Replay attack
Mallory
Alice and Bob
Adversary
Auguste Kerckhoffs
RSA
Cryptography
Cryptographic protocols
Public-key cryptography