{"id":26288,"date":"2022-04-19T15:05:00","date_gmt":"2022-04-19T13:05:00","guid":{"rendered":"https:\/\/perseus.de\/cryptage-asymetrique\/"},"modified":"2026-03-27T16:09:06","modified_gmt":"2026-03-27T15:09:06","slug":"cryptage-asymetrique","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/","title":{"rendered":"Cryptage asym\u00e9trique"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26288\" class=\"elementor elementor-26288 elementor-22103\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-00ff2c1 e-con-full e-flex e-con e-child\" data-id=\"00ff2c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cryptage asym\u00e9trique\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a984c40 e-flex e-con-boxed e-con e-parent\" data-id=\"7a984c40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-58a9eca2 e-con-full e-flex e-con e-child\" data-id=\"58a9eca2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><p>Il s&rsquo;agit d&rsquo;un proc\u00e9d\u00e9 de chiffrement dans lequel les cl\u00e9s de chiffrement et de d\u00e9chiffrement ne sont pas identiques, c&rsquo;est-\u00e0-dire qu&rsquo;elles ne sont pas sym\u00e9triques, mais asym\u00e9triques. En g\u00e9n\u00e9ral, dans le cadre d&rsquo;un chiffrement asym\u00e9trique, les donn\u00e9es sont chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 publique et d\u00e9chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 priv\u00e9e. Malgr\u00e9 une histoire mill\u00e9naire des codes secrets, le chiffrement asym\u00e9trique n&rsquo;existe que depuis 1977.  <\/p><h4> <\/h4><h4>Qu&rsquo;entend-on exactement par \u00ab chiffrement asym\u00e9trique \u00bb ?<\/h4><p>La principale caract\u00e9ristique du chiffrement asym\u00e9trique est que chaque destinataire dispose d&rsquo;une paire de cl\u00e9s unique :<\/p><ol><li>Une cl\u00e9 publique que tout le monde doit conna\u00eetre et utiliser pour envoyer des donn\u00e9es \u00e0 ce destinataire. Seules les donn\u00e9es chiffr\u00e9es \u00e0 l&rsquo;aide de cette cl\u00e9 publique du destinataire peuvent \u00eatre d\u00e9chiffr\u00e9es par celui-ci. <\/li><li>Une cl\u00e9 priv\u00e9e que le destinataire doit garder strictement secr\u00e8te. Ce n&rsquo;est qu&rsquo;avec cette cl\u00e9 que le destinataire peut d\u00e9chiffrer les messages crypt\u00e9s \u00e0 l&rsquo;aide de sa cl\u00e9 publique. <\/li><\/ol><p> <\/p><p>Derri\u00e8re ces paires de cl\u00e9s individuelles se cachent des calculs math\u00e9matiques faciles \u00e0 effectuer, mais tr\u00e8s difficiles \u00e0 retracer sans \u00ab connaissance secr\u00e8te \u00bb. Par exemple : la multiplication de deux tr\u00e8s grands nombres est facile \u00e0 r\u00e9aliser. En revanche, il est pratiquement impossible de d\u00e9terminer, \u00e0 partir du seul r\u00e9sultat, quels nombres ont \u00e9t\u00e9 multipli\u00e9s.<br>Comme les calculs de d\u00e9cryptage sont tr\u00e8s complexes dans les m\u00e9thodes asym\u00e9triques, ils prennent relativement beaucoup de temps, m\u00eame pour l&rsquo;utilisateur l\u00e9gitime de la cl\u00e9 priv\u00e9e.  <\/p><p>Le chiffrement asym\u00e9trique n&rsquo;est pas non plus totalement s\u00fbr. Plus la puissance de calcul des ordinateurs actuels augmente, plus il devient facile de d\u00e9coder des donn\u00e9es chiffr\u00e9es de mani\u00e8re asym\u00e9trique. N\u00e9anmoins, le d\u00e9cryptage ill\u00e9gitime de donn\u00e9es chiffr\u00e9es de mani\u00e8re asym\u00e9trique n\u00e9cessite un investissement en temps consid\u00e9rable et le recours \u00e0 des capacit\u00e9s de calcul exceptionnellement \u00e9lev\u00e9es et co\u00fbteuses. Pour les donn\u00e9es qui doivent rester chiffr\u00e9es pendant des d\u00e9cennies, la s\u00e9curit\u00e9 de leur chiffrement asym\u00e9trique doit toutefois \u00eatre v\u00e9rifi\u00e9e r\u00e9guli\u00e8rement.   <\/p><h4> <\/h4><h4>O\u00f9 est-ce que je rencontre ce th\u00e8me dans mon travail quotidien ?<\/h4><p>Lorsque vous envoyez un e-mail crypt\u00e9, celui-ci est probablement crypt\u00e9 et d\u00e9crypt\u00e9 \u00e0 l&rsquo;aide d&rsquo;un proc\u00e9d\u00e9 asym\u00e9trique. Les proc\u00e9d\u00e9s courants s&rsquo;appellent S\/MIME (Secure \/ Multipurpose Internet Mail Extensions) et PGP (Pretty Good Privacy) ; vous avez peut-\u00eatre d\u00e9j\u00e0 rencontr\u00e9 ces abr\u00e9viations au quotidien.<br>Sur Internet \u00e9galement, les donn\u00e9es sont \u00e9chang\u00e9es \u00e0 l&rsquo;aide d&rsquo;un cryptage asym\u00e9trique, reconnaissable au protocole HTTPS. Il s&rsquo;agit ici d&rsquo;un proc\u00e9d\u00e9 hybride : le cryptage asym\u00e9trique permet d&rsquo;\u00e9changer une cl\u00e9 qui sert ensuite \u00e0 d\u00e9coder les donn\u00e9es crypt\u00e9es de mani\u00e8re sym\u00e9trique. Un cryptage enti\u00e8rement asym\u00e9trique ralentirait consid\u00e9rablement l&rsquo;\u00e9change de donn\u00e9es.   <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><p>Utilisez des m\u00e9thodes de chiffrement asym\u00e9trique, en particulier pour les donn\u00e9es sensibles, par exemple pour vos communications par e-mail.<br>Pour les op\u00e9rations o\u00f9 cela prendrait trop de temps, les m\u00e9thodes hybrides constituent une bonne solution. Comme pour le protocole HTTPS mentionn\u00e9 plus haut, seule la cl\u00e9 d&rsquo;un chiffrement sym\u00e9trique est \u00e9chang\u00e9e via la m\u00e9thode asym\u00e9trique. <\/p><p>Pour savoir quelles proc\u00e9dures sont recommand\u00e9es pour quels types de communication et de donn\u00e9es, il est pr\u00e9f\u00e9rable d&rsquo;en discuter avec votre service informatique.<\/p><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed459aa elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ed459aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cryptage asym\u00e9trique Il s&rsquo;agit d&rsquo;un proc\u00e9d\u00e9 de chiffrement dans lequel les cl\u00e9s de chiffrement et de d\u00e9chiffrement ne sont pas identiques, c&rsquo;est-\u00e0-dire qu&rsquo;elles ne sont pas sym\u00e9triques, mais asym\u00e9triques. En g\u00e9n\u00e9ral, dans le cadre d&rsquo;un chiffrement asym\u00e9trique, les donn\u00e9es sont chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 publique et d\u00e9chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 priv\u00e9e. Malgr\u00e9 une [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26288","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptage asym\u00e9trique - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptage asym\u00e9trique - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Cryptage asym\u00e9trique Il s&rsquo;agit d&rsquo;un proc\u00e9d\u00e9 de chiffrement dans lequel les cl\u00e9s de chiffrement et de d\u00e9chiffrement ne sont pas identiques, c&rsquo;est-\u00e0-dire qu&rsquo;elles ne sont pas sym\u00e9triques, mais asym\u00e9triques. En g\u00e9n\u00e9ral, dans le cadre d&rsquo;un chiffrement asym\u00e9trique, les donn\u00e9es sont chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 publique et d\u00e9chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 priv\u00e9e. Malgr\u00e9 une [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T15:09:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Cryptage asym\u00e9trique\",\"datePublished\":\"2022-04-19T13:05:00+00:00\",\"dateModified\":\"2026-03-27T15:09:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/\"},\"wordCount\":630,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/\",\"name\":\"Cryptage asym\u00e9trique - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:05:00+00:00\",\"dateModified\":\"2026-03-27T15:09:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cryptage-asymetrique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptage asym\u00e9trique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptage asym\u00e9trique - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/","og_locale":"fr_FR","og_type":"article","og_title":"Cryptage asym\u00e9trique - Perseus Technologies","og_description":"Cryptage asym\u00e9trique Il s&rsquo;agit d&rsquo;un proc\u00e9d\u00e9 de chiffrement dans lequel les cl\u00e9s de chiffrement et de d\u00e9chiffrement ne sont pas identiques, c&rsquo;est-\u00e0-dire qu&rsquo;elles ne sont pas sym\u00e9triques, mais asym\u00e9triques. En g\u00e9n\u00e9ral, dans le cadre d&rsquo;un chiffrement asym\u00e9trique, les donn\u00e9es sont chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 publique et d\u00e9chiffr\u00e9es \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 priv\u00e9e. Malgr\u00e9 une [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:05:00+00:00","article_modified_time":"2026-03-27T15:09:06+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Cryptage asym\u00e9trique","datePublished":"2022-04-19T13:05:00+00:00","dateModified":"2026-03-27T15:09:06+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/"},"wordCount":630,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/","url":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/","name":"Cryptage asym\u00e9trique - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:05:00+00:00","dateModified":"2026-03-27T15:09:06+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/cryptage-asymetrique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/cryptage-asymetrique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Cryptage asym\u00e9trique"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26288"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26288\/revisions"}],"predecessor-version":[{"id":26289,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26288\/revisions\/26289"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}