{"id":11652,"date":"2019-10-04T04:41:21","date_gmt":"2019-10-04T04:41:21","guid":{"rendered":"https:\/\/radio-ip.com\/?p=11652"},"modified":"2020-10-01T08:54:30","modified_gmt":"2020-10-01T08:54:30","slug":"understanding-how-encryption-works","status":"publish","type":"post","link":"https:\/\/www.radio-ip.com\/fr\/understanding-how-encryption-works\/","title":{"rendered":"Comprendre le fonctionnement du chiffrement"},"content":{"rendered":"<p style=\"text-align: justify;\">Vous entendez probablement beaucoup le mot cryptage, mais savez-vous vraiment ce que cela signifie? Lorsque vous magasinez en ligne, le magasin vous dit que vous ne devez pas vous inqui\u00e9ter car il chiffre votre transaction. Lorsque vous envoyez un message ou envoyez un e-mail \u00e0 quelqu&#39;un, l&#39;application indique qu&#39;elle crypte vos messages.<\/p>\n<h2 style=\"color: #000000; font-size: 26px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 21.33px; text-decoration: none;\">Qu&#39;est-ce que cela signifie r\u00e9ellement?<\/span><\/strong><\/h2>\n<p style=\"text-align: justify;\">The term\u00a0encryption\u00a0refers to the encoding of any Internet message in such a way that only the intended addressee can decode it. Internet message literally means any data sent via the Internet, not just a text or email.<\/p>\n<p style=\"text-align: justify;\">Encryption\u00a0software transforms the data sent into cipher text. If an individual did manage to steal the data sent, they could not read it unless they had the decryption key.<\/p>\n<h3 style=\"color: #000000; font-size: 21px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 18.33px; text-decoration: none;\">Military-Grade\u00a0Encryption<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">If you send something using a method that says it uses military-grade\u00a0encryption, you will have sent it in a manner that proves nearly impossible to crack. Military-grade\u00a0encryption\u00a0uses 256-bit keys to create 2^256 possible combinations. No human can encrypt something using military grade\u00a0encryption. Not even a supercomputer can crack an encrypted key in a reasonable time period.<\/p>\n<h3 style=\"color: #000000; font-size: 21px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 18.33px; text-decoration: none;\">Symmetric\u00a0Encryption<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">Symmetric\u00a0encryption\u00a0is when a sender and a receiver use the same private\u00a0encryption\u00a0key to decode and encode an encrypted message. The main drawback is that the key should be shared between the parties. Unless a secure tunnel is established, an interceptor might snatch the key and decipher the message.<\/p>\n<h3 style=\"color: #000000; font-size: 21px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 18.33px; text-decoration: none;\">Asymmetric\u00a0Encryption<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">Asymmetric\u00a0encryption\u00a0uses a two key method to for greater safety. A public key and a private key protect the message. Both sender and receiver use the shared public key, while each gets their own private key. You need both to access the message. It does leave the end-points unprotected.<\/p>\n<h2 style=\"color: #000000; font-size: 26px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 21.33px; text-decoration: none;\">Here Is an Example of How Asymmetric Encryption Works:<\/span><\/strong><\/h2>\n<p>1) Message is encrypted using the Receiver Public Key<\/p>\n<p>2) Receiver decrypts the message using his own Private Key<\/p>\n<h3><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-10614\" src=\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-2.png\" alt=\"Asymmetric Encryption\" width=\"740\" height=\"388\" srcset=\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-2.png 740w, https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-2-300x157.png 300w, https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-2-600x315.png 600w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/h3>\n<h3 style=\"color: #000000; font-size: 21px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 18.33px; text-decoration: none;\">Authentification asym\u00e9trique:<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">Les deux m\u00eames cl\u00e9s peuvent effectuer l&#39;authentification:<\/p>\n<p>1) Sender signs his data with his own private key<\/p>\n<p>2) Le destinataire peut authentifier que les donn\u00e9es proviennent de l&#39;exp\u00e9diteur \u00e0 l&#39;aide de sa cl\u00e9 publique connue.<\/p>\n<p>3) No data is encrypted<\/p>\n<h3><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-10615 aligncenter\" src=\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-3.png\" alt=\"Asymmetric Authentication\" width=\"737\" height=\"267\" srcset=\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-3.png 737w, https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-3-300x109.png 300w, https:\/\/www.radio-ip.com\/wp-content\/uploads\/2019\/12\/Understanding-How-Encryption-Works-3-600x217.png 600w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/h3>\n<h3 style=\"color: #000000; font-size: 21px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 18.33px; text-decoration: none;\">End-To-End\u00a0Encryption<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">End-to-end\u00a0encryption\u00a0(E2EE) encrypts data throughout the transportation between the two end-points, including through intermediate servers. No third party, not even your Internet Service Provider (ISP) car read it. Backup or peer-to-peer (P2P) services sometimes call E2E\u00a0encryption\u00a0by another name &#8211; client-side\u00a0encryption. Other times, it\u2019s referred to as zero-knowledge\u00a0encryption. An example of end-to-end encryption can be found on apps such as\u00a0<a href=\"https:\/\/www.messenger.