{"id":13616,"date":"2023-04-19T07:24:08","date_gmt":"2023-04-19T07:24:08","guid":{"rendered":"https:\/\/www.stratign.com\/?page_id=13616"},"modified":"2024-03-05T10:52:54","modified_gmt":"2024-03-05T06:52:54","slug":"hardware-based-encryption-device","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/","title":{"rendered":"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; text_transform=&#8221;uppercase&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant les donn\u00e9es avant leur transmission et en les d\u00e9cryptant \u00e0 leur r\u00e9ception entre les appareils.[\/tm_heading][\/vc_column][vc_column offset=&#8221;vc_col-md-7&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le dispositif de cryptage mat\u00e9riel fonctionne uniquement sur du mat\u00e9riel, sans microcontr\u00f4leur ni noyau, et sans logiciel, ce qui le rend insensible aux virus\/programmes malveillants. L&#8217;objectif de l&#8217;appareil est de crypter des donn\u00e9es dans n&#8217;importe quel format, en utilisant des fichiers de donn\u00e9es provenant d&#8217;une cl\u00e9 USB ou Ethernet, et de transf\u00e9rer les donn\u00e9es crypt\u00e9es vers un p\u00e9riph\u00e9rique USB cible ou sur un domaine public.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]L&#8217;approche mat\u00e9rielle de l&#8217;appareil offre stabilit\u00e9 et robustesse, minimisant le risque de probl\u00e8mes ou de vuln\u00e9rabilit\u00e9s li\u00e9s aux logiciels et garantissant des performances constantes.[\/tm_heading][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;lg:20&#8243;][tm_spacer size=&#8221;lg:20&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704711854075{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques g\u00e9n\u00e9rales :[\/tm_heading][vc_column_text]<\/p>\n<ul>\n<li>L&#8217;appareil fonctionne uniquement sur du mat\u00e9riel, ce qui garantit un niveau \u00e9lev\u00e9 de s\u00e9curit\u00e9 et de r\u00e9sistance aux attaques bas\u00e9es sur des logiciels.<\/li>\n<li>L&#8217;architecture bas\u00e9e sur 3 Field Programmable Gate Arrays (FPGA) offre des capacit\u00e9s de traitement robustes et flexibles pour les t\u00e2ches de cryptage.<\/li>\n<li>Le d\u00e9marrage s\u00e9curis\u00e9 v\u00e9rifie et authentifie le microprogramme avant le d\u00e9marrage de l&#8217;appareil, garantissant que seul le microprogramme de confiance est ex\u00e9cut\u00e9.<\/li>\n<li>Communication s\u00e9curis\u00e9e via l&#8217;interface Ethernet, utilisant une double couche de cryptage pour une meilleure protection des donn\u00e9es pendant la transmission.<\/li>\n<li>Chargement automatique ou manuel des cl\u00e9s de cryptage, \u00e0 l&#8217;aide d&#8217;une cl\u00e9 Crypto-Key authentifi\u00e9e pour une gestion s\u00e9curis\u00e9e et pratique des cl\u00e9s.<\/li>\n<li>Un syst\u00e8me d&#8217;authentification convivial via \u00e9cran LCD et clavier offre une interface pratique et intuitive pour les proc\u00e9dures d&#8217;authentification.<\/li>\n<li>Le m\u00e9canisme d&#8217;inviolabilit\u00e9, avec une batterie d\u00e9di\u00e9e, prot\u00e8ge contre les manipulations physiques et garantit l&#8217;int\u00e9grit\u00e9 de l&#8217;appareil.<\/li>\n<li>Le g\u00e9n\u00e9rateur de nombres al\u00e9atoires (g\u00e9n\u00e9rateur de nombres al\u00e9atoires physique) dont la conformit\u00e9 aux normes NIST a \u00e9t\u00e9 d\u00e9montr\u00e9e, renforce la s\u00e9curit\u00e9 des cl\u00e9s de cryptage g\u00e9n\u00e9r\u00e9es.<\/li>\n<li>Le ch\u00e2ssis montable en rack de 2U permet une int\u00e9gration facile dans les configurations de racks de serveurs existants pour une utilisation efficace de l&#8217;espace et une organisation optimale.<\/li>\n<\/ul>\n<p>[\/vc_column_text][tm_spacer size=&#8221;lg:20&#8243;][tm_spacer size=&#8221;lg:20&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704711872575{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques de s\u00e9curit\u00e9 :[\/tm_heading][vc_column_text]<\/p>\n<ul>\n<li>Le protocole de communication et les algorithmes cryptographiques sont impl\u00e9ment\u00e9s dans le mat\u00e9riel pour une s\u00e9curit\u00e9 accrue.<\/li>\n<li>La fonction d&#8217;effacement d&#8217;urgence permet d&#8217;effacer rapidement les cl\u00e9s, avec ou sans alimentation \u00e9lectrique.<\/li>\n<li>Plusieurs options pour les algorithmes cryptographiques, y compris AES-256 ou des algorithmes certifi\u00e9s au niveau national.<\/li>\n<li>Le dispositif est con\u00e7u pour identifier et prot\u00e9ger contre les attaques par rejeu.<\/li>\n<li>Des m\u00e9canismes d&#8217;authentification forte de l&#8217;utilisateur bas\u00e9s sur des syst\u00e8mes de cartes sont utilis\u00e9s.<\/li>\n<li>Des interfaces personnalisables et des interfaces USB standard sont utilis\u00e9es pour le stockage des cl\u00e9s.<\/li>\n<li>L&#8217;action de sabotage d\u00e9clenche l&#8217;effacement du contexte de l&#8217;appareil en cas de tentative de sabotage physique.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][tm_spacer size=&#8221;lg:10&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Network segmentation is an important element of IT security concepts. The Secure Domain Transition (SDoT) product family allows controlled unidirectional or bi-directional exchange of data between networks\/systems of different sensitivity level.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13616","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL - Stratign<\/title>\n<meta name=\"description\" content=\"Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant et d\u00e9cryptant les donn\u00e9es entre les appareils.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL - Stratign\" \/>\n<meta property=\"og:description\" content=\"Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant et d\u00e9cryptant les donn\u00e9es entre les appareils.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T06:52:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hardware-based-encryption-device\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hardware-based-encryption-device\\\/\",\"name\":\"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2023-04-19T07:24:08+00:00\",\"dateModified\":\"2024-03-05T06:52:54+00:00\",\"description\":\"Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant et d\u00e9cryptant les donn\u00e9es entre les appareils.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hardware-based-encryption-device\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hardware-based-encryption-device\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hardware-based-encryption-device\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL - Stratign","description":"Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant et d\u00e9cryptant les donn\u00e9es entre les appareils.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/","og_locale":"en_US","og_type":"article","og_title":"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL - Stratign","og_description":"Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant et d\u00e9cryptant les donn\u00e9es entre les appareils.","og_url":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T06:52:54+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/","url":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/","name":"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2023-04-19T07:24:08+00:00","dateModified":"2024-03-05T06:52:54+00:00","description":"Le dispositif de cryptage mat\u00e9riel est un mat\u00e9riel sp\u00e9cialis\u00e9 qui s\u00e9curise la communication en cryptant et d\u00e9cryptant les donn\u00e9es entre les appareils.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/hardware-based-encryption-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"DISPOSITIF DE CRYPTAGE BAS\u00c9 SUR LE MAT\u00c9RIEL"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/13616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=13616"}],"version-history":[{"count":21,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/13616\/revisions"}],"predecessor-version":[{"id":15149,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/13616\/revisions\/15149"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=13616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}