Alice, Bob, Charlie, and More ๐
2023-12-12
Explore the fascinating world of cryptographic characters. From Alice and Bob to Eve and Mallory, learn the roles and significance of these characters in simplifying complex security concepts.
่ชชๆ
| Name | Role |
|---|---|
| Alice | User |
| Bob | User |
| Charlie | User |
| Dave | User |
| Eve | Eavesdropper |
| Isaac | ISP |
| Ivan | User |
| Justin | Justice |
| Mallory | Malicious attacker |
| Matilda | Merchant |
| Oscar | Malicious attacker |
| Peggy | Prover |
| Plod | Officer |
| Steve | Steganography |
| Trent | Trusted arbitrator |
| Trudy | Intruder |
| Victor | Verifier |
| Walter | Warden |
| Zoe | Final User |