{"id":3648,"date":"2021-12-14T08:42:03","date_gmt":"2021-12-14T08:42:03","guid":{"rendered":"https:\/\/campus.hesge.ch\/blog-master-is\/?p=3648"},"modified":"2022-01-25T11:45:40","modified_gmt":"2022-01-25T11:45:40","slug":"chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe","status":"publish","type":"post","link":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/","title":{"rendered":"Chiffrage\/d\u00e9cryptage de texte \u00e0 l&#8217;aide de r\u00e9seau de neurones, un d\u00e9fi complexe"},"content":{"rendered":"\n<p>Auteurs : <em>DUVERNAY Fran\u00e7ois, VICENTE ALVAREZ David et VALENTE Adrian<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Probl\u00e8me<\/h1>\n\n\n\n<p>Le chiffrage de texte (\u00e9galement d\u00e9sign\u00e9 cryptage de texte) existe depuis que l\u2019Homme a su \u00e9crire. Son principe de base est de transformer n\u2019importe quel texte en clair (lisible par un autre humain) en texte qui ne devient lisible que par des personnes poss\u00e9dant la cl\u00e9 de cryptage. Les buts de la cryptographie sont d\u2019assurer la confidentialit\u00e9, l\u2019authenticit\u00e9 et l\u2019int\u00e9grit\u00e9 du message.&nbsp;<br>&nbsp;<br>Les chiffrages ou cryptages sont utilis\u00e9s dans presque tous les moyens de communication modernes et deviennent de plus en plus complexes. En tant qu\u2019utilisateurs du web, nous y sommes constamment confront\u00e9s d\u00e8s lors que nos donn\u00e9es et transactions personnelles sont chiffr\u00e9es (selon le principe de confidentialit\u00e9 et d\u2019authenticit\u00e9 de nos donn\u00e9es).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"410\" src=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920-1024x410.jpg\" alt=\"\" class=\"wp-image-3650\" srcset=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920-1024x410.jpg 1024w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920-300x120.jpg 300w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920-768x307.jpg 768w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920-1536x614.jpg 1536w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Source : <em>skylarvision, image libre de droit, <a href=\"https:\/\/pixabay.com\/fr\/illustrations\/https-site-internet-l-internet-3344700\">Pixabay<\/a><\/em><\/figcaption><\/figure>\n\n\n\n<p>De par cette omnipr\u00e9sence et de la puissance accrue des ordinateurs au fil du temps, crypter et d\u00e9crypter de mani\u00e8re efficace prennent alors de plus en plus de temps, ce qui pousse \u00e0 augmenter la complexit\u00e9 des m\u00e9thodes de chiffrement. C\u2019est ainsi que la question d\u2019automatiser le processus s\u2019est pos\u00e9e. Pour cela, il \u00e9tait tout naturel de se tourner vers des outils num\u00e9riques modernes, tels que les r\u00e9seaux de neurones. Ces derniers \u00e9voluent et sont utilis\u00e9s de plus en plus dans divers domaines, et s\u2019il est utilis\u00e9 dans l\u2019optique de facilit\u00e9 le cryptage et d\u00e9cryptage automatique des donn\u00e9es, cet outil peut r\u00e9v\u00e9ler un fort potentiel, mais il n\u2019est encore que peu explor\u00e9 dans cette voie.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">L\u2019apprentissage automatique<\/h1>\n\n\n\n<p>Le <em>deep learning<\/em> est un ensemble de m\u00e9thodes d\u2019apprentissage automatique qui est tr\u00e8s utilis\u00e9e aujourd\u2019hui dans la robotique, la sant\u00e9, la s\u00e9curit\u00e9 et bien d\u2019autres. Ces m\u00e9thodes ont permis de d\u00e9velopper la reconnaissance d\u2019image \u00e0 un niveau jamais atteint auparavant. Le but de cette approche est de pouvoir accro\u00eetre la puissance du mod\u00e8le, en augmentant la profondeur du r\u00e9seau en y ajoutant des couches de neurones successives, ce qui permettra de faire des calculs avec des donn\u00e9es plus abstraites tels que des images, des sons, mais aussi des textes.