
Alice and Bob are
fictional characters
In fiction, a character (or speaker, in poetry) is a person or other being in a narrative (such as a novel, play, radio or television series, music, film, or video game). The character may be entirely fictional or based on a real-life perso ...
commonly used as placeholders in discussions about
cryptographic
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
systems and
protocols
Protocol may refer to:
Sociology and politics
* Protocol (politics), a formal agreement between nation states
* Protocol (diplomacy), the etiquette of diplomacy and affairs of state
* Etiquette, a code of personal behavior
Science and technology
...
, and in other science and engineering literature where there are several participants in a
thought experiment
A thought experiment is a hypothetical situation in which a hypothesis, theory, or principle is laid out for the purpose of thinking through its consequences.
History
The ancient Greek ''deiknymi'' (), or thought experiment, "was the most anci ...
. The Alice and Bob characters were invented by
Ron Rivest
Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Int ...
,
Adi Shamir
Adi Shamir ( he, עדי שמיר; born July 6, 1952) is an Israeli cryptographer. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identifica ...
, and
Leonard Adleman
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received the 2002 Turing Award, often called the Nobel prize of Computer science. He is also know ...
in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems".
Subsequently, they have become common
archetype
The concept of an archetype (; ) appears in areas relating to behavior, historical psychology, and literary analysis.
An archetype can be any of the following:
# a statement, pattern of behavior, prototype, "first" form, or a main model that ...
s in many scientific and engineering fields, such as
quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solutio ...
,
game theory and
physics
Physics is the natural science that studies matter, its fundamental constituents, its motion and behavior through space and time, and the related entities of energy and force. "Physical science is that department of knowledge which rel ...
. As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer.
Overview

Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?"
is believed to be easier to describe and understand than if the hypothetical people were simply named ''A'' and ''B'' as in "How can B send a private message M to A in a public-key cryptosystem?"
The names are conventional, and where relevant may use an
alliterative
Alliteration is the conspicuous repetition of initial consonant sounds of nearby words in a phrase, often used as a literary device. A familiar example is "Peter Piper picked a peck of pickled peppers". Alliteration is used poetically in various ...
mnemonic
A mnemonic ( ) device, or memory device, is any learning technique that aids information retention or retrieval (remembering) in the human memory for better understanding.
Mnemonics make use of elaborative encoding, retrieval cues, and image ...
to associate the name with the typical role of that person.
History
Scientific papers about thought experiments with several participants often used letters to identify them, ''A'', ''B'', and ''C'', etc.
The first mention of Alice and Bob in the context of cryptography was in
Rivest
Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intel ...
,
Shamir, and
Adleman Adleman is a surname. Notable people with the surname include:
* Leonard Adleman (born 1945), American theoretical computer scientist and professor of computer science and molecular biology
* Robert H. Adleman (1919–1995), American novelist and ...
's 1978 article "A method for obtaining digital signatures and public-key cryptosystems."
They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem".
Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the
RSA cryptosystem
RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publi ...
, there is no mention of Alice and Bob. Possibly the choice of the first three names came from the film ''
Bob & Carol & Ted & Alice
''Bob & Carol & Ted & Alice'' is a 1969 American comedy-drama film directed by Paul Mazursky, written by Mazursky and Larry Tucker, who also produced the film, and starring Natalie Wood, Robert Culp, Elliott Gould, and Dyan Cannon. The origi ...
''.
Within a few years, however, references to Alice and Bob in cryptological literature became a common
trope
Trope or tropes may refer to:
Arts, entertainment, and media
* Trope (cinema), a cinematic convention for conveying a concept
* Trope (literature), a figure of speech or common literary device
* Trope (music), any of a variety of different things ...
. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance,
Michael Rabin
Michael Rabin ( ; May 2, 1936January 19, 1972) was an American violinist. He has been described as "one of the most talented and tragic violin virtuosi of his generation". His complete Paganini "24 Caprices" for solo violin are available as a si ...
began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange." Early on, Alice and Bob were starting to appear in other domains, such as in
Manuel Blum
Manuel Blum (born 26 April 1938) is a Venezuelan-American computer scientist who received the Turing Award in 1995 "In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and ...
's 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone."
Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone." In 1984, John Gordon delivered his famous "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."
In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy Amplification by Public Discussion." In
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Ce ...
's book ''Applied Cryptography'', other characters are listed.
Cast of characters
The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use alliterative mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different motives. Other names are much less common and more flexible in use. Sometimes the genders are alternated: Alice, Bob, Carol, Dave, Eve, etc.
For
interactive proof system
In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties: a ''prover'' and a ''verifier''. The parties interact by exchanging messages in order t ...
s there are other characters:
Physics
The names Alice and Bob are also often used to name the participants in thought experiments in physics. More alphabetical names are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)".
[ An example with several names.]
See also
*
Diffie–Hellman key exchange
Diffie–Hellman key exchangeSynonyms of Diffie–Hellman key exchange include:
* Diffie–Hellman–Merkle key exchange
* Diffie–Hellman key agreement
* Diffie–Hellman key establishment
* Diffie–Hellman key negotiation
* Exponential key exc ...
*
Martin Gardner
Martin Gardner (October 21, 1914May 22, 2010) was an American popular mathematics and popular science writer with interests also encompassing scientific skepticism, micromagic, philosophy, religion, and literatureespecially the writings of L ...
*
Public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
*
Security protocol notation
In cryptography, security (engineering) protocol notation, also known as protocol narrations and Alice & Bob notation, is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the c ...
References
External links
History of Alice and BobA Method for Obtaining Digital Signatures and Public-Key Cryptosystems given at the Zurich Seminar, April 1984, by John Gordon
Geek Song: "Alice and Bob"(mainly
Quantum Computing
Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Thou ...
-related)
A short history of Bobs (story and slideshow) in the computing industry, from Alice & Bob to Microsoft Bob and Father of Ethernet Bob MetcalfeXKCD #177: Alice and Bob
{{DEFAULTSORT:Alice And Bob
Cryptographic protocols
Placeholder names
Thought experiments in physics
Fictional duos
History of computing