{"id":1437,"date":"2025-06-17T09:24:22","date_gmt":"2025-06-17T08:24:22","guid":{"rendered":"https:\/\/workboot.fr\/ciela\/?page_id=1437"},"modified":"2025-06-17T09:32:59","modified_gmt":"2025-06-17T08:32:59","slug":"gpg-chiffrement-asymetrique","status":"publish","type":"page","link":"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/","title":{"rendered":"GPG  Chiffrement Asym\u00e9trique Partie 2"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">\ud83d\udccb Pr\u00e9requis:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gestions des fichiers et r\u00e9pertoires sous linux.<\/li>\n\n\n\n<li>nstallation de imagemagick (\u00a0<strong>sudo apt update &amp;&amp; sudo apt install imagemagick\u00a0<\/strong>)<\/li>\n\n\n\n<li>installation gpg (\u00a0<strong>sudo apt update &amp;&amp; sudo apt install gnupg<\/strong>\u00a0)<\/li>\n\n\n\n<li>GPG Chiffrement sym\u00e9trique (Partie 1)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfaf Objectifs p\u00e9dagogiques du chiffrement asym\u00e9trique<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Savoir utiliser ta propre paire de cl\u00e9s<\/li>\n\n\n\n<li>Exporter\/importer des cl\u00e9s<\/li>\n\n\n\n<li>Chiffrer et d\u00e9chiffrer un message pour soi-m\u00eame ou pour autrui<\/li>\n\n\n\n<li>Signer num\u00e9riquement un fichier<\/li>\n\n\n\n<li>V\u00e9rifier une signature<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd38\u00a0<mark>Partie 2 : Chiffrement Asym\u00e9trique (cl\u00e9 publique \/ priv\u00e9e)<\/mark><br><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 1. Cr\u00e9er une paire de cl\u00e9s<\/h2>\n\n\n\n<pre class=\"wp-block-preformatted\">gpg --full-generate-key<\/pre>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Exemple:<\/summary>\n<pre class=\"wp-block-code\"><code>bruno@elliott:~\/Works\/gpg\/asym$ gpg \u2013full-generate-key\ngpg (GnuPG) 2.2.40; Copyright (C) 2022 g10 Code GmbH\nThis is free software: you are free to change and redistribute it.\nThere is NO WARRANTY, to the extent permitted by law.\n\nS\u00e9lectionnez le type de clef d\u00e9sir\u00e9 :\n(1) RSA et RSA (par d\u00e9faut)\n(2) DSA et Elgamal\n(3) DSA (signature seule)\n(4) RSA (signature seule)\n(14) Existing key from card\nQuel est votre choix ? 1\nles clefs RSA peuvent faire une taille comprise entre 1024 et 4096 bits.\nQuelle taille de clef d\u00e9sirez-vous ? (3072) 1024\nLa taille demand\u00e9e est 1024 bits\nVeuillez indiquer le temps pendant lequel cette clef devrait \u00eatre valable.\n0 = la clef n\u2019expire pas\n= la clef expire dans n jours\nw = la clef expire dans n semaines\nm = la clef expire dans n mois\ny = la clef expire dans n ans\nPendant combien de temps la clef est-elle valable ? (0) 0\nLa clef n\u2019expire pas du tout\nEst-ce correct ? (o\/N) o\n\nGnuPG doit construire une identit\u00e9 pour identifier la clef.\n\nNom r\u00e9el : Dorian Caroline\nAdresse \u00e9lectronique : caroline@workboot.fr\nCommentaire :\nVous avez s\u00e9lectionn\u00e9 cette identit\u00e9 :\n\u00ab Dorian Caroline caroline@workboot.fr \u00bb\n\nChanger le (N)om, le (C)ommentaire, l'(A)dresse \u00e9lectronique\nou (O)ui\/(Q)uitter ? O\nDe nombreux octets al\u00e9atoires doivent \u00eatre g\u00e9n\u00e9r\u00e9s. Vous devriez faire\nautre chose (taper au clavier, d\u00e9placer la souris, utiliser les disques)\npendant la g\u00e9n\u00e9ration de nombres premiers ; cela donne au g\u00e9n\u00e9rateur de\nnombres al\u00e9atoires une meilleure chance d\u2019obtenir suffisamment d\u2019entropie.\nDe nombreux octets al\u00e9atoires doivent \u00eatre g\u00e9n\u00e9r\u00e9s. Vous devriez faire\nautre chose (taper au clavier, d\u00e9placer la souris, utiliser les disques)\npendant la g\u00e9n\u00e9ration de nombres premiers ; cela donne au g\u00e9n\u00e9rateur de\nnombres al\u00e9atoires une meilleure chance d\u2019obtenir suffisamment d\u2019entropie.\ngpg: \/home\/bruno\/.gnupg\/trustdb.gpg : base de confiance cr\u00e9\u00e9e\ngpg: r\u00e9pertoire \u00ab \/home\/bruno\/.gnupg\/openpgp-revocs.d \u00bb cr\u00e9\u00e9\ngpg: revocation certificate stored as \u2018\/home\/bruno\/.gnupg\/openpgp-revocs.d\/F6974BA8EB329FE7E14F0934BE5214CCBFCDEF8F.rev\u2019\nles clefs publique et secr\u00e8te ont \u00e9t\u00e9 cr\u00e9\u00e9es et sign\u00e9es.