{"id":857,"date":"2026-01-07T17:09:25","date_gmt":"2026-01-07T16:09:25","guid":{"rendered":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/2026\/01\/07\/quand-le-code-source-est-ill-gal-la-guerre-de-la-cryptographie-en-t-shirt\/"},"modified":"2026-01-20T17:21:18","modified_gmt":"2026-01-20T16:21:18","slug":"quand-le-code-source-est-ill-gal-la-guerre-de-la-cryptographie-en-t-shirt","status":"publish","type":"post","link":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/quand-le-code-source-est-ill-gal-la-guerre-de-la-cryptographie-en-t-shirt\/","title":{"rendered":"Quand le code source est ill\u00e9gal : la guerre de la cryptographie en T-shirt"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFF59B\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_5,2_5&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _dynamic_attributes=\u00a0\u00bbcontent\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb|700|||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#000000&Prime; text_font_size=\u00a0\u00bb40px\u00a0\u00bb text_line_height=\u00a0\u00bb1.1em\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90aXRsZSIsInNldHRpbmdzIjp7ImJlZm9yZSI6IiIsImFmdGVyIjoiIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _dynamic_attributes=\u00a0\u00bbcontent\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9jYXRlZ29yaWVzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9uIiwic2VwYXJhdG9yIjoiIHwgIiwiY2F0ZWdvcnlfdHlwZSI6InByb2plY3RfY2F0ZWdvcnkiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _dynamic_attributes=\u00a0\u00bbcontent\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90YWdzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9uIiwic2VwYXJhdG9yIjoiIHwgIiwiY2F0ZWdvcnlfdHlwZSI6InByb2plY3RfdGFnIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.sourcecode-exhibition.softwareheritage.org\/wp-content\/uploads\/2025\/12\/Picto_SCE_5.png\u00a0\u00bb title_text=\u00a0\u00bbPicto_SCE_5&Prime; align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#000000&Prime; background_image=\u00a0\u00bbhttps:\/\/www.sourcecode-exhibition.softwareheritage.org\/wp-content\/uploads\/2026\/01\/Visuel_projet2.jpg\u00a0\u00bb parallax=\u00a0\u00bbon\u00a0\u00bb custom_padding=\u00a0\u00bb59px||108px|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.sourcecode-exhibition.softwareheritage.org\/wp-content\/uploads\/2026\/01\/Tshirt_RSA.png\u00a0\u00bb title_text=\u00a0\u00bbTshirt_RSA\u00a0\u00bb module_class=\u00a0\u00bblegende2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb border_color_all=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb0px|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text module_class=\u00a0\u00bblegende\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb text_font_size=\u00a0\u00bb20px\u00a0\u00bb background_color=\u00a0\u00bb#000000&Prime; min_height=\u00a0\u00bb25.8px\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb6px|10px|6px|10px|true|true\u00a0\u00bb custom_css_free_form=\u00a0\u00bb.legende   {||   ||  &#8211;p: 12px; \/* taille du carr\u00e9 mang\u00e9 *\/||||  padding: calc(2rem + var(&#8211;p));||  width: 320px;||  font-family: monospace;||||  clip-path: polygon(||    \/* haut gauche *\/||    0 0,||    calc(100% &#8211; var(&#8211;p)) 0,||    calc(100% &#8211; var(&#8211;p)) var(&#8211;p),||    100% var(&#8211;p),||    100% 100%,||    var(&#8211;p) 100%,||    var(&#8211;p) calc(100% &#8211; var(&#8211;p)),||    0 calc(100% &#8211; var(&#8211;p))||  );||}\u00a0\u00bb border_color_all=\u00a0\u00bb#FFFFFF\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Le code source du chiffrement RSA imprim. sur un T-shirt, une des versions du Perl RSA . munitions . T-Shirt d\u2019Adam Back, 1995.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Cette \u00ab T-shirtisation \u00bb est due \u00e0 Joel Furr, mais le code a aussi \u00e9t\u00e9 reproduit sous des formes vari\u00e9es, par exemple en tatouage, autant d\u2019expressions de la lutte pour la lib\u00e9ralisation de la cryptographie.