{"id":4792,"date":"2021-08-03T17:57:41","date_gmt":"2021-08-03T15:57:41","guid":{"rendered":"https:\/\/www.laurentmarot.fr\/wordpress\/?p=4792"},"modified":"2021-08-05T21:30:20","modified_gmt":"2021-08-05T19:30:20","slug":"public-key-cryptography-standards","status":"publish","type":"post","link":"https:\/\/www.laurentmarot.fr\/wordpress\/?p=4792","title":{"rendered":"Public Key Cryptography Standards"},"content":{"rendered":"<p>base : https:\/\/en.wikipedia.org\/wiki\/PKCS \/ https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards<\/p>\n<p>In <a title=\"Cryptography\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptography\">cryptography<\/a>, <b>PKCS<\/b> stands for \u00ab\u00a0Public Key Cryptography Standards\u00a0\u00bb. These are a group of <b><a title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\">public-key cryptography<\/a> standards<\/b> devised and published by <a title=\"IETF\" href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_Security\">RSA Security<\/a> LLC, starting in the early 1990s. The company published the standards to promote the use of the cryptography techniques to which they had <a title=\"Standards-track\" href=\"https:\/\/en.wikipedia.org\/wiki\/Patent\">patents<\/a>, such as the <a class=\"mw-redirect\" title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_algorithm\">RSA algorithm<\/a>, the <a title=\"Schnorr signature\" href=\"https:\/\/en.wikipedia.org\/wiki\/Schnorr_signature\">Schnorr signature<\/a> algorithm and several others. Though not <a title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_computer_standards\">industry standards<\/a> (because the company retained control over them), some of the standards in recent years have begun to move into the \u00ab\u00a0<a class=\"mw-redirect\" title=\"RSA algorithm\" href=\"https:\/\/en.wikipedia.org\/wiki\/Standards-track\">standards-track<\/a>\u00a0\u00bb processes of relevant <a title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/Standards_organization\">standards organizations<\/a> such as the <a class=\"mw-redirect\" title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/IETF\">IETF<\/a> and the <a class=\"mw-redirect\" title=\"PKIX\" href=\"https:\/\/en.wikipedia.org\/wiki\/PKIX\">PKIX<\/a> working-group.<\/p>\n<p>Les <b>PKCS<\/b> (<i><span class=\"lang-en\" lang=\"en\"><b>P<\/b>ublic-<b>K<\/b>ey <b>C<\/b>ryptography <b>S<\/b>tandards<\/span><\/i>), ou <i>standards de cryptographie \u00e0 cl\u00e9 publique<\/i>, sont un ensemble de sp\u00e9cifications con\u00e7ues par les laboratoires RSA en Californie. La soci\u00e9t\u00e9 <a title=\"\" href=\"https:\/\/fr.wikipedia.org\/wiki\/RSA_Security\">RSA Security<\/a> est sp\u00e9cialis\u00e9e dans les solutions de s\u00e9curit\u00e9 cryptographiques. Elle est \u00e9galement propri\u00e9taire de licences d&rsquo;exploitations de plusieurs <a title=\"Algorithmique\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Algorithmique\">algorithmes<\/a> (dont <a class=\"mw-redirect\" title=\"Rivest Shamir Adleman\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Rivest_Shamir_Adleman\">RSA<\/a> avant l&rsquo;expiration de son <a title=\"Brevet\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Brevet\">brevet<\/a> le <time class=\"nowrap date-lien\" datetime=\"2000-09-21\" data-sort-value=\"2000-09-21\"><a title=\"21 septembre\" href=\"https:\/\/fr.wikipedia.org\/wiki\/21_septembre\">21<\/a> <a title=\"Septembre 2000\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Septembre_2000\">septembre<\/a> <a title=\"2000\" href=\"https:\/\/fr.wikipedia.org\/wiki\/2000\">2000<\/a><\/time>). C&rsquo;est pour ces raisons que la soci\u00e9t\u00e9 a d\u00e9velopp\u00e9 et promu les PKCS, permettant l&rsquo;implantation des techniques de <a class=\"mw-redirect\" title=\"Cryptographie \u00e0 cl\u00e9 publique\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Cryptographie_%C3%A0_cl%C3%A9_publique\">cryptographie \u00e0 cl\u00e9 publique<\/a>.