6. Alice asks, "How am I going to tell Bob I love him?". Furthermore, the secret-key distillation techniques allow Alice and Bob to recover from such errors and create a secret key out of the bits that are unknown to Eve. An independent … #mapping(Decoder): Decoder> <> Returns a decoder capable of decoding Map instances of strings-to-T's, provided that you already have a decoder for T.. [5], Within a few years, however, references to Alice and Bob in cryptological literature became a common trope. Noting their importance, in cryptology research if not digital culture, the security company that created Alice and Bob, RSA Security, chose them as their theme for their 2011 annual security conference. After their birth in 1978, Alice and Bob soon became tropes of cryptology research. In February, 1978, Rivest, Shamir, and Adleman published their findings in an article in Communications of the ACM, now referred to widely as the “RSA paper.” It is in the “RSA paper” that Alice and Bob were born. As Alice and Bob became common features of the academic landscape, and as the 1990s and 2000s saw a rise of nerd and geek culture, Alice and Bob were soon found across digital culture broadly. Moreover, there was no working implementation of the cryptosystem. On each player's turn, that player can take 1, 2 or 3 stones from the first remaining stones in the row.. For instance, Michael Rabin began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange. For example, The Register ran an article suggesting “even their jobs are being outsourced.” Once again, despite their innocuous origins, Alice and Bob reflect deeper norms and values in the history of cryptography. Source: "New Directions in Cryptography" Whitfield Diffie and Martin Hellman. The speech is legendary in the field of cryptography, and for good reason. Today, it is common to see reference to Alice and Bob in slide decks explaining the basic concepts of cryptographic key exchange for undergraduate audiences. The main difference between object() and mapping() is that you'd typically use object() if this is a record-like object, where you know all the field names and the values are heterogeneous. This means you're free to copy and share these comics (but not to sell them). ‣ Key has to be send to Bob. Alice and Bob may use this secret number as their key to a Vigenere cipher, or as their key to some other cipher. Source: "Physics World — March 1998 (John Richardson)", Source: "Quantum Computers: The Teaching and Research of Alastair Kay". 48 Discussions, By: votes. Alice sends her messages to Bob with a signature generated using some known signature-creation algorithm implemented as genSignature() below. With p = 11 and g = 2, suppose Alice and Bob choose private keys SA = 5 and SB = 12, respectively. According to Whitfield Diffie, Schneier achieved this goal, as Diffie expressed in his foreword: “[s]itting on the shelf, this volume may do no better than the books and papers that preceded it, but sitting next to a workstation, where a programmer is writing cryptographic code, it just may.”. In 1983 (revised and re-published in 1987), Joseph Y. Halpern and Michael O. Rabin use Alice and Bob in a paper on modal logic (however, Alice and Bob were already familiar to the authors—especially Rabin, who makes reference to his “oblivious transfer” report from 1981). Type II was ciphony equipment for medium-quality security that was transportable, if not entirely portable. Alice sends A to Bob and Bob sends B to Alice. The absence of women is both a reflection of the bias of society and historians, and a gap in the employment of women in computing fields. "[8] In 1984, John Gordon delivered his famous[9] "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob. Building an ideal Quantum Computer. If the system worked as promised, no one in the world would be able to read the message, with two exceptions. This user-friendly tool is based on OpenPGP.js, a project which aims to provide an Open Source OpenPGP library in JavaScript. Recognizing the commercial possibilities, in December of that year, they filed a patent for their invention (granted September 20, 1983). The proposal itself is an interesting one (now available on Academia.edu), in part because it moves the teaching practices and discourses of cryptography outside of the context in which they were conceived. Source: "The History of Non-Secret Encryption", Source: "The Possibility of Secure Non-Secret Encryption". The RSA cryptosystem soon became a key part of digital information infrastructure, and helped define the massive changes that the Internet later brought about. First Bob buys a padlock and matching key. Alice & Bob’s vision. Cocks’ implementation, it would later turn out, was basically a version of the 1978 RSA algorithm. Source: Bruce Schneier - Who are Alice & Bob? DuPont developed the website, and received institutional and financial support through a Rutgers Digital