From Wiktionary, the free dictionary
Jump to navigation Jump to search
See also: mallet


A Norfolk & Western Mallet Class A 2-6-6-4

Etymology 1[edit]

Derived from the name of the inventor, Swiss engineer Anatole Mallet.



Mallet (plural Mallets)

  1. A type of articulated locomotive, in which there are two powered trucks, with the rear truck being rigidly attached to the main body and boiler of the locomotive, while the front powered truck is attached to the rear by a hinge, so that it may swing from side to side, and with the front end of the boiler resting upon a sliding bearing on the swinging front truck.
    • 1959, David P. Morgan, editor, Steam's Finest Hour, Kalmbach Publishing Co., page 60, referring to the Chesapeake & Ohio Railway:
      Its 50 H-7 2-8-8-2's (30 of which found their way onto the Union Pacific roster in 1945) were simple mainly because a tunnel in the Alleghenies would not accommodate the low-pressure cylinders of any Mallet larger than a 2-6-6-2.
    • 1961 July, J. Geoffrey Todd, “Impressions of railroading in the United States: Part Two”, in Trains Illustrated, page 419:
      Primarily a coal-hauling road from the mines of the Appalachian coalfield over the mountains to the Atlantic coast, the Norfolk & Western had long maintained that nothing could equal its superbly efficient articulated Mallet locomotives for the haulage of immense weights over mountain grades, and it continued to build steam locomotives in its shops at Roanoke until 1953.

Further reading[edit]

Etymology 2[edit]

Cryptographic scenarios use archetypal characters with standard names chosen to remember their role: Mallet was derived from "malicious" and "man-in-the-middle attack", as well as the tool mallet.

Proper noun[edit]


  1. (cryptography) Often the malicious party in examples of threat scenarios. See Alice and Bob.
    Synonym: Mallory
    • 1994, Bruce Schneier, Applied Cryptography[1], →ISBN, page 44:
      Even if Alice and Bob's public keys are stored on a datavase, this attack will work. Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob.

Further reading[edit]

See also[edit]