Alice and Bob
Alice and Bob, also just A and B, are the standard example users in writing on cryptography, coding theory, communication complexity theory etc. Carol and Dave often join them for protocols that require more than two players.
The most familiar names in network security are neither vendors nor geeks: Try Alice and Bob.
Bruce Schneier extends these  with two kinds of attacker:
- Eve the Eavesdropper, using passive attacks, just trying to read messages
- Mallory the Malicious, using active attacks, attempting to deceive A and B by altering messages or sending bogus ones
and several other types of player required in various protocols:
- Victor the Verifier
- Peggy the Prover
- Trent the Trusted third party
- Walter the Warden, who watches over A and B in some protocols
Schneier's extensions seem to be in the process of becoming standard as well.
It is also moderately common to add additional characters as needed for a particular protocol. For example, in discussing a e-commerce system, one might need Matlida the Merchant and Ivan the Issuer of credentials.
Alice and Bob were introduced in the original paper  on the RSA algorithm for public key cryptography.
Rivest ... says he came up with Alice and Bob to be able to use "A" and "B" for notation, and that by having one male and one female, the pronouns "he" and "she" could be used in descriptions. Rivest says it is possible that Alice came to mind because he is something of an Alice in Wonderland buff.
The similar name of the film Bob & Carol & Ted & Alice and subsequent TV show appears to be just a coincidence. Rivest denies that there is a connection.
Alice and Bob have an amusing biography on the web.
Now there are hundreds of papers written about Alice and Bob. Over the years Alice and Bob have tried to defraud insurance companies, they've played poker for high stakes by mail, and they've exchanged secret messages over tapped telephones.
If we put together snippets from lots of papers, we get a fascinating picture of their lives. This may be the first time a definitive biography of Alice and Bob has been given. ...
Against all odds, over a noisy telephone line, tapped by the tax authorities and the secret police, Alice will happily attempt, with someone she doesn't trust, whom she cannot hear clearly, and who is probably someone else, to fiddle her tax returns and to organise a coup d'etat, while at the same time minimising the cost of the phone call.
A coding theorist is someone who doesn't think Alice is crazy.
 Other pairs
While Alice and Bob are standard in cryptography and coding theory, other pairs of players are used in other domains.
In interactive proof systems, the prover has unbounded computational ability and is hence associated with Merlin, the powerful wizard. He claims the truth of a statement, and Arthur, the wise king, questions him to verify the claim.
In combinatorial game theory, the characters are often Paul and Carole. The characters were introduced in the solution of the Twenty Questions problem, where "Paul", who asked questions, stood for Paul Erdős and "Carole", who answered them, was an anagram of "oracle". They were further used in certain games in the roles of Pusher and Chooser respectively, and have since been used in various roles.
In English grammar discussions, notably in Noam Chomsky's writings, John and Mary are often used.
- ↑ 1.0 1.1 "Security's inseparable couple", Network World, Feb 2005, http://www.networkworld.com/news/2005/020705widernetaliceandbob.html
- ↑ Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9 page 23
- ↑ Rivest, Shamir & Adleman (1978), A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, http://people.csail.mit.edu/rivest/Rsapaper.pdf
- ↑ John Gordon (1984), The Story of Alice and Bob, http://www.conceptlabs.co.uk/alicebob.html
- ↑ Spencer, Joel; Winkler, Peter (1992), "Three Thresholds for a Liar", Combinatorics, Probability and Computing 1: 81–93, http://math.dartmouth.edu/~pw/papers/3thresh.ps
- ↑ Muthukrishnan, S. (2005), Data Streams: Algorithms and Applications, Now Publishers, p. 3, ISBN 9781933019147, http://algo.research.googlepages.com/eight.ps
|Some content on this page may previously have appeared on Citizendium.|