<\/p>\n<p>La soci\u00e9t\u00e9 RSA Security n&rsquo;est pas un <a title=\"Organisme de normalisation\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Organisme_de_normalisation\">organisme de normalisation<\/a>, et pourtant, elle contr\u00f4le compl\u00e8tement l&rsquo;\u00e9laboration et l&rsquo;\u00e9volution des PKCS. L&rsquo;appellation des PKCS comme <i>standards<\/i> au sens strict est donc abusive. R\u00e9pondant \u00e0 un r\u00e9el besoin technique, les PKCS ont n\u00e9anmoins \u00e9t\u00e9 tr\u00e8s largement adopt\u00e9s par le milieu informatique. Le groupe de travail <a title=\"PKIX\" href=\"https:\/\/fr.wikipedia.org\/wiki\/PKIX\">PKIX<\/a> de l&rsquo;<a class=\"mw-redirect\" title=\"IETF\" href=\"https:\/\/fr.wikipedia.org\/wiki\/IETF\">IETF<\/a> a depuis reformul\u00e9 certains des PKCS dans des <a class=\"mw-redirect\" title=\"RFC\" href=\"https:\/\/fr.wikipedia.org\/wiki\/RFC\">RFC<\/a>, les standards <a title=\"Internet\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Internet\">Internet<\/a>. L&rsquo;abus de langage confondant le PKCS au lieu de la RFC correspondante est tr\u00e8s r\u00e9pandu.<\/p>\n<p>1- revenir sur la place de la cryprographie dans dans le cadre plus large de la cryptologie.<\/p>\n<p>2- flash back sur l&rsquo;histoire de l&rsquo;entreprise RSA (https:\/\/fr.wikipedia.org\/wiki\/RSA_Security) ( y compris le leak de 2011)<\/p>\n<p>3- faire une lecture crois\u00e9e de ressources francophones et internationales<\/p>\n<div id=\"attachment_4795\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2021\/08\/Capture-du-2021-08-03-17-57-57.png\" rel=\"lightbox[4792]\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4795\" class=\"size-medium wp-image-4795\" src=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2021\/08\/Capture-du-2021-08-03-17-57-57-300x157.png\" alt=\"RSA Security\" width=\"300\" height=\"157\" srcset=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2021\/08\/Capture-du-2021-08-03-17-57-57-300x157.png 300w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2021\/08\/Capture-du-2021-08-03-17-57-57.png 538w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4795\" class=\"wp-caption-text\">RSA Security<\/p><\/div>\n<p>&nbsp;<\/p>\n<table class=\"wikitable\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<th><\/th>\n<th>Version<\/th>\n<th>Nom<\/th>\n<th>Commentaires<\/th>\n<\/tr>\n<tr>\n<th>PKCS#1<\/th>\n<td align=\"center\">2.1<\/td>\n<td>Standard de cryptographie RSA<\/td>\n<td><abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a03447<sup id=\"cite_ref-RFC-3447-t-d_1-0\" class=\"reference\"><a href=\"hhttps:\/\/datatracker.ietf.org\/doc\/html\/rfc3447\">1<\/a><\/sup>. D\u00e9finit le chiffrement et la signature RSA (notamment les <a title=\"Remplissage (cryptographie)\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Remplissage_(cryptographie)\">sch\u00e9mas de remplissage<\/a> <a class=\"mw-redirect\" title=\"OAEP\" href=\"https:\/\/fr.wikipedia.org\/wiki\/OAEP\">OAEP<\/a>, <a class=\"mw-disambig\" title=\"PSS\" href=\"https:\/\/fr.wikipedia.org\/wiki\/PSS\">PSS<\/a> et PKCS1-v1.5).<\/td>\n<\/tr>\n<tr>\n<th>PKCS#2<\/th>\n<td align=\"center\">&#8211;<\/td>\n<td><i>Obsol\u00e8te<\/i><\/td>\n<td>D\u00e9crivait le chiffrement RSA de condens\u00e9s de message, mais a \u00e9t\u00e9 int\u00e9gr\u00e9 dans PKCS#1.