{"id":2702,"date":"2017-11-01T12:18:17","date_gmt":"2017-11-01T11:18:17","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=2702"},"modified":"2017-11-01T12:18:17","modified_gmt":"2017-11-01T11:18:17","slug":"le-chiffrement-decrypte-par-next-inpact","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2017\/11\/01\/le-chiffrement-decrypte-par-next-inpact\/","title":{"rendered":"Le chiffrement d\u00e9crypt\u00e9 par Next INpact"},"content":{"rendered":"<p>En d\u00e9cembre 2016, Next Inpact consacrait un article au chiffrement des donn\u00e9es avec la p\u00e9dagogie qui caract\u00e9rise cet excellent journal en ligne.<\/p>\n<p><!--more--><\/p>\n<p>On y retrouve des explications sur l&#8217;importance du chiffrement (le mythe du &#8220;je n&#8217;ai rien \u00e0 cacher), de pertinentes r\u00e9f\u00e9rences et d\u00e9finitions :<\/p>\n<ul>\n<li><strong>Chiffrer<\/strong> : rendre un document illisible avec une clef de chiffrement, except\u00e9 pour son destinataire<\/li>\n<li><strong>D\u00e9chiffrer<\/strong> : rendre lisible un document chiffr\u00e9, en ayant connaissance de la clef de chiffrement<\/li>\n<li><strong>D\u00e9crypter<\/strong> : rendre lisible un document chiffr\u00e9, sans avoir connaissance de la clef de chiffrement<\/li>\n<li><strong>Cryptologie<\/strong> : cette science du secret regroupe plusieurs disciplines :<br \/>\n&#8211; <strong>Cryptographie<\/strong> : vise \u00e0 \u00e9tudier comment prot\u00e9ger par le chiffrement<br \/>\n&#8211; <strong>Cryptanalyse<\/strong> : vise \u00e0 analyser les m\u00e9thodes de chiffrement pour les casser<\/li>\n<li><strong>Chiffrement sym\u00e9trique<\/strong>\u00a0: on utilise une clef de chiffrement unique,\u00a0 en g\u00e9n\u00e9ral d&#8217;une longueur de 128 \u00e0 512 bits. Elle permettra \u00e0 la fois de chiffrer le document puis de le d\u00e9chiffrer (ex. : chiffrement d&#8217;un disque dur)<\/li>\n<li><strong>Chiffrement asym\u00e9trique<\/strong>\u00a0: lorsque vous voulez prot\u00e9ger des documents qui sont destin\u00e9s \u00e0 des tiers, on fait appel \u00e0 des algorithmes dit asym\u00e9triques qui n\u2019utilisent pas une clef de chiffrement unique, mais une paire de clefs, l\u2019une publique, l\u2019autre priv\u00e9e, afin d&#8217;en limiter l&#8217;acc\u00e8s au destinataire et en garantir l&#8217;int\u00e9grit\u00e9.<\/li>\n<\/ul>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2017%2F11%2FRGS_v-2-0_B1.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/11\/RGS_v-2-0_B1.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 949KB)<\/a><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"1110\" height=\"625\" src=\"https:\/\/www.youtube.com\/embed\/8BM9LPDjOw0?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=fr-FR&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"1110\" height=\"625\" src=\"https:\/\/www.youtube.com\/embed\/nQU_jHVoj2M?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=fr-FR&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"1110\" height=\"625\" src=\"https:\/\/www.youtube.com\/embed\/hbkB_jNG-zE?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=fr-FR&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.nextinpact.com\/news\/99777-chiffrement-notre-antiseche-pour-expliquer-a-vos-parents.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.nextinpact.com\/news\/99777-chiffrement-notre-antiseche-pour-expliquer-a-vos-parents.htm<\/a><\/p>\n<p><a href=\"https:\/\/www.ssi.gouv.fr\/particulier\/bonnes-pratiques\/crypto-le-webdoc\/cryptologie-art-ou-science-du-secret\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ssi.gouv.fr\/particulier\/bonnes-pratiques\/crypto-le-webdoc\/cryptologie-art-ou-science-du-secret\/<\/a><\/p>\n<p><a href=\"https:\/\/ssd.eff.org\/fr\/module\/une-introduction-au-mod\u00e8le-de-menace\" target=\"_blank\" rel=\"noopener\">https:\/\/ssd.eff.org\/fr\/module\/une-introduction-au-mod\u00e8le-de-menace<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En d\u00e9cembre 2016, Next Inpact consacrait un article au chiffrement des donn\u00e9es avec la p\u00e9dagogie qui caract\u00e9rise cet excellent journal en ligne.<\/p>\n","protected":false},"author":1,"featured_media":2704,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,16],"tags":[67],"class_list":["post-2702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-donnees-personnelles","tag-anssi"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/11\/medium-163493.png?fit=798%2C330&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-HA","jetpack-related-posts":[{"id":5842,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/22\/chiffrement-et-securite-des-donnees-dans-le-cloud\/","url_meta":{"origin":2702,"position":0},"title":"Chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud","author":"Fred","date":"22 janvier 2024","format":false,"excerpt":"La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud. La s\u00e9curit\u00e9 est indispensable pour apporter la confiance dans la gestion des donn\u00e9es personnelles de l\u2019entreprise. En 2022, pr\u00e8s d\u2019un tiers des sanctions de la CNIL visaient des manquements aux obligations de s\u00e9curit\u00e9.