Editing Talk:1323: Protocol

Jump to: navigation, search
Ambox notice.png Please sign your posts with ~~~~

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 18: Line 18:
 
I agree this would explain the protocol title, but how does it compute with the message at the bottom: ''I've discovered a way to get computer scientists to listen to any boring story''? [[User:Kynde|Kynde]] ([[User talk:Kynde|talk]]) 18:55, 29 January 2014 (UTC)
 
I agree this would explain the protocol title, but how does it compute with the message at the bottom: ''I've discovered a way to get computer scientists to listen to any boring story''? [[User:Kynde|Kynde]] ([[User talk:Kynde|talk]]) 18:55, 29 January 2014 (UTC)
 
:The point is that Cueball tells a completely mundane and booooring! story (might be last evening's soap opera, for example), but by replacing the protagonist names with Alice, Bob and Eve, names commonly used in explanation of public key cryptography, he tricked the Computer Scientist into believing he describes some cryptography protocol, thus making him interested. [[User:Edheldil|Edheldil]] ([[User talk:Edheldil|talk]]) 10:22, 31 January 2014 (UTC)
 
:The point is that Cueball tells a completely mundane and booooring! story (might be last evening's soap opera, for example), but by replacing the protagonist names with Alice, Bob and Eve, names commonly used in explanation of public key cryptography, he tricked the Computer Scientist into believing he describes some cryptography protocol, thus making him interested. [[User:Edheldil|Edheldil]] ([[User talk:Edheldil|talk]]) 10:22, 31 January 2014 (UTC)
βˆ’
::By the way, what Cueball describes might very well be DNS cache poisoning -- or what NSA's supposed FOXACID servers do. [[User:Edheldil|Edheldil]] ([[User talk:Edheldil|talk]]) 10:31, 31 January 2014 (UTC)
+
 
  
 
I believe the essence of this story is in the encryption aspect, not the TCP. Many protocols feature a message-and-reply type of structure, it's not unique to TCP. The alternative to having CS reply to each phrase is to have him not reply to each phrase, which would be boring and not really indicate what's going on in CS's head. As some cryptography problems can be complex they are sometimes stated in "chunks" so people can follow along [https://en.wikipedia.org/wiki/Dining_cryptographers_problem  more easily] (See the Description section of the link). In trying to follow what might be a complex problem sometimes people will acknowledge that they understand each part in turn - weather for their own benefit or that of the problem stater. [[User:Jarod997|Jarod997]] ([[User talk:Jarod997|talk]]) 21:04, 29 January 2014 (UTC)
 
I believe the essence of this story is in the encryption aspect, not the TCP. Many protocols feature a message-and-reply type of structure, it's not unique to TCP. The alternative to having CS reply to each phrase is to have him not reply to each phrase, which would be boring and not really indicate what's going on in CS's head. As some cryptography problems can be complex they are sometimes stated in "chunks" so people can follow along [https://en.wikipedia.org/wiki/Dining_cryptographers_problem  more easily] (See the Description section of the link). In trying to follow what might be a complex problem sometimes people will acknowledge that they understand each part in turn - weather for their own benefit or that of the problem stater. [[User:Jarod997|Jarod997]] ([[User talk:Jarod997|talk]]) 21:04, 29 January 2014 (UTC)
 
:Found it: [https://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier], a notable modern Cryptographer has published a number of cryptography books in which he routinely references characters such as Alice, Bob, and Eve. [[User:Jarod997|Jarod997]] ([[User talk:Jarod997|talk]])
 
:Found it: [https://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier], a notable modern Cryptographer has published a number of cryptography books in which he routinely references characters such as Alice, Bob, and Eve. [[User:Jarod997|Jarod997]] ([[User talk:Jarod997|talk]])
 
:Also: TCP/IP doesn't necessarily ack every packet, it can also ack multiple packets in one go. This allows for a much larger throughput as the latency per packet goes down to zero. [[User:Kaa-ching|Kaa-ching]] ([[User talk:Kaa-ching|talk]]) 09:33, 30 January 2014 (UTC)
 
:Also: TCP/IP doesn't necessarily ack every packet, it can also ack multiple packets in one go. This allows for a much larger throughput as the latency per packet goes down to zero. [[User:Kaa-ching|Kaa-ching]] ([[User talk:Kaa-ching|talk]]) 09:33, 30 January 2014 (UTC)

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)