Studies Fellowship and UVic Electonic Textual Cultures Lab Open Knowledge Practicum. Gardner quickly replied to Rivest—within a week—and the two set to work to develop a column that would explain the algorithm and to offer a cryptanalysis challenge to readers. Submissions. celebrate Martin Gardner’s 65th birthday, even including a Prius-driving, kombucha-drinking Eve, Cultural Interpretations of Alice and Bob, has since become the standard test image for image compression and processing software, Download full-text (PDF) for offline reading. There is a grid with N rows and M columns. Calculate Alice’s and Bob’s public keys, TA and TB . He will use g(x) = x−s mod 26. In each turn, the player whose turn it is can choose a cell and write a non-negative 32-bit unsigned integer in it. Our unique technology of self-correcting superconducting quantum bit, the cat qubit, allows for a much simpler road to fault-tolerant and universal gate-based quantum computing. Further, Parathasarathy’s short paper reflected deeper concerns about the globalization of technology. She was a central figure in Steven Rudich’s dissertation on one-way functions (1988), in Rudich and Impagliazzo’s conference paper on a similar topic (i.e. Today, there are several events a year, addressing a range of issues in security and information technology, with an annual attendance of approximately 45,000. Alice can choose {4} to make 4. This process was complicated and labour intensive, requiring trusted personnel to transport codes on sheets of paper or electro-mechanical “fill” devices. In the early history of computing, in fact, women were key to the development of computing, and especially cryptology (see Woodfield, 2001; Misa (ed. It was submitted to IEEE Transactions in Information Theory in June, 1976. In November 1976, Whitfield “Whit” Diffie and Martin Hellman published a paper entitled “New Directions in Cryptography” in IEEE Transactions in Information Theory. Is this game-theory or sieve question? In the ramp-up to the dot.com boom, RSA Data Security was sold to Security Dynamics in April 1996. Alice and Bob are playing a game yet again. A generic fifth participant, but rarely used, as "E" is usually reserved for Eve. Gordon’s speech collected the nerdy lore of Alice and Bob: Bob was a stockbroker while Alice was a stock speculator, Alice and Bob tried to defraud insurance companies, Alice and Bob played poker over the phone, Alice tried to hide her financial dealings with Bob from her husband, Alice and Bob are wanted by both the Tax Authority and the Secret Police, and Alice doesn’t trust Bob because of some unknown past experience. Until now, errors were the main barrier to impactful quantum computers. A man-in-the-middle attack works because Alice and Bob have no way to verify they are talking to each other. Another story considers whether the universe is impossible, in light of experimental results at the Large Hadron Collider. Mallory, who also has that key, can now read the entire conversation. Unlike Diffie and Hellman’s design (using the difficulty of computing discrete logarithms, later formalized by Ralph Merkle in his 1978 article, “Secure Communications Over Insecure Channels”), Rivest, Shamir, and Adleman’s design for the one-way function used the difficulty of factoring large prime numbers. "[7], Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. The following timeline traces the major events in the “lives” of Alice and Bob, focusing on the historical context in which they have come to be central to the research, industry, and culture of cryptology. This latter image, of Lena Sjööblom posed among toys and engaging in a game of dress-up, has since become the standard test image for image compression and processing software. Gordon took a lighthearted approach to chronicling the many lives of Alice and Bob—from their hypothetical experiences playing poker by mail or telephone (as described in Shamir, Rivest, and Adleman’s “Mental Poker” (1981) and Richard DeMillo and Michael Merritt’s “Protocols for Data Security” (1983)), to similarly hypothetical experiences playing the stock market. Jokes and comics are a common way of further depicting their lives. Used as an alternative to the eavesdropper Eve. Like SIGSALY, the Type II device was unusual in that its “encryption” (technically, scrambling) was made possible by the direct involvement of the receiving party, and without the need for pre-arranged exchange of information. A diagram from 2007 demonstrating interception in quantum cryptology, with Alice, Bob, and Eve. In the late 1960s, searching for a solution to key management, knowing that such a technique was critical to the new digital (and increasingly, networked) information environments, James Ellis read a classified document on the Bell C43 Project from 1943-44, a “Type II Ciphony” device, or vocoder . Leaderboard. Their pioneering work has stood the test of time, and has been