|
Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography, game theory and physics. The names are used for convenience; for example, "Alice sends a message to Bob encrypted with his public key" is easier to follow than "Party A sends a message to Party B encrypted by Party B's public key." Following the alphabet, the specific names have evolved into common parlance within these fields—helping technical topics to be explained in a more understandable fashion. == Overview == These placeholder names are used for convenience and easier understanding. For example, if a writer wants to explain encrypted emails, the explanation might be: :1. Alice gets Bob's public key from the company directory. :2. Alice sends a message to Bob encrypted with Bob's public key. :3. Bob can use his secret key to unscramble it. Every reader can intuitively figure out that they themselves could do the same thing as Bob or Alice. In cryptography and computer security, there are a number of widely used names for the participants in discussions and presentations about various protocols.〔RFC 4949〕 The names are conventional, somewhat self-suggestive, sometimes humorous, and effectively act as metasyntactic variables. In typical implementations of these protocols, it is understood that the actions attributed to characters such as Alice or Bob need not always be carried out by human parties directly, but also by a trusted automated agent (such as a computer program) on their behalf. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Alice and Bob」の詳細全文を読む スポンサード リンク
|