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook Messenger<\/a>\u00a0ou Telegram, cependant, aucun des services de messagerie ne l\u2019active automatiquement.<\/p>\n<p style=\"text-align: justify;\">Learn more about how\u00a0encryption\u00a0protects you and how it can help you protect the\u00a0public safety\u00a0with\u00a0<a href=\"https:\/\/www.radio-ip.com\/fr\/company\/about-us\/\" rel=\"noopener\">Solutions RadioIP<\/a>. We can help you surf the Internet more safely and help\u00a0first responders\u00a0conduct business more privately and safely. Radio IP: we redefine secure mobility.<\/p>","protected":false},"excerpt":{"rendered":"<p>You probably hear the word encryption a lot, but do you really know what it means? When you shop online, the store touts that you need not worry because it encrypts your transaction. When you message or email somebody, the app states it encrypts your&#8230;<\/p>","protected":false},"author":1,"featured_media":11653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[124],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding How Encryption Works<\/title>\n<meta name=\"description\" content=\"The term\u00a0encryption\u00a0refers to the encoding of any Internet message in such a way that only the intended addressee can decode it. Internet message literally means any data sent via the Internet, not just a text or email.\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.radio-ip.com\/fr\/understanding-how-encryption-works\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding How Encryption Works\" \/>\n<meta property=\"og:description\" content=\"The term\u00a0encryption\u00a0refers to the encoding of any Internet message in such a way that only the intended addressee can decode it. Internet message literally means any data sent via the Internet, not just a text or email.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.radio-ip.com\/fr\/understanding-how-encryption-works\/\" \/>\n<meta property=\"og:site_name\" content=\"Radio IP\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-04T04:41:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-01T08:54:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2020\/09\/Encryption-Works.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"622\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"2 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#website\",\"url\":\"https:\/\/www.radio-ip.com\/fr\/\",\"name\":\"Radio IP\",\"description\":\"Mobile Virtual Private Network Solutions (MVPN)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.radio-ip.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/#primaryimage\",\"inLanguage\":\"fr-CA\",\"url\":\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2020\/09\/Encryption-Works.jpg\",\"width\":622,\"height\":408,\"caption\":\"Encryption Works\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/#webpage\",\"url\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/\",\"name\":\"Understanding How Encryption Works\",\"isPartOf\":{\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/#primaryimage\"},\"datePublished\":\"2019-10-04T04:41:21+00:00\",\"dateModified\":\"2020-10-01T08:54:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#\/schema\/person\/5de4bfd4f618ba47ca66aab192dad145\"},\"description\":\"The term\\u00a0encryption\\u00a0refers to the encoding of any Internet message in such a way that only the intended addressee can decode it. Internet message literally means any data sent via the Internet, not just a text or email.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.radio-ip.com\/\",\"url\":\"https:\/\/www.radio-ip.com\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/\",\"url\":\"https:\/\/www.radio-ip.com\/en\/understanding-how-encryption-works\/\",\"name\":\"Understanding How Encryption Works\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#\/schema\/person\/5de4bfd4f618ba47ca66aab192dad145\",\"name\":\"Radio IP\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#personlogo\",\"inLanguage\":\"fr-CA\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b085b200f78dc1631fca53d2ea29147?s=96&d=mm&r=g\",\"caption\":\"Radio IP\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts\/11652"}],"collection":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/comments?post=11652"}],"version-history":[{"count":4,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts\/11652\/revisions"}],"predecessor-version":[{"id":11788,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts\/11652\/revisions\/11788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/media\/11653"}],"wp:attachment":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/media?parent=11652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/categories?post=11652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/tags?post=11652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}