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#3<\/th>\n<td align=\"center\">1.4<\/td>\n<td>Standard d&rsquo;<a title=\"\u00c9change de cl\u00e9s Diffie-Hellman\" href=\"https:\/\/fr.wikipedia.org\/wiki\/%C3%89change_de_cl%C3%A9s_Diffie-Hellman\">\u00e9change de cl\u00e9s Diffie-Hellman<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<th>PKCS#4<\/th>\n<td align=\"center\">&#8211;<\/td>\n<td><i>Obsol\u00e8te<\/i><\/td>\n<td>D\u00e9crivait la syntaxe de cl\u00e9 RSA, mais a \u00e9t\u00e9 int\u00e9gr\u00e9 dans PKCS#1.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#5<\/th>\n<td align=\"center\">2.0<\/td>\n<td>Standard de chiffrement par mot de passe<\/td>\n<td>cf. <abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a02898<sup id=\"cite_ref-RFC-2898-t-d_2-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-2898-t-d-2\">2<\/a><\/sup> (rendu obsol\u00e8te par la <abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a08018<sup id=\"cite_ref-RFC-8018-t-d_3-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-8018-t-d-3\">3<\/a><\/sup>) et <a title=\"PBKDF2\" href=\"https:\/\/fr.wikipedia.org\/wiki\/PBKDF2\">PBKDF2<\/a>.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#6<\/th>\n<td align=\"center\">1.5<\/td>\n<td><i>Obsol\u00e8te<\/i><\/td>\n<td>D\u00e9finissait les extensions de l&rsquo;ancienne sp\u00e9cification de certificat <a title=\"X.509\" href=\"https:\/\/fr.wikipedia.org\/wiki\/X.509\">X.509<\/a> v1.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#7<\/th>\n<td align=\"center\">1.5<\/td>\n<td>Standard de syntaxe de message cryptographique<\/td>\n<td>Cf. <abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a02315<sup id=\"cite_ref-RFC-2315-t-d_4-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-2315-t-d-4\">4<\/a><\/sup>. Utilis\u00e9 pour signer et\/ou chiffrer des messages dans le cadre d&rsquo;une <a title=\"Infrastructure \u00e0 cl\u00e9s publiques\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Infrastructure_%C3%A0_cl%C3%A9s_publiques\">infrastructure \u00e0 cl\u00e9s publiques<\/a>. Sert \u00e9galement \u00e0 la transmission de certificats (notamment en r\u00e9ponse \u00e0 un message PKCS#10). \u00c0 l&rsquo;origine de <a title=\"S\/MIME\" href=\"https:\/\/fr.wikipedia.org\/wiki\/S\/MIME\">S\/MIME<\/a>, qui est d\u00e9sormais d\u00e9crit sous le nom Cryptographic Message Syntax (CMS) dans la <abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a05652<sup id=\"cite_ref-RFC-5652-t-d_5-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-5652-t-d-5\">5<\/a><\/sup>.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#8<\/th>\n<td align=\"center\">1.2<\/td>\n<td>Standard de syntaxe d&rsquo;information de cl\u00e9 priv\u00e9e<\/td>\n<td>Cf. <abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a05958<sup id=\"cite_ref-RFC-5958-t-d_6-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-5958-t-d-6\">6<\/a><\/sup>.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#9<\/th>\n<td align=\"center\">2.0<\/td>\n<td>Types d&rsquo;attributs s\u00e9lectionn\u00e9s<\/td>\n<td><abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a02985<sup id=\"cite_ref-RFC-2985-t-d_7-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-2985-t-d-7\">7<\/a><\/sup><\/td>\n<\/tr>\n<tr>\n<th><a class=\"mw-redirect\" title=\"PKCS10\" href=\"https:\/\/fr.wikipedia.org\/wiki\/PKCS10\">PKCS#10<\/a><\/th>\n<td align=\"center\">1.7<\/td>\n<td>Standard de requ\u00eate de certificat<\/td>\n<td>Cf. <abbr class=\"abbr\" lang=\"en\" title=\"Request for comments\">RFC<\/abbr>\u00a02986<sup id=\"cite_ref-RFC-2986-t-d_8-0\" class=\"reference\"><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards#cite_note-RFC-2986-t-d-8\">8<\/a><\/sup>. Format des messages envoy\u00e9s \u00e0 une <a title=\"Autorit\u00e9 de certification\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Autorit%C3%A9_de_certification\">autorit\u00e9 de certification<\/a> et demandant la signature d&rsquo;une paire de cl\u00e9s.