{"id":554,"date":"2023-03-25T16:20:17","date_gmt":"2023-03-25T15:20:17","guid":{"rendered":"https:\/\/franckleprevost.com\/?p=554"},"modified":"2023-03-30T09:35:49","modified_gmt":"2023-03-30T08:35:49","slug":"cryptographie-et-securite-des-systemes-et-reseau","status":"publish","type":"post","link":"https:\/\/franckleprevost.com\/en\/cryptographie-et-securite-des-systemes-et-reseau\/","title":{"rendered":"Cryptographie et s\u00e9curit\u00e9 des syst\u00e8mes et r\u00e9seaux"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"554\" class=\"elementor elementor-554\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79f0b76 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79f0b76\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3c53015\" data-id=\"3c53015\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f52043 elementor-widget elementor-widget-image\" data-id=\"6f52043\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.amazon.fr\/Cryptographie-s%C3%A9curit%C3%A9-syst%C3%A8mes-Informatique-dinformation\/dp\/2746212609\/ref=sr_1_11?crid=22GQ90ISSWUTT&#038;keywords=franck+lepr%C3%A9vost&#038;qid=1678973173&#038;sprefix=,aps,117&#038;sr=8-11\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"303\" height=\"499\" src=\"https:\/\/franckleprevost.com\/wp-content\/uploads\/2023\/03\/cryptographie-securite-systemes.jpg\" class=\"attachment-medium_large size-medium_large wp-image-47\" alt=\"\" srcset=\"https:\/\/franckleprevost.com\/wp-content\/uploads\/2023\/03\/cryptographie-securite-systemes.jpg 303w, https:\/\/franckleprevost.com\/wp-content\/uploads\/2023\/03\/cryptographie-securite-systemes-182x300.jpg 182w\" sizes=\"(max-width: 303px) 100vw, 303px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dbe86e elementor-widget elementor-widget-spacer\" data-id=\"8dbe86e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9b2953d\" data-id=\"9b2953d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-364d973 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"364d973\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.amazon.fr\/Cryptographie-s%C3%A9curit%C3%A9-syst%C3%A8mes-Informatique-dinformation\/dp\/2746212609\/ref=sr_1_11?crid=22GQ90ISSWUTT&#038;keywords=franck+lepr%C3%A9vost&#038;qid=1678973173&#038;sprefix=,aps,117&#038;sr=8-11\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"><span style=\"text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\">Commander<\/span><span style=\"text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"><\/span><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c155ef6 elementor-widget elementor-widget-text-editor\" data-id=\"c155ef6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h2>\u00c0 propos ?<\/h2>\n\n<p style=\"text-align: justify;\">\nLes briques de construction des syst\u00e8mes s\u00e9curis\u00e9s d&rsquo;information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosyst\u00e8mes) et la cryptanalyse (la recherche de failles dans les cryptosyst\u00e8mes). Les cryptosyst\u00e8mes reposent sur le principe de Kerckhoff, qui affirme que la s\u00e9curit\u00e9 d&rsquo;un cryptosyst\u00e8me ne doit pas reposer sur l&rsquo;ignorance de l&rsquo;algorithme pour sa mise en \u0153uvre, mais sur l&rsquo;ignorance que l&rsquo;attaquant a d&rsquo;une information secr\u00e8te.\n<\/p>\n\n<p style=\"text-align: justify;\">\nCe volume, organis\u00e9 en chapitres ind\u00e9pendants, traite de la cryptographie \u00e0 clef secr\u00e8te, en particulier de l&rsquo;AES, et des m\u00e9thodes de cryptanalyse lin\u00e9aire et diff\u00e9rentielle, de la cryptographie \u00e0 clef publique, en particulier de RSA, du protocole d&rsquo;\u00e9change de clefs de Diffie-Hellman, et des signatures \u00e9lectroniques. Il assemble ces briques de construction dans le cadre des architectures \u00e0 clef publique (X.509, PGP, DNSSEC) et traite de la s\u00e9curit\u00e9 des syst\u00e8mes (essentiellement Unix), et des r\u00e9seaux.\n<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Commander \u00c0 propos ? Les briques de construction des syst\u00e8mes s\u00e9curis\u00e9s d&rsquo;information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosyst\u00e8mes) et la cryptanalyse (la recherche de failles dans les cryptosyst\u00e8mes). Les cryptosyst\u00e8mes reposent sur le principe de Kerckhoff, qui affirme que la s\u00e9curit\u00e9 d&rsquo;un cryptosyst\u00e8me ne doit pas reposer [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-554","post","type-post","status-publish","format-standard","hentry","category-books"],"_links":{"self":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/posts\/554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/comments?post=554"}],"version-history":[{"count":20,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/posts\/554\/revisions"}],"predecessor-version":[{"id":943,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/posts\/554\/revisions\/943"}],"wp:attachment":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/media?parent=554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/categories?post=554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/tags?post=554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}