<\/p>\n\n\n\n<p>Lors de nos recherches, nous avons trouv\u00e9 un article qui traite le probl\u00e8me du d\u00e9cryptage \u00e0 l\u2019aide de l\u2019apprentissage automatique (Gomez et al. 2018 <em>Unsupervised Cipher Cracking Using Discrete GANs<\/em>). Dans cet optique, les auteurs de l\u2019article ont utilis\u00e9 un \u00ab&nbsp;R\u00e9seau antagoniste g\u00e9n\u00e9ratif&nbsp;\u00bb (GAN). Ce type de m\u00e9thode d\u2019apprentissage consiste \u00e0 mettre en comp\u00e9tition deux r\u00e9seaux&nbsp;: le g\u00e9n\u00e9rateur et le discriminateur. Le g\u00e9n\u00e9rateur essaye de reproduire des images ressemblantes aux images existantes \u00e0 partir de bruits, et c&#8217;est ensuite le discriminateur qui lui indiquera si les images g\u00e9n\u00e9r\u00e9es sont effectivement proche de ce que l&#8217;on veut, ou si ce n&#8217;est pas le cas. Durant la phase d\u2019entra\u00eenement, le g\u00e9n\u00e9rateur essaye de cr\u00e9er de meilleures images, alors que le discriminateur essaye de diff\u00e9rencier les images entre celles qui sont r\u00e9elles, et celles qui ont \u00e9t\u00e9 g\u00e9n\u00e9r\u00e9es par le g\u00e9n\u00e9rateur. Les deux r\u00e9seaux sont en comp\u00e9tition jusqu\u2019\u00e0 ce qu\u2019ils ne progressent plus.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"445\" height=\"217\" src=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg\" alt=\"Une image contenant rouge, automate\n\nDescription g\u00e9n\u00e9r\u00e9e automatiquement\" class=\"wp-image-3652\" srcset=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg 445w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots-300x146.jpg 300w\" sizes=\"(max-width: 445px) 100vw, 445px\" \/><figcaption>Source : <em>nicescene, image sous licence \u00e9tudiante Adobe, <a href=\"https:\/\/pixabay.com\/fr\/illustrations\/https-site-internet-l-internet-3344700\">Robot toy fighting<\/a><\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>Dans notre cas, nous essayons d\u2019appliquer cette technique sur du texte crypt\u00e9 et non crypt\u00e9. L\u2019id\u00e9e est que le g\u00e9n\u00e9rateur cr\u00e9e ces deux types de textes. Le but est que les textes soient si ressemblants \u00e0 notre base de donn\u00e9es de textes crypt\u00e9s\/non-crypt\u00e9s que le discriminateur n\u2019arrivera plus \u00e0 faire la diff\u00e9rence. C\u2019est \u00e0 ce moment que notre r\u00e9seau apprend implicitement le cryptage via la comp\u00e9tition et l\u2019imitation.<\/p>\n\n\n\n<p>Notre objectif est de reproduire la m\u00e9thode dans l\u2019article dont nous nous inspirons, mais en utilisant des moyens plus actuels. Nous allons observer s\u2019il y a une diff\u00e9rence en essayant de reproduire la m\u00eame marche \u00e0 suivre, puis nous allons essayer de changer des \u00e9l\u00e9ments (par exemple la fonction de co\u00fbts) afin d\u2019observer l\u2019effet sur la pr\u00e9cision et d\u2019id\u00e9alement avoir un algorithme plus pr\u00e9cis.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Apport p\u00e9dagogique<\/h1>\n\n\n\n<p>Les r\u00e9seaux de neurones sont des algorithmes d\u2019apprentissage automatique qui sont complexes et difficiles \u00e0 apprendre. L\u2019un des moyens pour nous de les apprendre tout en pratiquant est d\u2019essayer d\u2019en cr\u00e9er un. Le GAN est l\u2019un des algorithmes les plus compliqu\u00e9 \u00e0 mettre en place et \u00e0 entra\u00eener, car il implique deux r\u00e9seaux de neurones diff\u00e9rents qui se battent et des formules complexes. C\u2019est donc un d\u00e9fi cons\u00e9quent pour nous, car il constituera le premier r\u00e9seau de neurones que nous allons mettre en place et sera donc une bonne opportunit\u00e9 pour nous introduire au domaine.