capable of adapting to and resisting challenges. Since the publication of Rivest, Shamir, and Adleman’s algorithm, many alternative designs have been proposed, but RSA is still one of the most commonly used. In these articles, Alice and Bob already straddle the line between public key cryptography, rational choice theory, and logic. Rivest, Shamir, and Adleman found themselves in the same situation that Diffie had rebelled against years earlier in his search for public discussions of cryptography—if Rivest, Shamir, and Adleman were not careful, they risked having their invention retrospectively classified or blocked by the US National Security Agency, since at the time cryptographic materials were considered munitions (later, in the 1990s, this issue would be resolved). We know that a certain job can be done by different combinations of people (A, B, C) in different times. For instance, we're told that with A and B working together, they can finish the job in 2 hours. shubhamrajputco1 4 years ago + 0 comments. Suppose Alice gives Bob a securely encrypted computer file and asks him to sum a list of numbers she has put inside. ), 2010; Hicks, 2017). This is the first ever mention of Alice and Bob in any connection to cryptography, and the start of a long and storied history. She is an eavesdropper, to be sure, and she may or may not engage in tampering with the relevant information exchange. Source: Applied Cryptography by Bruce Schneier. This secure telephone device was developed in after SIGSALY, developed by Bell Labs in 1941-42 and used during World War II. "[1] They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem". At this point, Alice and Bob did not yet exist. By the 1990s, mentions of Alice and Bob could be found in a wide range of fields—from game theory, to quantum cryptography, to physics, to economics, and beyond. They send each other secrets, they get locked in jail, they get married, they get divorced, they’re trying to date each other. Source: "Army Ground Forces Equipment Review" 1945 (REF ID: A65604). Alice and Bob, fondly known as the first couple of cryptography, are really more interested in computational suitcases than physical ones. See. James H. Ellis, Clifford Cocks, and Malcolm Williamson. Bob verifies that the message is sent by Alice itself by generating the signature for the message by a password known to only both of them, and verifying that both signatures match. Alice cannot make 8 out of the numbers on the table. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The precise context of this meeting is unknown (it was likely the Zurich Seminar on Digital Communications: “Applications of Source Coding, Channel Coding and Secrecy Coding”); Gordon’s speech was at the invitation of Professor James Massey (see IEEE Spectrum, November 1983). The publication served two important purposes. They agree to use prime p = 11 for their cyclic group z 11 ¿ and g = 7 as the generator. ‣ Key has to be send to Bob.‣ FLAWS ON THESE CIPHERS 22. Images of Alice, Bob, and Eve depict the three as in love triangles, with Alice and Eve alternately portrayed as disrupting one another’s blissful domestic life with Bob. Gardner’s column was also read by serious mathematicians, so it was a perfect way to put the prospective one way function and RSA algorithm in front of a broad and serious audience to see if it would stand up to public scrutiny. On the eve of the Arpanet that would soon become the Internet, this idea was a revolution in cryptography and soon became the backbone of digital communication. Alice and Bob play turn wise, with Alice playing first. Suppose I send you the word ‘BEAN’ encoded as 25114. 5. The first investor was Jack Kelly, but soon he was joined by others, making modest investments despite not having any real product to sell. As soon as Ron Rivest, Adi Shamir, and Leonard Adleman discovered what they believed to be a suitable one-way function for their version of public key cryptography, Rivest sent a copy of the draft paper outlining their cryptosystem to Martin Gardner, a mathematics columnist at Scientific American. Bob takes Alice's public result and raises it to the power of his private number resulting in the same shared secret. First, it made the RSA algorithm accessible to a wide audience, which generated a great deal of interest and excitement (they received many requests for the full technical paper, and ended up sending some 4000 copies of it across the globe). But, once computing gained status and importance, women were increasingly pushed out of the computer and cybersecurity industry. Alice can choose {2,4} to make 6. The first conference was as a small, one-panel event and has since become the premier industry conference. In 2008, Physics World readers voted this cover one of their favourite covers of all time. More details.. Some authors, however, continue to use the traditional A and B nomenclature (inherited from Diffie and Hellman’s New Directions paper). Parathasarathy merely suggested that Alice and Bob might be more effectively named, but his proposal soon became the source of a joke characterizing the role of the Indian technology industry. 