Alice and Bob are the hypothetical communicants in every cryptographic example or explainer, two people trying to talk with one another without being thwarted or overheard by Eve, Mallory and their legion of nefarious friends.
Alice and Bob's first known appearance was in Rivest, Shamir, and Adleman's 1978 Communications in the ACM paper, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems." Since then, they have enjoyed many adventures.
The potted history of Alice and Bob at Cryptocouple is a delightful way to explore the history of crypto and the way we think about secrecy and privacy.
Alice and Bob are the world’s most famous cryptographic couple. Since their invention in 1978, they have at once been called “inseparable,” and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. There’s Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.
While Alice, Bob, and their extended family were originally used to explain how public key cryptography works, they have since become widely used across other science and engineering domains. Their influence continues to grow outside of academia as well: Alice and Bob are now a part of geek lore, and subject to narratives and visual depictions that combine pedagogy with in-jokes, often reflecting of the sexist and heteronormative environments in which they were born and continue to be used. More than just the world’s most famous cryptographic couple, Alice and Bob have become an archetype of digital exchange, and a lens through which to view broader digital culture.
Alice & Bob
A History of The World’s Most Famous Cryptographic Couple [Cryptocouple]
"Letterlocking" is a term coined by MIT Libraries conservator Jana Dambrogio after she discovered a trove of letters while spelunking in the conservation lab of the Vatican Secret Archives; the letters had been ingeniously folded and sealed so that they couldn't be opened and re-closed without revealing that they had been read. Some even contained […]
Jerry Merryman, who co-invented the handheld electronic calculator in 1965, is dead at 86. Merryman told NPR’s “All Things Considered” in 2013, “It was late 1965 and Jack Kilby, my boss, presented the idea of a calculator. He called some people in his office. He says, we’d like to have some sort of computing device, […]
The Tiny Type Museum is a limited-edition handmade box set of traditional printing tech, including hot metal and wooden type, custom-made linotype slugs, plate molds, phototypes, plates, Monotype matrixes, other stuff besides, and a book about six centuries of reprographic technology that fits nice and kentucky in a slot.
Big companies want automation on a big scale. Doing that means diving into the tricky world of machine learning and data science. And no matter what platform you’ll be implementing it on, you can learn how with the Machine Learning & Data Science Certification Training Bundle. In 48 hours and through eight courses, this bundle […]
Big systems need tight security – and the experts who can implement it. Cisco Networking Systems are the go-to providers for network infrastructure, but maintaining it takes a lot of up-to-date knowledge. If you want that knowledge right from the source, there’s an online course that can get you certified painlessly: The Foundational Cisco CCNA […]
Computer slowing down? There are a ton of reasons why that might be, especially if your unit has a few years on it. Junk files and programs can accumulate over time, some even left over from otherwise uninstalled software. This virtual debris can slow your PC down dramatically, but there’s a surprisingly quick fix. Lauded […]