Våra volontärer har inte översatt denna artikel till Svenska ännu. Gå med oss och hjälpa till att få jobbet gjort!
Du kan också läsa artikeln på English (US).

Placeholder names are commonly used in cryptography to indicate the participants in a conversation, without resorting to terminology such as "Party A," "eavesdropper," and "malicious attacker." The most commonly used names are:

  • Alice and Bob, two parties who want to send messages to each other, occasionally joined by Carol, a third participant
  • Eve, a passive attacker who is eavesdropping on Alice and Bob's conversation
  • Mallory, an active attacker ("man-in-the-middle") who is able to modify their conversation and replay old messages

Dokumenttaggar och bidragare

Bidragare till denna sida: mdnwebdocs-bot, kscarfone, marumari
Senast uppdaterad av: mdnwebdocs-bot,