Boiledbeans

Drama! Intrigue! Geekiness!

May 2, 2014

Not in wonderland

devadutta @ 1:50 pm, GMT +0000 ( 1399038650 ) Play
2014-05-07

Many people believe R in 1 was making a reference to 2 in his 1977 paper on a technology that is now widely used. Since then, people use it in every single paper written in that field of study.

What are we talking about?

Cracked by: Manish Achuth , Rogi and Sumanth Patlolla

Answer:
Placeholder names: Alice and Bob.

Points assigned by AutoRaja. Review by lazy humans pending.

5 Responses to “Not in wonderland”

  1. Manish Achuth
    16
    9
    8

    RSA Algo.
    Using Alice and Bob from the movie Bob & Carol & Ted & Alice.


  2. Rogi
    48
    10
    5

    Alice and Bob appear in most explanations of encrypted data transfer.
    I/m ashamed to say that I always assumed that Schneier came up with it.


  3. Rogi
    48
    10
    5

    Alice and Bob appear in most explanations of encrypted data transfer.
    I’m ashamed to say that I always assumed that Schneier came up with it.Whoops! I guess I should add cryptography and RSA.


  4. s m muneer ali
    12
    5
    3

    I think it might be something to do with https.


  5. Sumanth Patlolla
    27
    8
    7

    Alice and Bob, the names used by Ron Rivest in his paper


« Previous « Reserved « | » One Dollar » Next »