1323: Protocol

Explain xkcd: It's 'cause you're dumb.
(Difference between revisions)
Jump to: navigation, search
(Explanation: agree with JamesCurran in the discussion)
Line 15: Line 15:
 
The title text shows a more radical approach to the problem, for people who do not feel comfortable about lying. In this approach, you only make friends with people who have the appropriate names already.
 
The title text shows a more radical approach to the problem, for people who do not feel comfortable about lying. In this approach, you only make friends with people who have the appropriate names already.
  
In comic [[177: Alice and Bob]] these names are also used in the same context and we meet Eve.  
+
In comic [[177: Alice and Bob]] these names are also used in the same context and we meet Eve.
 +
 
 +
The title and the format of the conversation may also refer to {{w|Transmission Control Protocol}} (TCP), one of the key underlying protocols of the Internet. In TCP, every time you receive a packet of information, you must send a brief acknowledgement back, verifying that the packet was received. The computer scientist in the comic does the same thing verbally ("uh huh", et al).
  
 
==Transcript==
 
==Transcript==

Revision as of 17:22, 29 January 2014

Protocol
Changing the names would be easier, but if you're not comfortable lying, try only making friends with people named Alice, Bob, Carol, etc.
Title text: Changing the names would be easier, but if you're not comfortable lying, try only making friends with people named Alice, Bob, Carol, etc.

Explanation

Alice, Bob, and Eve are role names traditionally used in describing cryptographic protocols. Rather than talking about "Person A", "Person B", "Person C", names beginning with each letter are used instead. Eve is short for "eavesdropper" - a person trying to find out what's being said in the conversations between the other people. The classic situation involves Alice wanting to send a secret message to Bob, while Eve (the eavesdropper), attempts to read the message, ideally without Alice or Bob ever finding out. Additional participants such as Carol (Person C) can be added if necessary. The list of names has become very standardised over time as described at Alice and Bob.

The joke here is that any computer scientist, hearing the names used, will think that they are listening to a cryptography problem. By changing the names in a story to these role names, you can induce them to listen carefully to boring stories. The fewer the interesting details, the more it sounds like a general problem, so very boring stories are actually the easiest.

The title text shows a more radical approach to the problem, for people who do not feel comfortable about lying. In this approach, you only make friends with people who have the appropriate names already.

In comic 177: Alice and Bob these names are also used in the same context and we meet Eve.

The title and the format of the conversation may also refer to Transmission Control Protocol (TCP), one of the key underlying protocols of the Internet. In TCP, every time you receive a packet of information, you must send a brief acknowledgement back, verifying that the packet was received. The computer scientist in the comic does the same thing verbally ("uh huh", et al).

Transcript

[Cueball is telling a story to a Computer Scientist who is seated at his desk.]
Cueball: Alice sends a message to Bob saying to meet her somewhere.
Computer Scientist: Uh huh.
Cueball: But Eve sees it, too, and goes to the place.
Computer Scientist: With you so far.
Cueball: Bob is delayed, and Alice and Eve meet.
Computer Scientist: Yeah?
I've discovered a way to get computer scientists to listen to any boring story.
Comment.png add a comment!

Discussion

This is funny. I was really drawn into the conversation due to the names. 108.162.246.117 07:05, 29 January 2014 (UTC)

Me too! And I'm even more drawn to the meta-conversation!!  :) Nealmcb (talk) 13:30, 29 January 2014 (UTC)
But what about me? Alice and Bob get way too much time already.... Carol (whisper) 13:30 29 January 2014 (UTC)

Eve appears in 177: Alice and Bob --JakubNarebski (talk) 08:14, 29 January 2014 (UTC)

Heh. I was immediately reminded of the movie, Bob & Carol & Ted & Alice. http://www.imdb.com/title/tt0064100/ I wonder if that movie influenced the encryption names, or vice versa, or mere coincidence?108.162.216.72 12:31, 29 January 2014 (UTC)

I think the explanation looks complete to me. I vote to remove the tag. Jarod997 (talk) 14:04, 29 January 2014 (UTC)

Removed then. There was someone who asked for more Cryptography comic references. I found 14 and have thus made a new category (see link below). Feel free to add more if I have not found them all by searching on Cryptography and Encryption (I have only included those where there were some direct mention of these issues in the commic - or title text) and not just because there was mention of it in the explanation. However, the words does not have to appear in the commic before I included them. i.e. PGP. But also feel free to delete one from the list if I was too quick to include it Kynde (talk) 15:45, 29 January 2014 (UTC)

The description misses a key aspect of the comic. The conversation follows the pattern of a message being sent from Cueball to the Computer Scientist, with the CS sending an acknowledgement back and Cueball continuing --- much in the matter of an internet communication protocol, as referenced in the title. JamesCurran (talk) 17:06, 29 January 2014 (UTC)

Really excellent explanation. Complete, concise and well written, with some helpful notes in the comments. Keep up the good work! 108.162.219.58 18:43, 29 January 2014 (UTC)

I agree this would explain the protocol title, but how does it compute with the message at the bottom: I've discovered a way to get computer scientists to listen to any boring story? Kynde (talk) 18:55, 29 January 2014 (UTC)

The point is that Cueball tells a completely mundane and booooring! story (might be last evening's soap opera, for example), but by replacing the protagonist names with Alice, Bob and Eve, names commonly used in explanation of public key cryptography, he tricked the Computer Scientist into believing he describes some cryptography protocol, thus making him interested. Edheldil (talk) 10:22, 31 January 2014 (UTC)
By the way, what Cueball describes might very well be DNS cache poisoning -- or what NSA's supposed FOXACID servers do. Edheldil (talk) 10:31, 31 January 2014 (UTC)

I believe the essence of this story is in the encryption aspect, not the TCP. Many protocols feature a message-and-reply type of structure, it's not unique to TCP. The alternative to having CS reply to each phrase is to have him not reply to each phrase, which would be boring and not really indicate what's going on in CS's head. As some cryptography problems can be complex they are sometimes stated in "chunks" so people can follow along more easily (See the Description section of the link). In trying to follow what might be a complex problem sometimes people will acknowledge that they understand each part in turn - weather for their own benefit or that of the problem stater. Jarod997 (talk) 21:04, 29 January 2014 (UTC)

Found it: Bruce Schneier, a notable modern Cryptographer has published a number of cryptography books in which he routinely references characters such as Alice, Bob, and Eve. Jarod997 (talk)
Also: TCP/IP doesn't necessarily ack every packet, it can also ack multiple packets in one go. This allows for a much larger throughput as the latency per packet goes down to zero. Kaa-ching (talk) 09:33, 30 January 2014 (UTC)
Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox

It seems you are using noscript, which is stopping our project wonderful ads from working. Explain xkcd uses ads to pay for bandwidth, and we manually approve all our advertisers, and our ads are restricted to unobtrusive images and slow animated GIFs. If you found this site helpful, please consider whitelisting us.

Want to advertise with us, or donate to us with Paypal or Bitcoin?