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"372\" height=\"249\" src=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_fkfkf.jpg\" alt=\"\" class=\"wp-image-3651\" srcset=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_fkfkf.jpg 372w, https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_fkfkf-300x201.jpg 300w\" sizes=\"(max-width: 372px) 100vw, 372px\" \/><figcaption>Source : <em>Freedomz, image sous licence \u00e9tudiante <a href=\"https:\/\/stock.adobe.com\/fr\/images\/high-school-or-college-student-group-catching-up-workbook-and-learning-tutoring-in-classroom-and-reading-doing-homework-and-lesson-practice-preparing-exam\/216304347\">Adobe<\/a><\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>De plus, nous voyons la probl\u00e9matique du d\u00e9cryptage comme un \u201csimple\u201d probl\u00e8me de traduction. Nous essayons de \u201ctraduire\u201d du texte crypt\u00e9 en texte simple et vice-versa sans connaissance pr\u00e9alable de l\u2019algorithme de cryptage ou encore de la cl\u00e9. C\u2019est un th\u00e8me qui n\u2019est pas encore tr\u00e8s explor\u00e9 dans le domaine et qui peut \u00eatre int\u00e9ressant, car il peut \u00eatre transpos\u00e9 dans de nombreux autres domaines.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Bibliographie<\/h1>\n\n\n\n<p>Image gratuite sur Pixabay &#8211; Https, Site Internet, L\u2019Internet. In&nbsp;: [en&nbsp;ligne]. [Consult\u00e9&nbsp;le&nbsp;16&nbsp;septembre&nbsp;2021]. Disponible \u00e0 l\u2019adresse&nbsp;: https:\/\/pixabay.com\/fr\/illustrations\/https-site-internet-l-internet-3344700\/.<\/p>\n\n\n\n<p>GOMEZ, Aidan N., HUANG, Sicong, ZHANG, Ivan, LI, Bryan M., OSAMA, Muhammad et KAISER, Lukasz, 2018. Unsupervised Cipher Cracking Using Discrete GANs. In&nbsp;: <em>International Conference on Learning Representations<\/em> [en&nbsp;ligne]. S.l.&nbsp;: s.n. 15 f\u00e9vrier 2018. [Consult\u00e9&nbsp;le&nbsp;16&nbsp;septembre&nbsp;2021]. Disponible \u00e0 l\u2019adresse&nbsp;: https:\/\/openreview.net\/forum?id=BkeqO7x0-.<\/p>\n\n\n\n<p>RAHUL RAY, 2019. Generative Adversarial Network (GAN). In&nbsp;: <em>GeeksforGeeks<\/em> [en&nbsp;ligne]. 15 janvier 2019. [Consult\u00e9&nbsp;le&nbsp;16&nbsp;septembre&nbsp;2021]. Disponible \u00e0 l\u2019adresse&nbsp;: https:\/\/www.geeksforgeeks.org\/generative-adversarial-network-gan\/.<\/p>\n\n\n\n<p>ROCCA, Joseph, 2021. Understanding Generative Adversarial Networks (GANs). In&nbsp;: <em>Medium<\/em> [en&nbsp;ligne]. 21 mars 2021. [Consult\u00e9&nbsp;le&nbsp;16&nbsp;septembre&nbsp;2021]. Disponible \u00e0 l\u2019adresse&nbsp;: https:\/\/towardsdatascience.com\/understanding-generative-adversarial-networks-gans-cd6e4651a29.<\/p>\n\n\n\n<p>STOCK.ADOBE.COM, Photo Stock High school or college student group catching up workbook and learning tutoring in classroom and reading, doing homework and lesson practice preparing exam. In&nbsp;: <em>Adobe Stock<\/em> [en&nbsp;ligne]. [Consult\u00e9&nbsp;le&nbsp;16&nbsp;septembre&nbsp;2021&nbsp;a]. Disponible \u00e0 l\u2019adresse&nbsp;: https:\/\/stock.adobe.com\/fr\/images\/high-school-or-college-student-group-catching-up-workbook-and-learning-tutoring-in-classroom-and-reading-doing-homework-and-lesson-practice-preparing-exam\/216304347. (Licence \u00e9tudiante)<\/p>\n\n\n\n<p>STOCK.ADOBE.COM, Photo Stock robot toy fighting. In&nbsp;: <em>Adobe Stock<\/em> [en&nbsp;ligne]. [Consult\u00e9&nbsp;le&nbsp;16&nbsp;septembre&nbsp;2021&nbsp;b]. Disponible \u00e0 l\u2019adresse&nbsp;: https:\/\/stock.adobe.com\/fr\/images\/robot-toy-fighting\/63269388. (Licence \u00e9tudiante)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Auteurs : DUVERNAY Fran\u00e7ois, VICENTE ALVAREZ David et VALENTE Adrian Probl\u00e8me Le chiffrage de texte (\u00e9galement d\u00e9sign\u00e9 cryptage de texte) existe depuis que l\u2019Homme a su \u00e9crire. Son principe de base est de transformer n\u2019importe quel texte en clair (lisible &hellip; <a href=\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/\">Lire la