Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Alice and Bob
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==References== {{Reflist|30em|refs= <ref name=Schneier1994>{{cite book |last=Schneier |first=Bruce |author-link=Bruce Schneier |date=1994 |title=Applied Cryptography: Protocols, Algorithms, and Source Code in C |publisher=Wiley |isbn=978-0-471-59756-8 |page=44 |quote=Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob.}}</ref> <ref name=Schneier1996>{{cite book |last=Schneier |first=Bruce |author-link=Bruce Schneier |date=1996 |title=Applied Cryptography: Protocols, Algorithms, and Source Code in C |edition=Second |publisher=Wiley |isbn=978-0-471-11709-4 |page=23 |id=Table 2.1: Dramatis Personae}}</ref> <ref name=Perkins2000>{{cite book |author-link=Charles L. Perkins |first=Charles L. |last=Perkins |display-authors=etal |date=2000 |title=Firewalls: 24seven |publisher=Network Press |isbn=9780782125290 |page=130 |quote=Mallet maintains the illusion that Alice and Bob are talking to each other rather than to him by intercepting the messages and retransmitting them.}}</ref> <ref name=LaMacchia2002>{{cite book |author-link=Brian LaMacchia |first=Brian |last=LaMacchia |date=2002 |title=.NET Framework Security |publisher=Addison-Wesley |isbn=9780672321849 |page=616 |quote=Mallet represents an active adversary that not only listens to all communications between Alice and Bob but can also modify the contents of any communication he sees while it is in transit.}}</ref> <ref name=Dolev2009>{{cite book |editor-link=Shlomi Dolev |editor-first=Shlomi |editor-last=Dolev |date=2009 |title=Algorithmic Aspects of Wireless Sensor Networks |publisher=Springer |isbn=9783642054334 |page=67 |quote=We model key choices of Alice, Bob and adversary Mallet as independent random variables A, B and M [...]}}</ref> <ref name=Stallings1998>{{cite book |last=Stallings |first=William |author-link=William Stallings |date=1998 |title=Cryptography and Network Security: Principles and Practice |publisher=Pearson |isbn=978-0133354690 |page=317 |quote=Suppose Alice and Bob wish to exchange keys, and Darth is the adversary.}}</ref> }}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)