但还是遗留一个问题:在第一步中,Alice如何确认收到的公钥是属于Bob,而不是被Eve截取并串改过的? 在上图中,Eve截获了Bob发给Alice的公钥 $K_{pub}$,并替换成自己的公钥$K_{pubEve}$,发给Alice。 Alice拿到了Eve的公钥$K_{pubEve}$,她并不能验证该公钥的真实性,以为这个公钥就是Bob的。这直接导致Eve窃取...
但还是遗留一个问题:在第一步中,Alice如何确认收到的公钥是属于Bob,而不是被Eve截取并串改过的? 在上图中,Eve截获了Bob发给Alice的公钥 $K_{pub}$,并替换成自己的公钥$K_{pubEve}$,发给Alice。 Alice拿到了Eve的公钥$K_{pubEve}$,她并不能验证该公钥的真实性,以为这个公钥就是Bob的。这直接导致Eve窃取...
Eve是一个攻击者,他的能力是窃听Alice和Bob之间的通信内容。1985年的论文《如何减少敌人的信息》中第一...
Blockchains and smart contracts, on their own, are little more than a diverting combination of cryptography and computing: it’s the use cases that make things interesting. The first use case that everyone thinks of is crypto-currency, the use of blockchains to create wholly electronic currenc...
1994 年,著名密码学家 Schneier 出版了一本密码学著作《应用密码学:协议、算法、C 语言源码》(Applied Cryptography : Protocols, Algorithms, and Source Code in C)。在这本著作中,Schneier 不仅广泛使用 Alice、Bob、Eve 和 Mallory,还发明了很多其他的人物,这些人物未来都成为了密码学协议中的人物,列举如下: ...
Blockchains and smart contracts, on their own, are little more than a diverting combination of cryptography and computing: it’s the use cases that make things interesting. The first use case that everyone thinks of iscrypto-currency, the use of blockchains to create wholly electronic currencie...
1994年,cryptographer Schneier在他的著作《Applied Cryptography》中,将Alice、Bob、Eve、Mallory等角色赋予了更丰富的动态,每个角色都有特定的含义:Carol/Cathy、Dave/David、Isaac、Justin等,形成了一部密码学角色剧的编年史。想要深入了解这个密码学世界的“英雄”和“反派”,可以参考DuPont和Cattapan的...
Alice, Bob, and Eve, with a symmetric cryptosystem. Credit: arXiv:1610.06918 [cs.CR] (Tech Xplore)—What will Google think of next? Actually, if you are looking at the goings on of the Google Brain team you are right to suspect they don't want to be thinking at all. They would ra...
Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice, decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has just learned to devise a cryptographic...