suite\u00ad\u00ad<\/a><\/p>\n","protected":false},"author":84,"featured_media":3652,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,16,19,12],"tags":[378,299,25,379,381,53,49,50],"class_list":["post-3648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advanced-neural-net","category-big-data","category-machine-learning","category-reflexion-is","tag-advanced-neural-net","tag-apprentissage-automatique","tag-big-data","tag-chiffrage-de-texte","tag-cryptographie","tag-deep-learning","tag-gan","tag-machine-learning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Chiffrage\/d\u00e9cryptage de texte \u00e0 l&#039;aide de r\u00e9seau de neurones, un d\u00e9fi complexe - Recherche d&#039;Id\u00e9eS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chiffrage\/d\u00e9cryptage de texte \u00e0 l&#039;aide de r\u00e9seau de neurones, un d\u00e9fi complexe - Recherche d&#039;Id\u00e9eS\" \/>\n<meta property=\"og:description\" content=\"Auteurs : DUVERNAY Fran\u00e7ois, VICENTE ALVAREZ David et VALENTE Adrian Probl\u00e8me Le chiffrage de texte (\u00e9galement d\u00e9sign\u00e9 cryptage de texte) existe depuis que l\u2019Homme a su \u00e9crire. Son principe de base est de transformer n\u2019importe quel texte en clair (lisible &hellip; Lire la suite\u00ad\u00ad\" \/>\n<meta property=\"og:url\" content=\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/\" \/>\n<meta property=\"og:site_name\" content=\"Recherche d&#039;Id\u00e9eS\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-14T08:42:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-25T11:45:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"445\" \/>\n\t<meta property=\"og:image:height\" content=\"217\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adrian Valente\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adrian Valente\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/\",\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/\",\"name\":\"Chiffrage\/d\u00e9cryptage de texte \u00e0 l'aide de r\u00e9seau de neurones, un d\u00e9fi complexe - Recherche d&#039;Id\u00e9eS\",\"isPartOf\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg\",\"datePublished\":\"2021-12-14T08:42:03+00:00\",\"dateModified\":\"2022-01-25T11:45:40+00:00\",\"author\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/1a58997c32bc37fee850ce0fd036bf5d\"},\"breadcrumb\":{\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#primaryimage\",\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg\",\"contentUrl\":\"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg\",\"width\":445,\"height\":217},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/campus.hesge.ch\/blog-master-is\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chiffrage\/d\u00e9cryptage de texte \u00e0 l&#8217;aide de r\u00e9seau de neurones, un d\u00e9fi complexe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#website\",\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/\",\"name\":\"Recherche d&#039;Id\u00e9eS\",\"description\":\"Carnet de recherche des \u00e9tudiants du Master en sciences de l&#039;information et des donn\u00e9es (Information Science - IS) de la Haute \u00e9cole de gestion de Gen\u00e8ve\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/campus.hesge.ch\/blog-master-is\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/1a58997c32bc37fee850ce0fd036bf5d\",\"name\":\"Adrian Valente\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a1ff134687f2360ebcc372260c4c1efc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a1ff134687f2360ebcc372260c4c1efc?s=96&d=mm&r=g\",\"caption\":\"Adrian Valente\"},\"url\":\"https:\/\/campus.hesge.ch\/blog-master-is\/author\/adrian-v\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chiffrage\/d\u00e9cryptage de texte \u00e0 l'aide de r\u00e9seau de neurones, un d\u00e9fi complexe - Recherche d&#039;Id\u00e9eS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/","og_locale":"fr_FR","og_type":"article","og_title":"Chiffrage\/d\u00e9cryptage de texte \u00e0 l'aide de r\u00e9seau de neurones, un d\u00e9fi complexe - Recherche d&#039;Id\u00e9eS","og_description":"Auteurs : DUVERNAY Fran\u00e7ois, VICENTE ALVAREZ David et VALENTE Adrian Probl\u00e8me