Alice, Bob, Charlie, and More 😀

  1. 說明

Explore the fascinating world of cryptographic characters. From Alice and Bob to Eve and Mallory, learn the roles and significance of these characters in simplifying complex security concepts.



Name Role
Alice User
Bob User
Charlie User
Dave User
Eve Eavesdropper
Isaac ISP
Ivan User
Justin Justice
Mallory Malicious attacker
Matilda Merchant
Oscar Malicious attacker
Peggy Prover
Plod Officer
Steve Steganography
Trent Trusted arbitrator
Trudy Intruder
Victor Verifier
Walter Warden
Zoe Final User

Alice and Bob | WIKIPEDIA