'Replace crypto-couple Alice and Bob with Sita and Rama'

Even their jobs are being offshored

  • alert
  • submit to reddit

Protecting users from Firesheep and other Sidejacking attacks with SSL

A computer scientist has come up with a proposal to replace cryptography's Alice and Bob with characters from Hindu mythology.

For decades, techniques to encrypt and decrypt communications have been explained using two imaginary characters, Alice and Bob, and potential eavesdropper Eve. Alice sends a message to Bob, and Eve is always trying to intercept it - the little sneak. Alice and Bob first came to light in 1978 in a groundbreaking paper [PDF] on the RSA algorithm for public-key cryptography.

Dr S. Parthasarathy, a part-time lecturer and full-time employee of Indian biz Algologic Research & Solutions, suggests a cast change in the dramatis personae of cryptography with Sita and Rama, two central characters in the Hindu mythological epic Ramayana. The proposed sacking-and-hiring also replaces Eve with Ravana the rogue, as the doctor explains [PDF] here:

The statement Sita wants to send a message to Rama is inspired from the episode in Sundara Kanda (lit. beautiful book) of Ramayana, where Sita, who was kidnapped by Ravana, is isolated and kept confined to a forest. She is seated under an ashoka tree, when the monkey-God Hanuman, sent by Rama, reaches her. Desperate Sita wants to send a message to Rama through Hanuman (an honest man). We also have the usual man-in-the-middle Ravana (a rogue), who is waiting to sabotage any communication between Sita and Rama. In addition to the aptly chosen names, this entire episode has some striking similarities to modern cryptography. This choice is very effective in teaching cryptography, because the Ramayana story is widely known, and is retained in memory easily for a longer time.

Ditching Alice and Bob with Sita and Rama makes sense because the first letters of the latter pair's names, S and R, hint at sender and receiver respectively. The only disadvantage of the Hindu alternative is the name of Ravana, the man-in-the-middle, also begins with R, so there's potential confusion with receiver. Dr Parthasarathy acknowledges this point: "We propose Badmash (lit. bad man), although he is not part of Ramayana," he suggests.

The poetic Hindu alternative to traditional cryptography characters also has the benefit of adding Hanuman (honest man) as the trusted medium for carrying the message in a otherwise hostile environment. "When Hanuman approaches Sita and presents himself as Rama’s emissary, Sita does not believe him. She asks him to prove his credentials. Hanuman does this by presenting the ring which Rama usually wears. This may be compared to a digital certificate," Dr Parthasarathy added.

There are more neat analogies presented by the tale of Ramayana, and its application as a metaphor for cryptography. Dr Parthasarathy concluded:

Cryptography is a fairly complex subject. The number of entities involved, and the strategies they adopt are not easy to visualise. Teaching such a subject can be challenging, and requires the use of some innovative approaches and props. The "Alice and Bob" approach has a much better and more effective alternative: the "Sita and Rama" approach. Of course, analogies often involve some amount of exaggeration and distortion and limitations, and so, should be used with caution.

The Ramayana story may be widely known in India, but not in the West. Perhaps an alternative recasting could draw from Greek mythology - which, after all, lent the concept of the Trojan horse to information security. Maybe there's something in Jason and the Argonauts to forge an analogy to cryptography, though nothing immediately springs to mind.

Looking further afield, modern cryptographic technology essentially relies on complex mathematics, and Persian and Arab scholars made huge early contributions to the abstract science. As a tip of the hat, we could do worse than draw on Middle East folk tales and recast Bob as Aladdin and Alice as Princess Badroulbadour (perhaps better known as Princess Jasmine thanks to Disney) together with Ali Baba as the information-intercepting rogue. Admittedly we're mixing up characters from different yarns here.

Reg readers are invited to come up with their own analogies.

The storied history of Alice and Bob is explained by crypto-guru Bruce Schneier in this video. Eve's alternative point of view is illustrated in this XKCD cartoon strip. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.