\n\npub rsa1024 2025-06-17 &#91;SC]\nF6974BA8EB329FE7E14F0934BE5214CCBFCDEF8F\nuid Dorian Caroline caroline@workboot.fr\nsub rsa1024 2025-06-17 &#91;E]\n\nbruno@elliott:~\/Works\/gpg\/asym$<\/code><\/pre>\n<\/details>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udccb Pr\u00e9requis: \ud83c\udfaf Objectifs p\u00e9dagogiques du chiffrement asym\u00e9trique \ud83d\udd38\u00a0Partie 2 : Chiffrement Asym\u00e9trique (cl\u00e9 publique \/ priv\u00e9e) \ud83d\udd39 1. Cr\u00e9er une paire de cl\u00e9s gpg &#8211;full-generate-key<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-1437","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GPG Chiffrement Asym\u00e9trique Partie 2 - workboot<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GPG Chiffrement Asym\u00e9trique Partie 2 - workboot\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udccb Pr\u00e9requis: \ud83c\udfaf Objectifs p\u00e9dagogiques du chiffrement asym\u00e9trique \ud83d\udd38\u00a0Partie 2 : Chiffrement Asym\u00e9trique (cl\u00e9 publique \/ priv\u00e9e) \ud83d\udd39 1. Cr\u00e9er une paire de cl\u00e9s gpg --full-generate-key\" \/>\n<meta property=\"og:url\" content=\"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/\" \/>\n<meta property=\"og:site_name\" content=\"workboot\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T08:32:59+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/gpg-chiffrement-asymetrique\\\/\",\"url\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/gpg-chiffrement-asymetrique\\\/\",\"name\":\"GPG Chiffrement Asym\u00e9trique Partie 2 - workboot\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/#website\"},\"datePublished\":\"2025-06-17T08:24:22+00:00\",\"dateModified\":\"2025-06-17T08:32:59+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/workboot.fr\\\/ciela\\\/gpg-chiffrement-asymetrique\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/#website\",\"url\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/\",\"name\":\"workboot\",\"description\":\"Open Source, Open Minds \",\"publisher\":{\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/#organization\",\"name\":\"workboot\",\"url\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo_ciel-dorian-1.png\",\"contentUrl\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo_ciel-dorian-1.png\",\"width\":1024,\"height\":950,\"caption\":\"workboot\"},\"image\":{\"@id\":\"https:\\\/\\\/workboot.fr\\\/ciela\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GPG Chiffrement Asym\u00e9trique Partie 2 - workboot","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/","og_locale":"fr_FR","og_type":"article","og_title":"GPG Chiffrement Asym\u00e9trique Partie 2 - workboot","og_description":"\ud83d\udccb Pr\u00e9requis: \ud83c\udfaf Objectifs p\u00e9dagogiques du chiffrement asym\u00e9trique \ud83d\udd38\u00a0Partie 2 : Chiffrement Asym\u00e9trique (cl\u00e9 publique \/ priv\u00e9e) \ud83d\udd39 1. Cr\u00e9er une paire de cl\u00e9s gpg --full-generate-key","og_url":"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/","og_site_name":"workboot","article_modified_time":"2025-06-17T08:32:59+00:00","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/","url":"https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/","name":"GPG Chiffrement Asym\u00e9trique Partie 2 - workboot","isPartOf":{"@id":"https:\/\/workboot.fr\/ciela\/#website"},"datePublished":"2025-06-17T08:24:22+00:00","dateModified":"2025-06-17T08:32:59+00:00","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/workboot.fr\/ciela\/gpg-chiffrement-asymetrique\/"]}]},{"@type":"WebSite","@id":"https:\/\/workboot.fr\/ciela\/#website","url":"https:\/\/workboot.fr\/ciela\/","name":"workboot","description":"Open Source, Open Minds ","publisher":{"@id":"https:\/\/workboot.fr\/ciela\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/workboot.fr\/ciela\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/workboot.fr\/ciela\/#organization","name":"workboot","url":"https:\/\/workboot.fr\/ciela\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/workboot.fr\/ciela\/#\/schema\/logo\/image\/","url":"https:\/\/workboot.fr\/ciela\/wp-content\/uploads\/2025\/05\/logo_ciel-dorian-1.png","contentUrl":"https:\/\/workboot.fr\/ciela\/wp-content\/uploads\/2025\/05\/logo_ciel-dorian-1.png","width":1024,"height":950,"caption":"workboot"},"image":{"@id":"https:\/\/workboot.fr\/ciela\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/workboot.fr\/ciela\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"\ud83d\udccb Pr\u00e9requis: \ud83c\udfaf Objectifs p\u00e9dagogiques du chiffrement asym\u00e9trique \ud83d\udd38\u00a0Partie 2 : Chiffrement Asym\u00e9trique (cl\u00e9 publique \/ priv\u00e9e) \ud83d\udd39 1. Cr\u00e9er une paire de cl\u00e9s gpg --full-generate-key","_links":{"self":[{"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/pages\/1437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/comments?post=1437"}],"version-history":[{"count":6,"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/pages\/1437\/revisions"}],"predecessor-version":[{"id":1446,"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/pages\/1437\/revisions\/1446"}],"wp:attachment":[{"href":"https:\/\/workboot.fr\/ciela\/wp-json\/wp\/v2\/media?parent=1437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}