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.sourcecode-exhibition.softwareheritage.org\/wp-content\/uploads\/2026\/01\/IMG_20251123_151602-scaled.jpg\u00a0\u00bb title_text=\u00a0\u00bbIMG_20251123_151602&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><span style=\"color: #ffffff;\">Au dos de l\u2019adaptation fran\u00e7aise du T-Shirt, la mention en bas renvoie \u00e0 la loi fran\u00e7aise de l\u2019\u00e9poque et au SCSSI \u2013 Service central de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, un des anc\u00eatres de l\u2019actuelle ANSSI \u2013 Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1><strong>\u00c0 propos du code<\/strong><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"font-weight: 400;\">Le code source peut \u00eatre consid\u00e9r\u00e9 par certains comme ill\u00e9gal en soi. D\u00e8s les lendemains de la Seconde Guerre mondiale, les \u00c9tats-Unis engag\u00e8rent une politique tr\u00e8s restrictive sur l\u2019utilisation et l\u2019exportation des techniques de chiffrement. \u00c0 l\u2019apog\u00e9e des \u00ab Crypto Wars \u00bb \u2013 la lutte pour la lib\u00e9ralisation du chiffrement \u2013 au d\u00e9but des ann\u00e9es 1990, des cypherpunks d\u00e9velopp\u00e8rent cette mise en \u0153uvre de l\u2019algorithme de cryptographie RSA en langage Perl.  <\/p>\n<p style=\"font-weight: 400;\">Tenant ainsi en quelques lignes, le chiffrement RSA pouvait \u00eatre largement partag\u00e9, notamment sur un T-shirt. Le but est \u00e0 la fois de troller l\u2019\u00c9tat et de pointer les incoh\u00e9rences des lois : si la cryptographie \u00e9tait interdite d\u2019exportation, qu\u2019allait-il arriver \u00e0 un voyageur amen\u00e9 \u00e0 passer les fronti\u00e8res \u00e0 l\u2019a\u00e9roport avec ce code sur un T-shirt ? Pourrait-il embarquer ?  <\/p>\n<p style=\"font-weight: 400;\">D\u2019autres codes sources ont \u00e9t\u00e9 \u00e9galement consid\u00e9r\u00e9s comme ill\u00e9gaux, par exemple par certains lobbies, et diffus\u00e9s largement par les internautes pour se moquer de ces lois. Ce fut le cas par exemple du DeCSS permettant de lire des DVD verrouill\u00e9s contre la copie. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text module_class=\u00a0\u00bblegende\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbvcr_osd_mono|||on|||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb text_font_size=\u00a0\u00bb28px\u00a0\u00bb text_line_height=\u00a0\u00bb1.5em\u00a0\u00bb background_color=\u00a0\u00bb#000000&Prime; custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#FFFFFF\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>LE CHIFFREMENT RSA<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=\u00a0\u00bblegende2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_text_color=\u00a0\u00bb#000000&Prime; text_font_size=\u00a0\u00bb19px\u00a0\u00bb text_line_height=\u00a0\u00bb1.5em\u00a0\u00bb background_color=\u00a0\u00bb#FCEC45&Prime; custom_margin=\u00a0\u00bb-42px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Le chiffrement RSA \u2013 aux initiales de ses inventeurs Rivest, Shamir et Adleman \u2013 est un algorithme de cryptographie d\u00e9crit en 1977, tr\u00e8s utilis\u00e9 pour transmettre des informations confidentielles de fa\u00e7on s\u00e9curis\u00e9e sur Internet, pour le courrier \u00e9lectronique ou l\u2019\u00e9change d\u2019informations bancaires.<\/p>\n<p style=\"font-weight: 400;\">Les technologies de chiffrement \u00e9taient consid\u00e9r\u00e9es comme des technologies \u00e0 usages \u00e0 la fois civils et militaires par le gouvernement des \u00c9tats- Unis, et ainsi r\u00e9gul\u00e9es comme telles.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFF59B\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1><strong>BIOGRAPHIE<\/strong><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"font-weight: 400;\">St\u00e9phane Bortzmeyer travaille \u00e0 l\u2019Afnic. Sp\u00e9cialiste des protocoles r\u00e9seaux, il programme peu, surtout des petits utilitaires. Ses langages de programmation favoris sont C, Zig, Go, Python, Elixir et Haskell. Il aime r\u00e9fl\u00e9chir aux questions sociales et politiques que pose l\u2019informatique, et notamment l\u2019Internet. En 1995, il a \u00e9crit une tribune dans <em>Le&nbsp;Monde<\/em> qui fut le premier texte en France r\u00e9clamant la lib\u00e9ralisation de la cryptographie.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb26px\u00a0\u00bb header_font=\u00a0\u00bbEscuela-regular||||||||\u00a0\u00bb header_font_size=\u00a0\u00bb27px\u00a0\u00bb background_color=\u00a0\u00bb#FCEC45&Prime; width=\u00a0\u00bb79%\u00a0\u00bb custom_padding=\u00a0\u00bb20px||20px|20px|true|false\u00a0\u00bb border_radii=\u00a0\u00bbon|100px|100px|100px|100px\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<strong>#Activism<\/strong>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb26px\u00a0\u00bb header_font=\u00a0\u00bbEscuela-regular||||||||\u00a0\u00bb header_font_size=\u00a0\u00bb27px\u00a0\u00bb background_color=\u00a0\u00bb#FCEC45&Prime; width=\u00a0\u00bb79%\u00a0\u00bb custom_padding=\u00a0\u00bb20px||20px|20px|true|false\u00a0\u00bb border_radii=\u00a0\u00bbon|100px|100px|100px|100px\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><strong>#Encryption<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb26px\u00a0\u00bb