﻿{"id":2314,"date":"2022-02-20T12:52:27","date_gmt":"2022-02-20T11:52:27","guid":{"rendered":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/?p=2314"},"modified":"2022-02-21T16:09:36","modified_gmt":"2022-02-21T15:09:36","slug":"a-vos-codes-secrets","status":"publish","type":"post","link":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/2022\/02\/20\/a-vos-codes-secrets\/","title":{"rendered":"A vos codes secrets !"},"content":{"rendered":"<div class=\"post-content\">\n<p class=\"has-white-color has-vivid-purple-background-color has-text-color has-background has-medium-font-size\"><strong>Petite histoire de la cryptologie <\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\">La cryptologie est la science du secret. Elle r\u00e9unit la cryptographie qui est l&#8217;\u00e9criture secr\u00e8te et la cryptanalyse qui consiste \u00e0 analyser les diff\u00e9rentes \u00e9critures secr\u00e8tes.<\/p>\n\n\n\n<p style=\"font-size:18px\">Elle permet de conserver l&#8217;authenticit\u00e9 (de qui vient-il?), l&#8217;int\u00e9grit\u00e9 (est-il complet?) et la confidentialit\u00e9 (le fait d&#8217;\u00eatre secret) d&#8217;un message. Elle sert \u00e0 prot\u00e9ger des messages.<\/p>\n\n\n\n<p style=\"font-size:18px\">Le premier document chiffr\u00e9 a \u00e9t\u00e9 retrouv\u00e9 en Irak, datant du XVI\u00e8me si\u00e8cle avant J\u00e9sus-Christ.<\/p>\n\n\n\n<p style=\"font-size:18px\">Au cours du temps, le chiffrement a beaucoup \u00e9volu\u00e9. Avant, on utilisait l&#8217;encre invisible. Pendant la Seconde Guerre Mondiale, les Allemands \u00e9crivaient leur message secret sur une feuille, ensuite ils la r\u00e9tr\u00e9cissaient et l&#8217;envoyaient telle quelle. Le destinataire n&#8217;avait qu&#8217;\u00e0 l&#8217;agrandir.<\/p>\n\n\n\n<p style=\"font-size:18px\">Dans les lettres, on utilisait des contraires, des acrostiches, des grilles pour entourer certains mots, la technique des dents de scie&#8230;<\/p>\n\n\n\n<p style=\"font-size:18px\">Le chiffrement est compos\u00e9 de plusieurs codes connus comme le code de Vigen\u00e8re, de Jules C\u00e9sar. ou le carr\u00e9 de Polybe.<\/p>\n\n\n\n<p style=\"font-size:18px\">Le chiffre des hommes dansants ou le code de Marie Stuart, la reine d&#8217;Ecosse utilisent diff\u00e9rents symboles pour coder chaque lettre.<\/p>\n\n\n\n<p style=\"font-size:18px\">En g\u00e9n\u00e9ral, un code a une cl\u00e9 de d\u00e9chiffrage. Si cela vous interesse, il existe un jeu vid\u00e9o, le Blockchain bas\u00e9 sur des \u00e9l\u00e9ments et des technologies de cryptographie.<\/p>\n\n\n\n<p class=\"has-white-color has-vivid-purple-background-color has-text-color has-background\" style=\"font-size:18px\"><strong>Aujourd&#8217;hui &#8211; Le num\u00e9rique <\/strong><\/p>\n\n\n\n<p class=\"has-vivid-purple-color has-text-color\" style=\"font-size:18px\"><strong>L&#8217;int\u00e9grit\u00e9 d&#8217;un message peut \u00eatre v\u00e9rifi\u00e9 gr\u00e2ce aux fonctions de hachage avec ou sans cl\u00e9.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"894\" height=\"731\" src=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/2_hachage.png\" alt=\"\" data-id=\"3852\" data-full-url=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/2_hachage.png\" data-link=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/?attachment_id=3852\" class=\"wp-image-3852\" srcset=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/2_hachage.png 894w, https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/2_hachage-300x245.png 300w, https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/2_hachage-768x628.png 768w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><figcaption class=\"blocks-gallery-item__caption\"><a href=\"https:\/\/www.cnil.fr\/fr\/comprendre-les-grands-principes-de-la-cryptologie-et-du-chiffrement\">Comprendre les grands principes de la cryptologie et du chiffrement | CNIL<\/a><br><\/figcaption><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p class=\"has-vivid-purple-color has-text-color\" style=\"font-size:18px\"><strong>L&#8217;authenticit\u00e9 d&#8217;un message peut \u00eatre v\u00e9rifi\u00e9 gr\u00e2ce \u00e0 la signature de chaque utilisateur.