>In the history of cryptology, women tend to be either systematically excluded or reduced to objects.<p>This is probably true, but cryptography/theoretical computer science might be one area where women have better representation than in other subfields of hard sciences.<p><a href="https://en.wikipedia.org/wiki/Shafi_Goldwasser" rel="nofollow">https://en.wikipedia.org/wiki/Shafi_Goldwasser</a>, who invented a huge portion of modern crypto (zero-knowledge, set lower bound, doubly-efficient proofs, etc.)<p><a href="https://en.wikipedia.org/wiki/Irit_Dinur" rel="nofollow">https://en.wikipedia.org/wiki/Irit_Dinur</a>, who basically invented property testing as well as a novel proof of the PCP theorem that wasn't hundreds of pages long<p><a href="http://www.cs.utexas.edu/~danama/" rel="nofollow">http://www.cs.utexas.edu/~danama/</a>, also known for her work on the PCP theorem (wife of Scott Aaronson)<p><a href="http://elaineshi.com/" rel="nofollow">http://elaineshi.com/</a>, several papers on making ORAM and secure multiparty computation practical<p>Probably notable that the first three listed are all from/at the Weizmann Institute in Israel.
They used to say "Sex sells", but in 2017 it's "Sexism sells" (or "Diversity sells").<p>This is a perfectly well-written article with great content, but I don't know why the author has to bring up sexism etc.<p>If we didn't have "Alice and Bob" and instead had "Albert and Bob", the trolls would say "oh look at this there's no diversity! they are oppressing people by getting rid of female names from examples!".<p>But we DO have "Alice and Bob". Alice even comes BEFORE Bob. But look at how people make up sexism stories about how this is an "oppression", and Alice and Bob are a couple.<p>I have never thought of Alice and Bob as a couple. Maybe it's your sick mind who want to monetize sexism, that came up with that imagination.
The article's thesis might or might not be true (I don't think it is in the field of cryptography), but the article certain it doesn't provide anywhere near enough evidence to conclude that the trope of "Alice and Bob" is used to oppress people.<p>The article cites one presentation that a single researcher used as evidence that Alice and Bob are viewed as a couple, but I've seen enough crypto presentations to assert that most researchers don't view Alice and Bob as a couple in any way (in fact, many crypto presentations use Bob the builder and Lewis Carroll's Alice to represent Alice and Bob, and they certainly don't make a couple).
I remember meeting Bob Morris from NSA back in 1990. He was with his wife. I was bitterly disappointed that she was Anne and not Alice, but at least we got to play croquet.
I am not too happy with the timeline of the article. It seems to conflate RSA and DH exchanges, which are foundamentally different, although can (and are) used together.<p>If one doesn't know this already, it seems to imply that DH exchange led to inventing RSA... Mathematically and also practically they are independent.<p>Edit: To clairfy further: RSA and DH exchanges are not even that commonly used together as they serve two different purposes.<p>With RSA you have a key-pair (public and private) and you can write something with someone's public key that only the owner of a private key can read. This is called asymmetric encryption.<p>With a DH exchange you can establish a shared secred (usually, a shared key) on an untrusted channel without needing any previously shared data. The shared key can then be used to encypt further communication with symmetric encyption.
I find it weird that 'heteronormative' is now lumped in with 'sexist' when a hetero world view is literally 'normal' (as in, held by a significant majority).
Shame the article doesn't mention [1] - a relatively recent piece from a leading cryptographer, which contends that the use of Alice and Bob (especially with the usual caricatures) makes light of the impact of cryptographic vulnerabilities, and in doing so, makes them less obviously important. I'm not sure whether I fully agree with that viewpoint, but it does seem like an important question to discuss.<p>[1] <a href="http://web.cs.ucdavis.edu/~rogaway/papers/moral.pdf" rel="nofollow">http://web.cs.ucdavis.edu/~rogaway/papers/moral.pdf</a>
I've created a pretty nice combination of these names. "trevalmabo" (Trent,Eve,Alice,Mallory,Bob) - it reads "trust eavesdropping on man in the middle"