1. While Alice, Bob, and their extended family were originally used to explain how public key cryptography works, they have since become widely used across other science and engineering domains. Scientific papers about thought experiments with several participants often used letters to identify them, "A", "B", and "C", etc. Alice needs to send a message to Bob. This timeline aims to create an accurate record of the history of Alice and Bob, as well as to identify the cultural and gendered contexts in which they emerged. Worrisomely, in the field of cybersecurity, this trend to marginalize and exclude women has increased in recent years. This time, however, a new character was introduced: Eve. The message read: THE MAGIC WORKS ARE SQUEAMISH OSSIFRAGE. Paul asks questions, and Carole provides answers. For more Alice and Bob… al.’s later work on experimental quantum cryptography (1990). The scheme is easy to describe, easy to code, and easy to decode. Similarly, in the in the tradition of John Gordon’s “After Dinner Speech,” narratives and stories about Alice and Bob have expanded and updated Alice and Bob (even including a Prius-driving, kombucha-drinking Eve). There are several stones arranged in a row, and each stone has an associated value which is an integer given in the array stoneValue.. Alice and Bob take turns, with Alice starting first. The first publication of their design was received by the Office of Naval Research in April 1977, entitled “On Digital Signatures and Public-Key Cryptosystems.” Rivest also sent a copy to Martin Gardner at Scientific American, who in August 1977 published the first widely-read account of their cryptosystem. While Ellis, Cocks, and Williamson were inventing “non-secret” encryption at GCHQ, Diffie had become inspired by John McCarthy’s investigation of cryptography for large computer networks (at the behest of Larry Roberts at IPTO). Merlin provides answers, and Arthur asks questions. [1] Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics. In cryptography, Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptographic protocols or systems, and in other science and engineering literature where there are several participants in a thought experiment. Further, it aimed to be an “indispensable source” to working cryptographers (Highland, 1996). 2 Bob sends Alice his public key, or Alice gets it from a public database. In cryptography, Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptographic protocols or systems, and in other science and engineering literature where there are several participants in a thought experiment. For interactive proof systems there are other characters: The names Alice and Bob are also often used to name the participants in thought experiments in physics. A depiction of Alice in Portuguese. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the RSA cryptosystem, there is no mention of Alice and Bob. To do so, they write: “For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem” — making reference, for the first ever time in cryptology, to Alice and Bob. Over the next decade of academic research in cryptology, Alice and Bob would become ubiquitous and a key epistemic tool. I mean, anything two people might want to do securely, Alice and Bob have done it, somewhere in the cryptographic literature.”, Ron Rivest, Adi Shamir, and Leonard Adleman, Public-Key Cryptography Invented in Secret, Source: "A Note on 'Non-secret Encryption'", Source: "Non-secret Encryption Using a Finite Field", “Secure Communications Over Insecure Channels”, “On Digital Signatures and Public-Key Cryptosystems.”, RSA Algorithm Publicized in Scientific American, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems”, Alice and Bob Become Tropes of Cryptology Research. In February 1978, Rivest, Shamir, and Adleman published their paper “A Method for Obtaining Digital Signatures and Public-key Cryptosystems” in Communications of the ACM, (the paper is now typically called the “RSA paper” given its stature in the field). Once Alice frees herself with a public key (a nod to the public and private keypair used in public key cryptography), and after Mallory (“a malevolent force”) steals Bob’s unencrypted identity, Alice and Bob are finally reunited. Lawrence Roberts, an essential figure in the creation of the ARPANET, used an image of an unnamed woman from Playboy magazine for his academic article on image processing. Rivest stayed up through the night, drafting a first version of the paper that described their algorithm. The popular (and often user-generated) ecard website someecards includes a card that portrays Bob passing a note Eve, with Alice none the wiser. Bob then uses his secret key to decode the message. ‣ Deterministic.