{"id":4306,"date":"2021-09-21T13:16:59","date_gmt":"2021-09-21T12:16:59","guid":{"rendered":"https:\/\/cyberschool.univ-rennes.fr\/?page_id=4306"},"modified":"2026-03-12T14:31:07","modified_gmt":"2026-03-12T13:31:07","slug":"codes-correcteurs-en-cryptographie","status":"publish","type":"page","link":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/","title":{"rendered":"Codes correcteurs en cryptographie"},"content":{"rendered":"\n<section class=\"txt\">\n    <div class=\"container\">\n        <div class=\"bloc-txt\">\n                            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Course description<\/h2>\n                        <div class=\"contain-txt\">\n<p>La cryptographie \u00e0 base de codes est centr\u00e9e sur des probl\u00e8mes issus de la th\u00e9orie des codes qui sont suffisamment difficiles pour servir de primitives cryptographiques.<\/p>\n<p>En 1978, Mc Eliece a propos\u00e9 un nouveau cryptosyst\u00e8me \u00e0 cl\u00e9 publique bas\u00e9 sur la th\u00e9orie des codes. La s\u00e9curit\u00e9 de ce cryptosyst\u00e8me repose sur le probl\u00e8me du d\u00e9codage g\u00e9n\u00e9ral pour un code lin\u00e9aire al\u00e9atoire, probl\u00e8me qui r\u00e9sisterait \u00e0 des attaques par des ordinateurs quantiques.<\/p>\n<p>Le but de ce cours est de pr\u00e9senter quelques familles de codes structur\u00e9s sur lesquels reposent divers cryptosyst\u00e8mes. On donnera un aper\u00e7u des attaques structurelles sur certaines de ces familles de codes ainsi que des attaques classiques sur le probl\u00e8me du d\u00e9codage g\u00e9n\u00e9ral.<\/p>\n<ul>\n<li>Cryptosyst\u00e8mes de McEliece et de Niederreiter : g\u00e9n\u00e9ralit\u00e9s (rappels si vus en M1)<\/li>\n<li>Codes issus de la g\u00e9om\u00e9trie alg\u00e9brique (d\u00e9finition, construction\u2026)<\/li>\n<li>Codes en m\u00e9trique rang : polyn\u00f4mes lin\u00e9aris\u00e9s, codes de Gabidulin, d\u00e9codage<\/li>\n<li>Cryptosyst\u00e8mes \u00e0 base de codes de Gabidulin en m\u00e9trique rang et \u00e0 base de codes de Reed-Solomon et de codes AG en m\u00e9trique de Hamming : attaques structurelles<\/li>\n<li>Signature type CFS<\/li>\n<li>Codes issus de la standardisation du NIST<\/li>\n<li>Si le temps le permet, attaques sur les messages (ISD) et par canaux cach\u00e9s<\/li>\n<\/ul>\n<\/div>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"tuiles\">\n    <div class=\"container\">\n                <div class=\"bloc\">\n            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Skills to acquire<\/h2>\n            <p>Conna\u00eetre et \u00eatre en mesure d\u2019utiliser dans des applications r\u00e9elles la cryptographie \u00e0 base de codes correcteurs d\u2019erreurs, en particulier dans un cadre post-quantique.<\/p>\n\n                    <\/div>\n                <div class=\"bloc\">\n            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Keywords<\/h2>\n            <p>Codes correcteurs, cryptographie post-quantique.<\/p>\n\n                    <\/div>\n            <\/div>\n<\/section>\n\n\n\n<section class=\"txt\">\n    <div class=\"container\">\n        <div class=\"bloc-txt\">\n                            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Biography<\/h2>\n                        <div class=\"contain-txt\">\n<div class=\"contain-txt\">\n<p><strong>Jade Nardi<\/strong> est chercheuse CNRS sur les codes correcteurs d\u2019erreurs.<\/p>\n<\/div>\n<\/div>\n\n        <\/div>\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":11605,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Codes correcteurs en cryptographie - CyberSchool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Codes correcteurs en cryptographie - CyberSchool\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSchool\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CSchoolRennes\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:31:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/02\/cover-social-network.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CSchoolRennes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/\",\"name\":\"Codes correcteurs en cryptographie - CyberSchool\",\"isPartOf\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\"},\"datePublished\":\"2021-09-21T12:16:59+00:00\",\"dateModified\":\"2026-03-12T13:31:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Education\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master\u2019s and postgraduate programmes\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Study programme of the Master&rsquo;s Mathematics and Applications \u2013 IT Mathematics and Cryptography\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Codes correcteurs en cryptographie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\",\"name\":\"CyberSchool\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Codes correcteurs en cryptographie - CyberSchool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/","og_locale":"en_US","og_type":"article","og_title":"Codes correcteurs en cryptographie - CyberSchool","og_url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/","og_site_name":"CyberSchool","article_publisher":"https:\/\/www.facebook.com\/CSchoolRennes\/","article_modified_time":"2026-03-12T13:31:07+00:00","og_image":[{"width":1500,"height":500,"url":"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/02\/cover-social-network.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CSchoolRennes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/","name":"Codes correcteurs en cryptographie - CyberSchool","isPartOf":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website"},"datePublished":"2021-09-21T12:16:59+00:00","dateModified":"2026-03-12T13:31:07+00:00","breadcrumb":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Education","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/"},{"@type":"ListItem","position":3,"name":"Master\u2019s and postgraduate programmes","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/"},{"@type":"ListItem","position":4,"name":"Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/"},{"@type":"ListItem","position":5,"name":"Study programme of the Master&rsquo;s Mathematics and Applications \u2013 IT Mathematics and Cryptography","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/"},{"@type":"ListItem","position":6,"name":"Codes correcteurs en cryptographie"}]},{"@type":"WebSite","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/","name":"CyberSchool","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/4306"}],"collection":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/comments?post=4306"}],"version-history":[{"count":13,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/4306\/revisions"}],"predecessor-version":[{"id":18472,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/4306\/revisions\/18472"}],"up":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11605"}],"wp:attachment":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media?parent=4306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}