{"id":32624,"date":"2017-07-20T07:44:53","date_gmt":"2017-07-20T11:44:53","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/a-brief-history-of-alice-bob-cryptographys-first-couple-boing-boing-boing-boing.php"},"modified":"2017-07-20T07:44:53","modified_gmt":"2017-07-20T11:44:53","slug":"a-brief-history-of-alice-bob-cryptographys-first-couple-boing-boing-boing-boing","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/a-brief-history-of-alice-bob-cryptographys-first-couple-boing-boing-boing-boing.php","title":{"rendered":"A brief history of Alice &amp; Bob, cryptography&#8217;s first couple \/ Boing Boing &#8211; Boing Boing"},"content":{"rendered":"<p><p>    Alice and Bob are the hypothetical    communicants in every cryptographic example or explainer, two    people trying to talk with one another without being thwarted    or overheard by Eve, Mallory and their legion of nefarious    friends.  <\/p>\n<p>    Alice and Bob's first known appearance was in Rivest, Shamir,    and Adleman's 1978 Communications in the ACM paper, A    Method for Obtaining Digital Signatures and Public-key    Cryptosystems.\" Since then, they have enjoyed many adventures.  <\/p>\n<p>    The potted history of Alice and Bob at Cryptocouple is a    delightful way to explore the history of crypto and the way we    think about secrecy and privacy.  <\/p>\n<p>      Alice and Bob are the worlds most famous cryptographic      couple. Since their invention in 1978, they have at once been      called inseparable, and have been the subject of numerous      divorces, travels, and torments. In the ensuing years, other      characters have joined their cryptographic family. Theres      Eve, the passive and submissive eavesdropper, Mallory the      malicious attacker, and Trent, trusted by all, just to name a      few.    <\/p>\n<p>      While Alice, Bob, and their extended family were originally      used to explain how public key cryptography works, they have      since become widely used across other science and engineering      domains. Their influence continues to grow outside of      academia as well: Alice and Bob are now a part of geek lore,      and subject to narratives and visual depictions that combine      pedagogy with in-jokes, often reflecting of the sexist and      heteronormative environments in which they were born and      continue to be used. More than just the worlds most famous      cryptographic couple, Alice and Bob have become an archetype      of digital exchange, and a lens through which to view broader      digital culture.    <\/p>\n<p>    Alice & Bob A History of    The Worlds Most Famous Cryptographic Couple [Cryptocouple]  <\/p>\n<p>      The Awakening by Henry Mayer is considered one of the finest      pieces of political art of the 20th-century and is often      mentioned as the most beautiful of the suffrage maps.      American women earned the vote from west to east before the      right became federal law.    <\/p>\n<p>      From Business Insider; mostly unappetizing. Pictured here is      the 17th century watermelon, as cropped from Giovanni      Stanchis c. 1650s painting. They look rough, but would have      tasted great. The watermelon originally came from Africa, but      after domestication it thrived in hot climates in the Middle      East and southern Europe. It probably became common in      European []    <\/p>\n<p>      Sasha Trubetskoy always makes great maps, like this cool      imagining of the Roman Empire road system in the style of a      public transit system.    <\/p>\n<p>      Although fully autonomous vehicles arent yet allowed on      public streets, they are poised to dominate the roads in the      not-too-distant future. But before that happens, Apple,      Google, Uber, and other companies now investing in      self-driving tech are going to need talented developers that      can account for the dizzying array of factors at play when a      []    <\/p>\n<p>      The PiCar-V learning kit comes with everything you need to      build a Python-powered robot, and its currently being      offered in the Boing Boing Store.    <\/p>\n<p>      New business ideas are a dime a dozen; everyone and their      cousin has a concept for a new app or service that may or may      not revolutionize a small slice of the world. Whether its      novel ways of ordering food, or time savers that only      apathetic wealthy people would pay for, coming up with your      []    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/boingboing.net\/2017\/07\/19\/heteronormative-exemplars.html\" title=\"A brief history of Alice &amp; Bob, cryptography's first couple \/ Boing Boing - Boing Boing\">A brief history of Alice &amp; Bob, cryptography's first couple \/ Boing Boing - Boing Boing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Alice and Bob are the hypothetical communicants in every cryptographic example or explainer, two people trying to talk with one another without being thwarted or overheard by Eve, Mallory and their legion of nefarious friends. Alice and Bob's first known appearance was in Rivest, Shamir, and Adleman's 1978 Communications in the ACM paper, A Method for Obtaining Digital Signatures and Public-key Cryptosystems.\" Since then, they have enjoyed many adventures. The potted history of Alice and Bob at Cryptocouple is a delightful way to explore the history of crypto and the way we think about secrecy and privacy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32624","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32624"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32624"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32624\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}