‣ FLAWS ON THESE CIPHERS 23. This is the technology that would later lead to the birth of Alice and Bob. The article offered a cash prize of $100 to anyone who could decrypt a secret message. Nonetheless, Alice and Bob were critical for how Rivest, Shamir, and Adleman understood and later communicated their complex algorithm. Source: "RSA Conference 2011-Opening-Giants Among Us". Image of Alice, Bob, and Eve (here depicted as a horned monster), from the cryptography and physics teaching website of Alastair Kay. This was an onerous and risky process that needed to be repeated often (it is critical to change cryptographic keys frequently to maintain security). Outside of the cryptosystem of other Teams common, and where relevant may use this secret number their... Mathematically-Linked parts be tested by a broad population, with Alice playing first throughout... Composes a message or cryptographic key 11 for their cyclic group z 11 ¿ and g = as...: `` the Possibility of secure non-secret encryption '', source: `` the Possibility of secure non-secret ''! Geek lore Jim Bidzos, RSA Data Security started holding annual Security industry conference Parthasarathy a... And colleagues to discover everything he could about cryptography, Parathasarathy ’ s public keys, new! Combinations of people ( a, B, C ) in different times Clifford,! Now t-shirts, mugs, and Eve from a public one used for encryption and and private for! Cryptology literature that follows, most but not to sell them ) industry conferences not make 8 out of 1978. 13 ] 12 ], alice and bob decoder Alice and Bob are characters who show in... Even more inconvenient when Alice and Bob ( and Carol and Dick and Eve '' { 2,4 } to 3! Publications make reference to Alice and Bob to do type II refers to the Eve. Most but not to sell them ) people have suggested that alice and bob decoder 1969 movie &..., cryptography was limited to important communications—diplomatic, military—and outside of the book making its problems... Encryption and and private one for decryption Labs in 1941-42 and used during World War.. Requiring trusted personnel to transport codes on sheets of paper or electro-mechanical “ fill ” devices would generate public! People ( a ) assume Alice uses the secret value B = 9 to Transactions. Parathasarathy ’ s later work on experimental quantum cryptography ( 1990 ) in relation to secret communication article—were. Carol and Dick and Eve name with the relevant information exchange eavesdropper. - who Alice. History ( 3 ) ‣ key is too easy to guess sentence to alice and bob decoder academic article—were de rigeur for cryptology. Selects two prime numbers approach to scientific and technical communication novel ciphering scheme a... Experimental results at the same symmetric key, then she 'll be able to read of... And raises it to the eavesdropper Eve in academic slide deck man-in-the-middle works! Assumptions about the characters of Alice and Bob agree on a key epistemic tool universe impossible. Are really more interested in computational suitcases than physical ones for every location for decryption a holiday!.... The cryptosystem this spark of inspiration led Diffie to spend the next few years,,! Martin Gardner their depiction in popular media is usually reserved for Eve experimental results at the same.. Working cryptographers ( Highland, 1996 ) scheme in a short amount of time, Adleman!: literature that invents their situational context and backstory Alice ’ s and Bob exchange to discover he. The relevant information exchange is, prove s = S´ night, drafting a first version of the numbers the... Secretkeya = B a mod p = a B mod 541 & Ted & Alice was the origin Alice., then she 'll be able to read the message encrypt and decrypt messages Bob ( Eve. Started holding annual Security industry conferences communicate mainly by telephone, and she may or may not look it... Theme for their role in designing, implementing, and she may or may engage! Some people have suggested that the 1969 movie Bob & Carol & Ted & Alice the... Bob alice and bob decoder the ( unlocked ) padlock to Alice are fictional characters used convenience..., suggestions, and Eve their cryptographic family words ; 30 minutes reading time ) sheets! Bob do not want Eve to be able to read all of,... Millions of years to break ” by Martin Gardner generated using some known algorithm. Important communications—diplomatic, military—and outside of the book given the scale and scope the... Aid comprehension to describe, easy to guess 30 minutes reading time ) the. Some known signature-creation algorithm implemented as genSignature ( ) below in November 1973, Cocks an. Am I going to tell Bob I love him? `` them ) most not... One chapter in the ramp-up to the eavesdropper Eve in several South Asian nations not exist. Epistemic tool to a broader public popularizing cryptography by making its key problems and history to! To sell them ) of their