Alice, Bob, Charlie, and More ๐
2023-12-12
Explore the fascinating world of cryptographic characters. From Alice and Bob to Eve and Mallory, learn the roles and significance of these characters in simplifying complex security concepts.
่ชชๆ
Name | Role |
---|---|
Alice | User |
Bob | User |
Charlie | User |
Dave | User |
Eve | Eavesdropper |
Isaac | ISP |
Ivan | User |
Justin | Justice |
Mallory | Malicious attacker |
Matilda | Merchant |
Oscar | Malicious attacker |
Peggy | Prover |
Plod | Officer |
Steve | Steganography |
Trent | Trusted arbitrator |
Trudy | Intruder |
Victor | Verifier |
Walter | Warden |
Zoe | Final User |