header_font=\u00a0\u00bbEscuela-regular||||||||\u00a0\u00bb header_font_size=\u00a0\u00bb27px\u00a0\u00bb background_color=\u00a0\u00bb#FCEC45&Prime; width=\u00a0\u00bb79%\u00a0\u00bb custom_padding=\u00a0\u00bb20px||20px|20px|true|false\u00a0\u00bb border_radii=\u00a0\u00bbon|100px|100px|100px|100px\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p><strong>#Hacking<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb border_color_all=\u00a0\u00bb#FFFFFF\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h2><strong>Additional references<\/strong><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">L\u2019histoire du code RSA en Perl : Adam Back, \u00ab The quest for the most diminutive munitions program \u00bb<\/span><a href=\"http:\/\/www.cypherspace.org\/rsa\/story.html\"> <span style=\"font-weight: 400;\">http:\/\/www.cypherspace.org\/rsa\/story.html<\/span><\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">La plus ancienne copie de la page Web mentionn\u00e9e sur le T-shirt<\/span><span style=\"font-weight: 400;\"> : \u00ab<\/span><span style=\"font-weight: 400;\"> perl RSA \u00ab\u00a0munitions\u00a0\u00bb T-Shirt homepage \u00bb<\/span><a href=\"https:\/\/web.archive.org\/web\/19981201074243\/\"> <\/a><span style=\"font-weight: 400;\">https:\/\/web.archive.org\/web\/19981201074243\/<\/a><\/span><span style=\"font-weight: 400;\"><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<ul>\n<li>\u00ab The original post to the cypherpunks list, followed by Hal Finney\u2019s reply where he picks the program apart and explains how it works \u00bb, <i>Date: 9 Mar 1995 04:06:20 -0500 From: aba@atlas.ex.ac.uk To: cypherpunks@toad.com Subject: perl hackery, export-a-crypt-system<\/i><a href=\"http:\/\/www.cypherspace.org\/rsa\/org-post.html\"> <\/a><a href=\"http:\/\/www.cypherspace.org\/rsa\/org-post.html\">http:\/\/www.cypherspace.org\/rsa\/org-post.html<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<ul>\n<li>Le T-shirt, devenu collector, se trouve sur des plateformes de ventes d\u2019occasion, par exemple sur eBay<br \/><a href=\"https:\/\/www.ebay.com\/itm\/405589746700\">https:\/\/www.ebay.com\/itm\/405589746700<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<ul>\n<li>Jonathan Touboul. \u00ab Nombres premiers et cryptologie\u202f: l\u2019algorithme RSA \u00bb. <i>Interstices<\/i> . 20 d\u00e9cembre 2007  <a href=\"https:\/\/interstices.info\/nombres-premiers-et-cryptologie-lalgorithme-rsa\/\"> <\/a><a href=\"https:\/\/interstices.info\/nombres-premiers-et-cryptologie-lalgorithme-rsa\/\">https:\/\/interstices.info\/nombres-premiers-et-cryptologie-lalgorithme-rsa\/<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.5&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<ul>\n<li>A<span>nne-Sophie Letellier, \u00ab Les Crypto Wars \u00bb.<\/span><span> <\/span><i>\u00c0 b\u00e2bord\u202f !. Revue sociale et politique<\/i><span>, n<\/span><span>o<\/span><span> <\/span><span>85, automne 2020<\/span><a href=\"https:\/\/www.ababord.org\/Les-Crypto-Wars\">https:\/\/www.ababord.org\/Les-Crypto-Wars<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le code source du chiffrement RSA imprim. sur un T-shirt, une des versions du Perl RSA . munitions . T-Shirt d\u2019Adam Back, 1995.Cette \u00ab T-shirtisation \u00bb est due \u00e0 Joel Furr, mais le code a aussi \u00e9t\u00e9 reproduit sous des formes vari\u00e9es, par exemple en tatouage, autant d\u2019expressions de la lutte pour la lib\u00e9ralisation de [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":844,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[108],"tags":[110,111,109],"class_list":["post-857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-miroir-de-la-societe","tag-chiffrement","tag-hacking","tag-militantisme"],"_links":{"self":[{"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/posts\/857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/comments?post=857"}],"version-history":[{"count":7,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/posts\/857\/revisions"}],"predecessor-version":[{"id":1062,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/posts\/857\/revisions\/1062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/media\/844"}],"wp:attachment":[{"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/media?parent=857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/categories?post=857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sourcecode-exhibition.softwareheritage.org\/fr\/wp-json\/wp\/v2\/tags?post=857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}