Le chiffrage de texte (\u00e9galement d\u00e9sign\u00e9 cryptage de texte) existe depuis que l\u2019Homme a su \u00e9crire. Son principe de base est de transformer n\u2019importe quel texte en clair (lisible &hellip; Lire la suite\u00ad\u00ad","og_url":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/","og_site_name":"Recherche d&#039;Id\u00e9eS","article_published_time":"2021-12-14T08:42:03+00:00","article_modified_time":"2022-01-25T11:45:40+00:00","og_image":[{"width":445,"height":217,"url":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg","type":"image\/jpeg"}],"author":"Adrian Valente","twitter_card":"summary_large_image","twitter_image":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/https-g91138cd19_1920.jpg","twitter_misc":{"\u00c9crit par":"Adrian Valente","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/","url":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/","name":"Chiffrage\/d\u00e9cryptage de texte \u00e0 l'aide de r\u00e9seau de neurones, un d\u00e9fi complexe - Recherche d&#039;Id\u00e9eS","isPartOf":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#website"},"primaryImageOfPage":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#primaryimage"},"image":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#primaryimage"},"thumbnailUrl":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg","datePublished":"2021-12-14T08:42:03+00:00","dateModified":"2022-01-25T11:45:40+00:00","author":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/1a58997c32bc37fee850ce0fd036bf5d"},"breadcrumb":{"@id":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#primaryimage","url":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg","contentUrl":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-content\/uploads\/2021\/10\/1_robots.jpg","width":445,"height":217},{"@type":"BreadcrumbList","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/chiffrage-decryptage-de-texte-a-laide-de-reseau-de-neurone-un-defi-complexe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/campus.hesge.ch\/blog-master-is\/"},{"@type":"ListItem","position":2,"name":"Chiffrage\/d\u00e9cryptage de texte \u00e0 l&#8217;aide de r\u00e9seau de neurones, un d\u00e9fi complexe"}]},{"@type":"WebSite","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#website","url":"https:\/\/campus.hesge.ch\/blog-master-is\/","name":"Recherche d&#039;Id\u00e9eS","description":"Carnet de recherche des \u00e9tudiants du Master en sciences de l&#039;information et des donn\u00e9es (Information Science - IS) de la Haute \u00e9cole de gestion de Gen\u00e8ve","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/campus.hesge.ch\/blog-master-is\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/1a58997c32bc37fee850ce0fd036bf5d","name":"Adrian Valente","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/campus.hesge.ch\/blog-master-is\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a1ff134687f2360ebcc372260c4c1efc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1ff134687f2360ebcc372260c4c1efc?s=96&d=mm&r=g","caption":"Adrian Valente"},"url":"https:\/\/campus.hesge.ch\/blog-master-is\/author\/adrian-v\/"}]}},"_links":{"self":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts\/3648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/comments?post=3648"}],"version-history":[{"count":10,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts\/3648\/revisions"}],"predecessor-version":[{"id":3777,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/posts\/3648\/revisions\/3777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/media\/3652"}],"wp:attachment":[{"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/media?parent=3648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/categories?post=3648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/campus.hesge.ch\/blog-master-is\/wp-json\/wp\/v2\/tags?post=3648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}