Difference between revisions of "Talk:2691: Encryption"
Line 1: | Line 1: | ||
<!--Please sign your posts with ~~~~ and don't delete this text. New comments should be added at the bottom.--> | <!--Please sign your posts with ~~~~ and don't delete this text. New comments should be added at the bottom.--> | ||
− | More generally, when the explanation of the encryption algorithm needs example people, it picks names going sequentially through the alphabet. Alice and Bob are the canonical first two, names starting with C and D would be next. | + | More generally, when the explanation of the encryption algorithm needs example people, it picks names going sequentially through the alphabet. Alice and Bob are the canonical first two, names starting with C and D would be next. Eve, the eavesdropper, is next. [[User:Barmar|Barmar]] ([[User talk:Barmar|talk]]) 04:01, 29 October 2022 (UTC) |
Revision as of 04:03, 29 October 2022
More generally, when the explanation of the encryption algorithm needs example people, it picks names going sequentially through the alphabet. Alice and Bob are the canonical first two, names starting with C and D would be next. Eve, the eavesdropper, is next. Barmar (talk) 04:01, 29 October 2022 (UTC)