Placeholder names in cryptography
The names Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography and physics. The names are used for convenience; for example, "Alice sends a message to Bob encrypted with his public key" is easier to follow than "Party A sends a message to Party B encrypted by Party B's public key." Following the alphabet, the specific names have evolved into common parlance within these fields—helping technical topics to be explained in a more understandable fashion. In cryptography and computer security, there are a number of widely used names for the participants in discussions and presentations about various protocols. The names are conventional, somewhat self-suggestive, sometimes humorous, and effectively act as metasyntactic variables. In typical implementations of these protocols, it is understood that the actions attributed to characters such as Alice or Bob need not always be carried out by human parties directly, but also by a trusted automated agent on their behalf.
The numerical value of placeholder names in cryptography in Chaldean Numerology is: 7
The numerical value of placeholder names in cryptography in Pythagorean Numerology is: 4
Images & Illustrations of placeholder names in cryptography
Find a translation for the placeholder names in cryptography definition in other languages:
Select another language:
Discuss these placeholder names in cryptography definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"placeholder names in cryptography." Definitions.net. STANDS4 LLC, 2017. Web. 29 Mar. 2017. <http://www.definitions.net/definition/placeholder names in cryptography>.