Our volunteers haven't translated this article into ไทย yet. Join us and help get the job done!
You can also read the article in English (US).

Placeholder names are commonly used in cryptography to indicate the participants in a conversation, without resorting to terminology such as "Party A," "eavesdropper," and "malicious attacker." The most commonly used names are:

  • Alice and Bob, two parties who want to send messages to each other, occasionally joined by Carol, a third participant
  • Eve, a passive attacker who is eavesdropping on Alice and Bob's conversation
  • Mallory, an active attacker ("man-in-the-middle") who is able to modify their conversation and replay old messages

Document Tags and Contributors

ป้ายกำกับ: 
ผู้มีส่วนร่วมกับหน้านี้: mdnwebdocs-bot, kscarfone, marumari
อัปเดตล่าสุดโดย: mdnwebdocs-bot,