000). "209: Notes on Special Relativity" (PDF). An example with several names.
- History of Alice and Bob
- A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
- The Alice and Bob After-Dinner Speech, given at the Zurich Seminar, April 1984, by John Gordon
- Geek Song: "Alice and Bob"
- Alice and Bob jokes (mainly Quantum Computing-related)
- A short history of Bobs (story and slideshow) in the computing industry, from Alice & Bob to Microsoft Bob and Father of Ethernet Bob Metcalfe
- XKCD #177: Alice and Bob