我们的志愿者还没有将这篇文章翻译为 中文 (简体)。加入我们帮助完成翻译!
Placeholder names are commonly used in cryptography to indicate the participants in a conversation, without resorting to terminology such as "Party A," "eavesdropper," and "malicious attacker." The most commonly used names are:
- Alice and Bob, two parties who want to send messages to each other, occasionally joined by Carol, a third participant
- Eve, a passive attacker who is eavesdropping on Alice and Bob's conversation
- Mallory, an active attacker ("man-in-the-middle") who is able to modify their conversation and replay old messages