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"894\" height=\"706\" src=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/3_integrite_0.png\" alt=\"\" data-id=\"3853\" data-full-url=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/3_integrite_0.png\" data-link=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/?attachment_id=3853\" class=\"wp-image-3853\" srcset=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/3_integrite_0.png 894w, https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/3_integrite_0-300x237.png 300w, https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/3_integrite_0-768x606.png 768w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><figcaption class=\"blocks-gallery-item__caption\"><a href=\"https:\/\/www.cnil.fr\/fr\/comprendre-les-grands-principes-de-la-cryptologie-et-du-chiffrement\">Comprendre les grands principes de la cryptologie et du chiffrement | CNIL<\/a><\/figcaption><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p class=\"has-vivid-purple-color has-text-color\" style=\"font-size:18px\"><strong>La confidentialit\u00e9 d&#8217;un message peut \u00eatre gard\u00e9 gr\u00e2ce au chiffrement.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"894\" height=\"927\" src=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/4_confidentialite.png\" alt=\"\" data-id=\"3854\" data-full-url=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/4_confidentialite.png\" data-link=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/?attachment_id=3854\" class=\"wp-image-3854\" srcset=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/4_confidentialite.png 894w, https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/4_confidentialite-289x300.png 289w, https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-content\/uploads\/2022\/02\/4_confidentialite-768x796.png 768w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><figcaption class=\"blocks-gallery-item__caption\"><a href=\"https:\/\/www.cnil.fr\/fr\/comprendre-les-grands-principes-de-la-cryptologie-et-du-chiffrement\">Comprendre les grands principes de la cryptologie et du chiffrement | CNIL<\/a><\/figcaption><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p><strong>sources :   <\/strong>                                                                                                                                                                                  &#8211; <a href=\"https:\/\/www.cnil.fr\/\">CNIL <\/a>                                                                                                                                                                                                     &#8211;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Wikip%C3%A9dia:Accueil_principal\">Wikip\u00e9dia, l&#8217;encyclop\u00e9die libre (wikipedia.org)<\/a>                                                                                                                          &#8211;<em>Le monde des Codes Secrets<\/em> de Philippe Nessmann (disponible au CDI)<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Petite histoire de la cryptologie La cryptologie est la science du secret. Elle r\u00e9unit la cryptographie<a href=\"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/2022\/02\/20\/a-vos-codes-secrets\/\">En savoir plus&#8230;<i class=\"fa fa-long-arrow-right\" aria-hidden=\"true\"><\/i><\/a><\/p>\n","protected":false},"author":7,"featured_media":3851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[316,317,313,314,315,11],"authors":[{"term_id":83,"user_id":7,"is_guest":0,"slug":"louann","display_name":"Louann"}],"_links":{"self":[{"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/posts\/2314"}],"collection":[{"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/comments?post=2314"}],"version-history":[{"count":8,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/posts\/2314\/revisions"}],"predecessor-version":[{"id":4078,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/posts\/2314\/revisions\/4078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/media\/3851"}],"wp:attachment":[{"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/media?parent=2314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/categories?post=2314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.ac-nancy-metz.fr\/laptitesource\/wp-json\/wp\/v2\/tags?post=2314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}