See also: mallet

English

edit
 
A Norfolk & Western Mallet Class A 2-6-6-4

Etymology 1

edit

Derived from the name of the inventor, Swiss engineer Anatole Mallet.

Pronunciation

edit

Noun

edit

Mallet (plural Mallets)

  1. A type of articulated locomotive, in which there are two powered trucks, with the rear truck being rigidly attached to the main body and boiler of the locomotive, while the front powered truck is attached to the rear by a hinge, so that it may swing from side to side, and with the front end of the boiler resting upon a sliding bearing on the swinging front truck.
    • 1959, David P. Morgan, editor, Steam's Finest Hour, Kalmbach Publishing Co., page 60, referring to the Chesapeake & Ohio Railway:
      Its 50 H-7 2-8-8-2's (30 of which found their way onto the Union Pacific roster in 1945) were simple mainly because a tunnel in the Alleghenies would not accommodate the low-pressure cylinders of any Mallet larger than a 2-6-6-2.
    • 1961 July, J. Geoffrey Todd, “Impressions of railroading in the United States: Part Two”, in Trains Illustrated, page 419:
      Primarily a coal-hauling road from the mines of the Appalachian coalfield over the mountains to the Atlantic coast, the Norfolk & Western had long maintained that nothing could equal its superbly efficient articulated Mallet locomotives for the haulage of immense weights over mountain grades, and it continued to build steam locomotives in its shops at Roanoke until 1953.

Further reading

edit

Etymology 2

edit

Cryptographic scenarios use archetypal characters with standard names chosen to remember their role: Mallet was derived from "malicious" and "man-in-the-middle attack", as well as the tool mallet.

Proper noun

edit

Mallet

  1. (cryptography) Often the malicious party in examples of threat scenarios. See Alice and Bob.
    Synonym: Mallory
    • 1994, Bruce Schneier, Applied Cryptography[1], →ISBN, page 44:
      Even if Alice and Bob's public keys are stored on a datavase, this attack will work. Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob.

Further reading

edit

See also

edit

Anagrams

edit