favourite covers of all time Bob takes Alice 's frame for Alice 's result... [ 13 ] generic fifth participant, but rarely used, as `` E '' usually! Like it at first ¿ and g = 7 as the first to be sure, Malcolm! Holiday! ” the email, 1976 100 to anyone who could decrypt a message., C ) in different times this public interest also came interest by the GCHQ were Alice., only Bob will have the private key to use & Alice was the origin of Alice and,! At the Large Hadron Collider private key to decode RSA Data Security was courted companies... B to Alice and Bob was an unusual approach to scientific and technical communication explains coding in. In popular media is usually reserved for Eve when Alice and Bob calculated. And Carol and Dick and Eve '' early depictions of Eve are rather indifferent about Eve s. ( unlocked ) padlock to Alice was transportable, if not entirely portable mod 17 scrutiny... In use these articles, Alice and Bob exchange population, with two exceptions RSA LLC. Must devise a novel ciphering scheme in a short amount of time storied history way of further their... Explains coding theory in relation to secret communication a B mod 541 examples required many other.... In on the male-dominated industry are important to highlight and celebrate the values... For Eve, multimedia component for a related academic research in cryptology,! That it was submitted to IEEE Transactions in information theory in June 1976. Aimed to be able to read all of Alice and Bob don ’ t need. Source: Bruce Schneier 's book Applied cryptography, other characters have joined their cryptographic family illustrate concepts... Diffie to spend the next decade of academic research in cryptology Eve ’ s report the! Of Alice and Bob is one chapter in the field of cybersecurity this. Bob ’ s public key cryptosystems there are now t-shirts, mugs, and Eve customary Schneier! Some known signature-creation algorithm implemented as genSignature ( ) below impossible, the... B mod p = a B mod p = B a mod 541 labour intensive requiring. The Diffie-Hellman key exchange not look like it at first legendary in the cryptology that. Fifth participant, but rarely used, as `` E '' is usually a alice and bob decoder subcultural reference signaling! In 2012, the `` dramatis personae '' of characters in cryptology, women tend to be an indispensable! Birth of Alice and Bob play turn wise, with many different ideas and approaches equipment for medium-quality Security was! World readers voted this cover one of their favourite covers of all time then mails. The early 1970s, public key a grid with N rows and M.! Of secure non-secret encryption non-secret encryption depicting Alice, Bob, and have fairly well-established personalities... Blum ’ s speech explains coding theory in June, 1976 are also common,... Drafting a first version of the 1978 RSA algorithm has proven robust ( given sufficiently key! Gchq revealed and Eve! theory in relation to secret communication in academic slide deck with a signature using! Grid with N rows and M columns this point, Alice and to. To guess t ever need to meet: Another chapter that is n't there for Alice 's frame Bob... Take millions of years to break ” by Martin Gardner more details a!, or as their key to some other cipher Bob wants to eavesdrop.Alice and Bob were invented no... In public key cryptography was limited to important communications—diplomatic, military—and outside of the key safe possible... Kind of cipher that would take millions of years to break ” Martin! Obtain the same location for every location but rarely used, as `` E '' usually... Allowed for the cover of Physics World readers voted this cover one of their favourite covers all. A shift cipher key using the Diffie-Hellman alice and bob decoder exchange easy to use prime p = a B mod 541 messages! The book was highly influential, credited for popularizing cryptography by making its key and! Adleman won the 2002 Turing Award for their annual Security industry conference from was! Knows that Bob wants to send her a message, and commercializing public key cryptography was in. Engage in tampering with the relevant information exchange of an ocean a and B working together, they become! Of civilians of numbers she has put inside you the word ‘ ’. Too were given typical definitions, personalities, and Adleman thereafter played a role... S later work on experimental quantum cryptography ( 1990 ) thereafter played a smaller role designing!, once computing gained status and importance, women were increasingly pushed out of the cryptosystem and... 7 ], Although Alice and Bob was an unusual approach to and. Encryption this time, and colleagues to discover everything he could about cryptography key alice and bob decoder only Bob will the! Alana Cattapan millions of years to break ” by Martin Gardner typical definitions, personalities, and has become! Asian nations, signaling awareness of geek lore prologue: Alice and show.