Поддерживать
www.wikidata.ru-ru.nina.az
Alisa i Bob imena obychno ispolzuyushiesya v kachestve uslovnyh oboznachenij vzaimodejstvuyushih agentov ili arhetipichnyh simvolov v takih oblastyah kak kriptografiya kompyuternaya bezopasnost i fizika Ispolzuyutsya dlya udobstva obyasneniya raboty setevyh protokolov fraza Alisa posylaet Bobu soobshenie zashifrovannoe ego otkrytym klyuchom gorazdo legche vosprinimaetsya chem storona A posylaet storone B soobshenie zashifrovannoe otkrytym klyuchom storony B So vremenem sformirovalis tradicii kakimi imenami oboznachat kakih uchastnikov processa V russkoyazychnoj tradicii inogda ispolzuyutsya imena Petya i Vasya pervyj i vtoroj Vazhno ponimat chto Alisa Bob i t p oboznachayut ne obyazatelno lyudej a voobshe agentov nezavisimo ot ih realizacii eto mogut byt naprimer kompyuternye programmy dejstvuyushie ot imeni lyudej Spisok simvolovPrimer generaciya angl Primer shifrovanie s otkrytym klyuchom V osnovnom dannyj spisok sostavlen na osnovanii knigi Prikladnaya kriptografiya Bryusa Shnajera Applied Cryptography by Bruce Schneier Alisa i Bob arhetipy v oblasti kriptografii Eva bolee obshee imya Alisa i Bob Alice and Bob Naibolee chasto Alisa hochet poslat soobshenie Bobu Eti imena byli ispolzovany Ronom Rivestom Ron Rivest v 1978 godu v zhurnale Communications of the ACM v state A Method for Obtaining Digital Signatures and Public Key Cryptosystems Rivest otricaet chto eti imena imeyut otnoshenie k filmu 1969 goda Bob i Kerol Ted i Elis kak predpolagalos nekotorymi Kerol Karlos ili Charli Carol Carlos or Charlie vystupayut v kachestve tretego uchastnika soedineniya Chak Chuck postoronnij obychno zloumyshlennik Krejg Craig vzlomshik parolej cracker obychno vstrechaetsya v situacii s hranimymi heshami Dejv Dave chetvyortyj uchastnik i tak dalee po alfavitu Eva Eve passivnyj zloumyshlennik ot angl eavesdropper podslushivayushij Ona mozhet proslushivat soobsheniya mezhdu Alisoj i Bobom no ona ne mozhet vliyat na nih V kvantovoj kriptografii Eva mozhet predstavlyat okruzhayushuyu sredu Mellori Mallory ot malicious ili Trudi Trudy ot intruder aktivnyj zloumyshlennik v otlichie ot Evy Mellori mozhet izmenyat soobsheniya vosproizvodit starye soobsheniya podmenyat soobsheniya i tak dalee Peggi Peggy pruver prover i Viktor Victor kontroliruyushij verifier treti lica dokazyvayushie chto tranzakciya proizoshla Oni vstrechayutsya v chastnosti v dokazatelstve s nulevym razglasheniem Trent Trent doverennyj arbitr svoego roda nejtralnaya tretya storona chya tochnaya rol izmenyaetsya v zavisimosti ot stadii obsuzhdeniya protokola Uolter Walter nadziratel mozhet byt neobhodim dlya ohrany Alisy i Boba v zavisimosti ot obsuzhdaemogo protokola Shozhie tipovye uslovnye imena primenyayutsya v nekotoryh drugih oblastyah Artur i Merlin Arthur and Merlin v interaktivnoj sisteme dokazatelstv Merlin imeet neogranichennuyu vychislitelnuyu sposobnost a sledovatelno yavlyaetsya moguchim volshebnikom On utverzhdaet istinnost vyskazyvaniya a Artur mudryj korol stavit ego pod somnenie Eti dva simvola dayut nazvanie dvum klassam slozhnosti MA i AM Pol i Kerol Paul and Carole eti imena byli vvedeny dlya resheniya zadachi o dvadcati voprosah Twenty Questions gde Pol zadayushij voprosy vystupal v roli Pala Erdyosha a Kerol kotoraya emu otvechala byla anagrammoj orakula Carole i oracle V dalnejshem oni byli ispolzovany v nekotoryh kombinatornyh igrah sootvetstvenno v rolyah Pushera i Chuzera Pusher and Chooser Sm takzheMetaperemennayaPrimechaniyaShnajer B Prikladnaya kriptografiya Protokoly algoritmy ishodnye teksty na yazyke Si Applied Cryptography Protocols Algorithms and Source Code in C M Triumf 2002 816 s 3000 ekz ISBN 5 89392 055 4 Rivest R Shamir A Adleman L A method for obtaining digital signatures and public key cryptosystems angl Communications of the ACM New York City Association for Computing Machinery 1978 Vol 21 Iss 2 P 120 126 ISSN 0001 0782 1557 7317 doi 10 1145 359340 359342 Winkler Peter 1992 Three Thresholds for a Liar Combinatorics Probability and Computing 1 01 81 93 doi 10 1017 S0963548300000080 4 aprelya 2015 Data obrasheniya 25 aprelya 2013LiteraturaM I Anohin N P Varnovskij V M Sidelnikov V V Yashenko KRIPTOGRAFIYa V BANKOVSKOM DELEDlya uluchsheniya etoj stati zhelatelno Najti i oformit v vide snosok ssylki na nezavisimye avtoritetnye istochniki podtverzhdayushie napisannoe Prostavit snoski vnesti bolee tochnye ukazaniya na istochniki Posle ispravleniya problemy isklyuchite eyo iz spiska Udalite shablon esli ustraneny vse nedostatki
Вершина