stitcherLogoCreated with Sketch.
Get Premium Download App
Listen
Discover
Premium
Shows
Likes
Merch

Listen Now

Discover Premium Shows Likes

Explaining Cryptocurrency

2 Episodes

6 minutes | May 2, 2018
Alice and Bob
Intro Hello my friends. You are listening to the very first episode of “Explaining Cryptocurrency”. I am Jason Rigden and I am your host. Thank you so much for listening. On this episode we will be talking about the two of most famous people in cryptography. The pair have been working together for decades. The have worked with almost every cryptography researcher in the world. I am of course talking about, Alice and Bob. And the most interesting thing about Alice and Bob is that they are not even real people. But first let me tell you about "LiveOverflow". Interstitial This is not an paid advertisement. I don’t do those on this show. But, I do recognize the power of interstitials to punctuate a podcast episode. I’ll going to be doing short little recommendations, like this, to enable this punctuation. Are you interested in hacking and reverse engineering? Do you want to know more about how computer programs really work? Well there is a really cool YouTube channel called "LiveOverflow" that you should check out. There will be a link in the show notes. "LiveOverflow" has a bunch of videos about analyzing disassemble programs, memory leaks, fuzzing, and other hacking topics. I really love this channel. If you are looking for a YouTube channel about hacking, then I highly recommend checking out "LiveOverflow". Once again there will be a link to the channel in the show notes. Content Ok, back to Alice and Bob. If you are studying cryptocurrency, you need to study cryptography. And if you have studied cryptography you have probably noticed a strange pattern. The names of the people used in examples are always the same. The scenario goes something like this, "Alice wants to send Bob a secret message. So Alice uses Bob's public key to encrypt a message only he can read". Sounds straight forward. Using actual human names helps make the concepts seem less abstract. It is a bit better then saying, "A wants to send B a secret message. So A uses B's public key to encrypt a message only B can read". What is strange though is that everyone uses the same names. It is always Alice and Bob. It is never Ashley and Bruce. Or Adam and Bianca. Well it all started in 1978. An article was published by Rivest, Shamir, and Adleman. It was called, "A method for obtaining digital signatures and public-key cryptosystems". In it they wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem" This was new. Previously most cryptographers just used simple symbols to represent sender and receiver. Simple symbols like A and B. Cognitive load is a funny thing. Cryptography is a very complex topic. It takes quite a bit of mathematical knowledge just to understand how it works. Then there are long complex mathematical equations to understand. Yet people find that Alice is more memorable than A. For students especially, it helps with comprehension. It also helps us create a story. Humans love stories much more than abstractions. Although some might say that every story is an abstraction but that is a topic for another podcast show. So after 1978 the usage of Alice and Bob in academic papers steadily increased. And in 1988 a paper called, "Privacy Amplification by Public Discussion" by Bennet, Brassard, and Robert was published. In it the introduced a new character, Eve. Eve was an eavesdropper. While Alice and Bob are sending messages back and forth in our examples. Eve would be a passive attacker attempting to listen to those messages. Soon Alice, Bob, and Eve would be joined by a whole family of imaginary people. There would be Charlie, Grace, Heidi and many more. Each with their own special functions. For example Charlie is a third participant. So it would be Alice, Bob, and Charlie sending messages to each other. A, B, and C. Another example is Grace. Grace is a representative of the government. So Alice and Bob are sending messages back and forth but Grace has access to a government mandated back door. This lets Grace read all the messages. In real life many law enforcement agencies around the world want to have a back door into all encryption. Specifically, the FBI. They have been using fear tactics to lobby congress for decades. They want a software version of a golden key that will open any lock. Every legitimate cryptographer thinks this is a terrible idea. Anyhow, I'm not going to apologize for getting political here. It's impossible to talk about technology without talking about politics. Especially, when it comes to cryptocurrency. So, back to Alice and Bob and their cadre of associates. These imaginary characters are so popular that they have transcended academia and entered pop culture. Geek culture but pop culture none the less. They have appeared in comics like XKCD, there are t-shirts, and even rap songs. Folks have even written back stories about the pair. Like James Gordon's definitive biography of the pair in his, "After Dinner Speech". Links to these wonderful artifacts are in the show notes. It's funny how common tropes are in computer science. From Alice and Bob to Hello World to Foo Bar. There is an almost endless supply of these patterns. I wonder how long each one will last. And, what new ones are being created right now. I really doubt the originators of Alice and Bob had any idea there were creating a cultural touchstone. Yet here we are four decades later. Still talking about these imaginary people passing around secrets. Outro Well, that is the end of episode number 1. Thanks for listening. If you enjoyed this episode may I ask you for a favor. This is a brand new show and I would love to get topics ideas from my listeners. So please, if you would, send me some cryptocurrency topic that you would like me to talk about. My contact details are in the show notes. Once again this has been Explaining Cryptocurrency and I am Jason Rigden. I hope to talk to you again soon. Good Bye.   Contact Info:  @mr_rigden on twitter or jason@explainingcryptocurrency.net 
2 minutes | Apr 26, 2018
The Trailer
Welcome to the Explaining Cryptocurrency podcast.I’m Jason Rigden and I’ll be your host. This isn’t going to be another hour long cryptocurrency podcast where I interview some boring startup founder. I’m not gonna be talking about investing or trading crypto. And I’m not gonna be pushing any alt-coin pump and dumps. There are plenty of other people making those show. This show is going to be about teaching you how and why cryptocurrency and the blockchain work. I’m going to introduce a different concept in every episode. We are going to be exploring things like the byzantine generals problem, zk snarks, and public key encryption. I’m gonna to try to do this as simply as possible. I really want for this show to be understandable for the general public. The cryptocurrency revolution is going to affect everyone. And I really want to create a resource for non-technical people. Although techy people are welcome too. Hopefully, everyone listening will learn something. So, if you want to learn more about cryptocurrency, then this might be the show is for you. The episodes will be short and to the point. Probably less 15 minutes each. I am going to shoot for a twice weekly show. There’s not gonna be any advertisements on this show. And I’m not gonna ask for Patreon donations. This is a labor of love. I really believe in the power of cryptocurrency and the blockchain. And I think it is going to change everything. I’m just looking for some small way to contribute. And educating people is the path I have chosen. So I hope you’ll enjoy the upcoming episodes. And that they help you to understand this complex topic just a little bit better. Thanks for listening to this podcast trailer. If this show sounds interesting then, please subscribe. Once again, this has been the Explaining Cryptocurrency podcast and I am Jason Rigden. I hope to talk to you again soon. Goodbye.
COMPANY
About us Careers Stitcher Blog Help
AFFILIATES
Partner Portal Advertisers Podswag Stitcher Studios
Privacy Policy Terms of Service Your Privacy Choices
© Stitcher 2023