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#11<\/th>\n<td align=\"center\">2.20<\/td>\n<td>Interface de p\u00e9riph\u00e9rique cryptographique (cryptoki)<\/td>\n<td>Une <a title=\"Interface de programmation\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Interface_de_programmation\">API<\/a> d\u00e9finissant une interface g\u00e9n\u00e9rique pour <a class=\"new\" title=\"P\u00e9riph\u00e9rique cryptographique (page inexistante)\" href=\"https:\/\/fr.wikipedia.org\/w\/index.php?title=P%C3%A9riph%C3%A9rique_cryptographique&amp;action=edit&amp;redlink=1\">p\u00e9riph\u00e9rique cryptographique<\/a>.<\/td>\n<\/tr>\n<tr>\n<th><a title=\"PKCS12\" href=\"https:\/\/fr.wikipedia.org\/wiki\/PKCS12\">PKCS#12<\/a><\/th>\n<td align=\"center\">1.0<\/td>\n<td>Standard de syntaxe d&rsquo;information personnelle<\/td>\n<td>D\u00e9finit un format de fichier g\u00e9n\u00e9ralement utilis\u00e9 pour stocker la cl\u00e9 priv\u00e9e et le certificat de cl\u00e9 publique correspondant en les prot\u00e9geant par un mot de passe.<\/td>\n<\/tr>\n<tr>\n<th>PKCS#13<\/th>\n<td align=\"center\">\u2013<\/td>\n<td>Standard de <a title=\"Cryptographie sur les courbes elliptiques\" href=\"https:\/\/fr.wikipedia.org\/wiki\/Cryptographie_sur_les_courbes_elliptiques\">Cryptographie sur les courbes elliptiques<\/a><\/td>\n<td>(En cours de d\u00e9veloppement)<\/td>\n<\/tr>\n<tr>\n<th>PKCS#14<\/th>\n<td align=\"center\">\u2013<\/td>\n<td><a title=\"G\u00e9n\u00e9rateur de nombres pseudo-al\u00e9atoires\" href=\"https:\/\/fr.wikipedia.org\/wiki\/G%C3%A9n%C3%A9rateur_de_nombres_pseudo-al%C3%A9atoires\">G\u00e9n\u00e9rateur de nombres pseudo-al\u00e9atoires<\/a><\/td>\n<td>(En cours de d\u00e9veloppement)<\/td>\n<\/tr>\n<tr>\n<th>PKCS#15<\/th>\n<td align=\"center\">1.1<\/td>\n<td>Standard de format d&rsquo;information sur les p\u00e9riph\u00e9riques cryptographiques<\/td>\n<td>D\u00e9finit un standard permettant aux utilisateurs de p\u00e9riph\u00e9riques cryptographiques de s&rsquo;identifier aupr\u00e8s des applications, ind\u00e9pendamment de l&rsquo;implantation de la cryptoki par l&rsquo;application (PKCS #11) ou une autre API. La partie de cette sp\u00e9cification concernant les cartes IC a \u00e9t\u00e9 int\u00e9gr\u00e9e dans le standard ISO\/IEC 7816-15. <a class=\"external autonumber\" href=\"http:\/\/www.rsasecurity.com\/rsalabs\/node.asp?id=2141\" rel=\"nofollow\">[1]<\/a><small class=\"cachelinks\">\u00a0[<a title=\"archive sur Wikiwix\" href=\"http:\/\/archive.wikiwix.com\/cache\/?url=http%3A%2F%2Fwww.rsasecurity.com%2Frsalabs%2Fnode.asp%3Fid%3D2141\">archive<\/a>]<\/small><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>#PKCS1 se pr\u00eate tr\u00e8s bien \u00e0 l&rsquo;illustration d&rsquo;un des \u00ab\u00a0standards\u00a0\u00bb<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>base : https:\/\/en.wikipedia.org\/wiki\/PKCS \/ https:\/\/fr.wikipedia.org\/wiki\/Public_Key_Cryptographic_Standards In cryptography, PKCS stands for \u00ab\u00a0Public Key Cryptography Standards\u00a0\u00bb. These are a group of public-key cryptography standards devised and published by RSA Security LLC, starting in the early 1990s. The company published the standards to promote the use of the cryptography techniques to which they had patents, such as the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,34],"tags":[],"_links":{"self":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4792"}],"collection":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4792"}],"version-history":[{"count":9,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4792\/revisions"}],"predecessor-version":[{"id":4817,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4792\/revisions\/4817"}],"wp:attachment":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}