{"id":84786,"date":"2018-08-10T23:59:57","date_gmt":"2018-08-10T23:59:57","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/08\/internet-security-gets-a-boost\/"},"modified":"2025-11-27T17:43:15","modified_gmt":"2025-11-27T17:43:15","slug":"internet-security-gets-a-boost","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/08\/internet-security-gets-a-boost\/","title":{"rendered":"TLS 1.3 &#8211; La s\u00e9curit\u00e9 sur Internet est renforc\u00e9e"},"content":{"rendered":"<p>L&rsquo;information officielle sur la restructuration du protocole <strong>TLS (Transport Layer Security)<\/strong>\u00a0a \u00e9t\u00e9 publi\u00e9 aujourd&rsquo;hui. TLS est une norme Internet utilis\u00e9e pour emp\u00eacher l&rsquo;espionnage, et la falsification de messages pour diverses applications Internet. C&rsquo;est probablement le standard de s\u00e9curit\u00e9 r\u00e9seau le plus largement d\u00e9ploy\u00e9 au monde. Souvent indiqu\u00e9 par le petit cadenas vert dans la barre d&rsquo;adresse d&rsquo;un navigateur Web1, TLS est utilis\u00e9 dans les transactions financi\u00e8res, par les \u00e9tablissements m\u00e9dicaux, et pour assurer des connexions s\u00e9curis\u00e9es dans une grande vari\u00e9t\u00e9 d&rsquo;autres applications.<\/p>\n<p><strong>Nous pensons que la nouvelle version de ce protocole, TLS 1.3, <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc8446.txt\">publi\u00e9e sous le num\u00e9ro RFC 8446<\/a>, constitue une avanc\u00e9e significative vers un Internet plus s\u00fbr et plus fiable.<\/strong><\/p>\n<p><span class=\"small-text button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/08\/internet-security-gets-a-boost\/\">En savoir plus (anglais)<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;information officielle sur la restructuration du protocole TLS (Transport Layer Security)\u00a0a \u00e9t\u00e9 publi\u00e9 aujourd&rsquo;hui. TLS est une norme Internet utilis\u00e9e pour emp\u00eacher l&rsquo;espionnage, et la falsification de messages pour diverses applications Internet. C&rsquo;est probablement le standard de s\u00e9curit\u00e9 r\u00e9seau le plus largement d\u00e9ploy\u00e9 au monde. Souvent indiqu\u00e9 par le petit cadenas vert dans la barre [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":84483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,169,4909,4775,183,146,181],"tags":[3376,6290],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4140],"class_list":["post-84786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","category-tls-fr","tag-ietf-fr","tag-transport-layer-security-tls","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge.png",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge-300x129.png",300,129,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge-768x330.png",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge-1024x440.png",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge.png",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge.png",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge-250x107.png",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge-600x550.png",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge.png",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge.png",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/TLS1.3-Badge.png",600,258,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"L&rsquo;information officielle sur la restructuration du protocole TLS (Transport Layer Security)\u00a0a \u00e9t\u00e9 publi\u00e9 aujourd&rsquo;hui. TLS est une norme Internet utilis\u00e9e pour emp\u00eacher l&rsquo;espionnage, et la falsification de messages pour diverses applications Internet. C&rsquo;est probablement le standard de s\u00e9curit\u00e9 r\u00e9seau le plus largement d\u00e9ploy\u00e9 au monde. Souvent indiqu\u00e9 par le petit cadenas vert dans la barre\u2026","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/84786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=84786"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/84786\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/84483"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=84786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=84786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=84786"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=84786"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=84786"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=84786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}