\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6567,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/04\/24\/cryptographie-post-quantique\/","url_meta":{"origin":2702,"position":1},"title":"Cryptographie post-quantique","author":"Fred","date":"24 avril 2025","format":false,"excerpt":"\u00c0 ce jour, le chiffrement traditionnel des donn\u00e9es est g\u00e9n\u00e9ralement suffisant pour maintenir des communications s\u00e9curis\u00e9es dans la plupart des configurations de cybers\u00e9curit\u00e9. Cependant, l\u2019essor de l\u2019informatique quantique repr\u00e9sente une menace pour les algorithmes cryptographiques traditionnels. D'ici 2029, les progr\u00e8s de l'informatique quantique rendront la cryptographie conventionnelle dangereuse \u00e0 utiliser.\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/04\/Cryptographie-quantique-scaled.png?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/04\/Cryptographie-quantique-scaled.png?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/04\/Cryptographie-quantique-scaled.png?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/04\/Cryptographie-quantique-scaled.png?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/04\/Cryptographie-quantique-scaled.png?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1065,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/05\/une-charte-avec-les-fai-francais-pour-le-chiffrement-des-flux-emails\/","url_meta":{"origin":2702,"position":2},"title":"Une charte avec les FAI fran\u00e7ais pour le chiffrement des flux emails","author":"Fred","date":"5 octobre 2015","format":false,"excerpt":"Axelle Lemaire vient d\u2018annoncer en milieu de matin\u00e9e \u00ab la signature d\u2019une charte entre les op\u00e9rateurs fran\u00e7ais pour le cryptage des boites email \u00bb. Cependant, l\u2019engagement qui concerne le transport des messages, ne devrait pas contrarier les interceptions l\u00e9gales, selon les v\u0153ux de l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1415,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/11\/17\/attentats-aux-etats-unis-edward-snowden-et-le-chiffrement-accuses-detre-responsables\/","url_meta":{"origin":2702,"position":3},"title":"Attentats : aux \u00c9tats-Unis, Edward Snowden et le chiffrement accus\u00e9s d\u2019\u00eatre responsables","author":"Fred","date":"17 novembre 2015","format":false,"excerpt":"Alors que la France se pr\u00e9pare \u00e0 faire \u00e9voluer sa constitution pour l\u2019adapter au contexte douloureux des \u00e9v\u00e8nements du 13 novembre, certains officiels am\u00e9ricains n\u2019ont pas tard\u00e9 \u00e0 r\u00e9agir sur la trag\u00e9die en d\u00e9signant une cible toute trouv\u00e9e : Edward Snowden. Le lanceur d\u2019alerte est accus\u00e9 d\u2019avoir permis aux terroristes\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1475,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/11\/24\/a-ceux-qui-diffusent-les-chiffres-de-letat-durgence\/","url_meta":{"origin":2702,"position":4},"title":"\u00c0 ceux qui diffusent les chiffres de l&#8217;\u00e9tat d&#8217;urgence","author":"Fred","date":"24 novembre 2015","format":false,"excerpt":"Aux derni\u00e8res nouvelles, il y aurait 1 072 perquisitions, 253 assignations \u00e0 r\u00e9sidence, 201 armes trouv\u00e9es, 117 gardes \u00e0 vue et 77 cas de d\u00e9couverte de stup\u00e9fiants\u2026 Apr\u00e8s les attentats du 13 novembre, ces chiffres alimentent quotidiennement les m\u00e9dias. Une bonne occasion de rappeler quelques fondamentaux. http:\/\/www.nextinpact.com\/news\/97437-a-ceux-qui-diffusent-chiffres-etat-durgence.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":844,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/10\/chiffres-cles-le-marche-francais-de-la-musique-sur-internet\/","url_meta":{"origin":2702,"position":5},"title":"Chiffres cl\u00e9s : le march\u00e9 fran\u00e7ais de la musique sur Internet","author":"Fred","date":"10 septembre 2015","format":false,"excerpt":"D\u2019apr\u00e8s les chiffres du SNEP, le march\u00e9 num\u00e9rique de la musique a connu une progression constante, passant de 50,8 millions d\u2019euros en 2007 \u00e0 133... http:\/\/www.zdnet.fr\/actualites\/chiffres-cles-le-marche-francais-de-la-musique-sur-internet-39790982.htm http:\/\/www.snepmusique.com\/wp-content\/uploads\/2015\/09\/09-2015-DOSSIER-PRESSE-le-march\u00e9-de-la-musique-\u00e0-fin-juillet-2015.pdf 09-2015-DOSSIER-PRESSE-le-march\u00e9-de-la-musique-\u00e0-fin-juillet-2015 \u00a0","rel":"","context":"Dans &quot;Audiovisuel&quot;","block_context":{"text":"Audiovisuel","link":"https:\/\/mouillere.com\/universconvergents\/category\/ip\/audiovisuel\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/Capture-d%E2%80%99%C3%A9cran-2015-09-10-%C3%A0-09.54.01.jpg?fit=1192%2C632&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/Capture-d%E2%80%99%C3%A9cran-2015-09-10-%C3%A0-09.54.01.jpg?fit=1192%2C632&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/Capture-d%E2%80%99%C3%A9cran-2015-09-10-%C3%A0-09.54.01.jpg?fit=1192%2C632&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/Capture-d%E2%80%99%C3%A9cran-2015-09-10-%C3%A0-09.54.01.jpg?fit=1192%2C632&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/Capture-d%E2%80%99%C3%A9cran-2015-09-10-%C3%A0-09.54.01.jpg?fit=1192%2C632&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=2702"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2702\/revisions"}],"predecessor-version":[{"id":2705,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2702\/revisions\/2705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/2704"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=2702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=2702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=2702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}