Re: Alice and Bobs full name
- To: debian-curiosa@lists.debian.org
- Subject: Re: Alice and Bobs full name
- From: Hans Poppe <hans@poppe.nu>
- Date: Mon, 01 Oct 2007 11:04:51 +0200
- Message-id: <[🔎] 2qKdncqWeNgzJZ3a4p2dnAA@telenor.com>
- References: <5fa6c12e0709210818s6ae228c9p96030e4c1986061e@mail.gmail.com> <20070921152458.GA24131@snag.biff.org.uk> <5fa6c12e0709210933ub49bfe0w8fc834b811918162@mail.gmail.com> <20070921174648.GF12121@horacrux> <20070921235235.GL4428@tekno.house>
Sam Couter wisely stated:
> Kevin Mark <kevin.mark@verizon.net> wrote:
>> my impression of the name choice was that they were alphabetic
>> choices corresponding to a, b, c, the first three letters of the
>> english language alphabet. (a=alice,b=bob,c=...).
>
> The attacker is often known as Mallory, and I have always assumed it
> was derived from M for malicious.
>
>> As for a name used in a test
>> system: I used to use names of people I knew
>> or
>> star trek characters
>> or
>> other random characters in a tv show.
>
> Max Power and Chesty LaRue.
Wasn't there also an Eve? As in evesdropping? ;-) I'm referring to Simon
Sing's book "Codes" where he describes how private/public key
encryption was invented. A highly recommendable book, by the way.
Hans Poppe
Oslo, Norway
--
**************************************
You can more, or less my files as you wish, but please don't touch them.
**************************************
Reply to: