{"id":79810,"date":"2018-05-15T15:12:14","date_gmt":"2018-05-15T15:12:14","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/05\/encryption-isnt-perfect-thats-why-choices-are-important\/"},"modified":"2025-11-14T15:11:18","modified_gmt":"2025-11-14T15:11:18","slug":"encryption-isnt-perfect-thats-why-choices-are-important","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/05\/encryption-isnt-perfect-thats-why-choices-are-important\/","title":{"rendered":"Le cryptage n&rsquo;est pas parfait, c&rsquo;est pourquoi les choix que l&rsquo;on fait sont importants"},"content":{"rendered":"<p>Le cryptage est un \u00e9l\u00e9ment essentiel de la confiance en ligne, mais il n&rsquo;est jamais parfait. Tout cryptage est le produit de nombreuses \u00e9tapes de sa conception. Les protocoles sont sp\u00e9cifi\u00e9s pour ensuite \u00eatre mis en oeuvre. Chaque \u00e9tape est g\u00e9r\u00e9e par des personnes diff\u00e9rentes et peut potentiellement pr\u00e9senter des vuln\u00e9rabilit\u00e9s en cours de route. M\u00eame avec le meilleur design de serrure au monde, si quelqu&rsquo;un la construit avec des variations dans la conception (intentionnellement ou accidentellement), il sera facilement ouvert. La m\u00eame chose se passe dans le cas de cryptage.<\/p>\n<p>Hier (14 mai 2018), la communaut\u00e9 de s\u00e9curit\u00e9 Internet s&rsquo;est alert\u00e9e sur les <a href=\"https:\/\/efail.de\/\">vuln\u00e9rabilit\u00e9s r\u00e9cemment d\u00e9couvertes dans l&rsquo;\u00e9cosyst\u00e8me de messagerie s\u00e9curis\u00e9<\/a>, baptis\u00e9 \u00abEFAIL\u00bb. EFAIL peut rendre le contenu des courriels crypt\u00e9s avec PGP et S \/ MIME lisibles par un attaquant.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/05\/encryption-isnt-perfect-thats-why-choices-are-important\/\">Lire plus (en anglais)<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le cryptage est un \u00e9l\u00e9ment essentiel de la confiance en ligne, mais il n&rsquo;est jamais parfait. Tout cryptage est le produit de nombreuses \u00e9tapes de sa conception. Les protocoles sont sp\u00e9cifi\u00e9s pour ensuite \u00eatre mis en oeuvre. Chaque \u00e9tape est g\u00e9r\u00e9e par des personnes diff\u00e9rentes et peut potentiellement pr\u00e9senter des vuln\u00e9rabilit\u00e9s en cours de route. [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":65483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,170,4316,169,4909,4775,183],"tags":[],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4140],"class_list":["post-79810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-confidentialite","category-cryptage","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-technologie","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"Le cryptage est un \u00e9l\u00e9ment essentiel de la confiance en ligne, mais il n&rsquo;est jamais parfait. Tout cryptage est le produit de nombreuses \u00e9tapes de sa conception. Les protocoles sont sp\u00e9cifi\u00e9s pour ensuite \u00eatre mis en oeuvre. Chaque \u00e9tape est g\u00e9r\u00e9e par des personnes diff\u00e9rentes et peut potentiellement pr\u00e9senter des vuln\u00e9rabilit\u00e9s en cours de route.\u2026","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/79810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=79810"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/79810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/65483"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=79810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=79810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=79810"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=79810"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=79810"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=79810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}