We may earn an affiliate commission when you visit our partners.
Course image
Romaric Ludinard, Hélène Le Bouder, and Gaël Thomas

Ce mooc a été conçu par :

- Romaric Ludinard (Enseignant-chercheur, IMT Atlantique)

- Hélène Le Bouder (Enseignante-chercheuse, IMT Atlantique)

- Gaël Thomas (Docteur en cryptologie)

Read more

Ce mooc a été conçu par :

- Romaric Ludinard (Enseignant-chercheur, IMT Atlantique)

- Hélène Le Bouder (Enseignante-chercheuse, IMT Atlantique)

- Gaël Thomas (Docteur en cryptologie)

Ce mooc est destiné aux personnes souhaitant comprendre les enjeux de la blockchain, les appliquer et les utiliser pour la création d’applications basées sur blockchain.

Que vous soyez étudiant.e.s en sciences, ingénieur.e.s en informatique, DSI ou entrepreneur.se.s, ce mooc est pour vous !

En suivant ce mooc, vous apprendrez à :

- Décrire les principes de fonctionnement de la technologie blockchain et comparer les différents types de blockchain (publiques, privées, consortium)

- Expliquer les propriétés cryptographiques nécessaires pour la mise en oeuvre d’une blockchain : intégrité, authentification et non-répudiation

- Expliquer le fonctionnement des signatures numériques (protocole de signature ECDSA, fonction de hachage SHA-256)

- Illustrer et manipuler le protocole Bitcoin : arbres de Merkle, mécanisme de preuve de travail (Proof-of-work), gestion et historique des transactions, auditabilité, intégrité des blocs et des mises à jour de la chaîne.

Ce MOOC a reçu le soutien financier de la Fondation Patrick & Lina Drahi.

Enroll now

Two deals to help you save

What's inside

Syllabus

Module 0 : Bienvenue dans ce MOOC !
Module 1 : Blockchain : une révolution ?
Module 2 : La cryptographie de la blockchain
Read more
Il est important de ne pas confondre la sûreté de fonctionnement avec la sécurité informatique. La première protège des accidents non intentionnel tels les erreurs humaines, les perturbations, les pannes etc. La seconde protège de la malveillance intentionnelle (attaques) telle que l’écoute, l’altération, la destruction, l’usurpation etc. Pour cela, elle utilise des solutions techniques dont la cryptographie fait partie. La cryptographie est trop souvent associée au chiffrement mais il ne s’agit pas de son unique sujet. Le chiffrement ne garantit que la confidentialité or ce n’est pas une propriété nécessaire à la blockchain. En effet, dans le cas de la blockchain, les propriétés utiles sont l’intégrité, l’authentification et la non-répudiation. Les outils importants répondant à ces propriétés sont présentés dans les prochaines leçons : il s'agit de la signature et des fonctions de hachage.
Module 3 : Les outils cryptographiques de la Blockchain
Cette section a pour objectif de présenter les algorithmes de cryptographie standard, les plus utilisées dans la blockchain.A savoir : la fonction de hachage SHA-256 et l’algorithme de signature ECDA.
Module 4 : Bitcoin, une cryptomonnaie pionnière
Module 5 : Votre opinion nous intéresse

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Développe les compétences en cryptographie, essentielles pour la compréhension de la blockchain et de ses applications
Est dispensé par des instructeurs expérimentés et reconnus dans le domaine de la cryptologie et de la blockchain
Fournit une base solide pour les débutants souhaitant comprendre les principes fondamentaux de la blockchain
Explore les applications pratiques de la blockchain dans les domaines des cryptomonnaies, des contrats intelligents et des systèmes décentralisés
Inclut des exemples concrets et des démonstrations pour illustrer les concepts de la blockchain

Save this course

Save Blockchain : enjeux et mécanismes cryptographiques to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Blockchain : enjeux et mécanismes cryptographiques with these activities:
Review basic cryptography concepts and algorithms
Review common cryptographic concepts and algorithms to prepare for the course's deep dive into blockchain cryptography.
Browse courses on Cryptography
Show steps
  • Read about symmetric and asymmetric encryption algorithms.
  • Practice implementing basic encryption and decryption algorithms.
  • Review the principles of hashing functions.
Participer à des conférences ou des meetups sur la Blockchain
Participer à des conférences ou des meetups sur la Blockchain vous permettra de rencontrer des experts et d'échanger des idées.
Browse courses on Blockchain
Show steps
  • Rechercher des événements liés à la Blockchain
  • S'inscrire et assister à l'événement
  • Réseauter avec d'autres participants
Assister à un atelier pratique sur la Blockchain
Assister à un atelier pratique sur la Blockchain vous fournira des connaissances approfondies et des compétences pratiques.
Browse courses on Blockchain
Show steps
  • Rechercher des ateliers pratiques sur la Blockchain
  • S'inscrire et assister à l'atelier
  • Participer activement aux exercices et aux discussions
Six other activities
Expand to see all activities and additional details
Show all nine activities
Walkthrough Bitcoin's source code
Gain a deeper understanding of Bitcoin's inner workings by exploring its source code.
Browse courses on Bitcoin
Show steps
  • Install the necessary tools and dependencies.
  • Download the Bitcoin source code.
  • Step through the code to understand the core functionality.
Solve blockchain-related coding problems
Strengthen your coding skills and problem-solving abilities by practicing blockchain-specific coding challenges.
Browse courses on Blockchain
Show steps
  • Find online coding challenges or platforms.
  • Solve problems related to blockchain concepts and algorithms.
  • Review your solutions and identify areas for improvement.
Rédiger un article sur les applications potentielles de la Blockchain
Rédiger un article sur les applications de la Blockchain vous aidera à synthétiser vos connaissances et à développer votre compréhension de la technologie.
Browse courses on Blockchain
Show steps
  • Rechercher les différentes applications de la Blockchain
  • Analyser les avantages et inconvénients de chaque application
  • Structurer et rédiger l'article
  • Relire et éditer l'article
Develop a blockchain-based prototype application
Apply your knowledge to practical use by creating a functional blockchain-based prototype.
Browse courses on Blockchain
Show steps
  • Define the scope and goals of your prototype.
  • Choose appropriate blockchain technology and tools.
  • Implement the core features of your prototype.
  • Test and refine your prototype.
Développer un portefeuille Blockchain
Construire un portefeuille Blockchain vous aidera à mieux comprendre l'architecture et le fonctionnement d'une Blockchain.
Browse courses on Blockchain
Show steps
  • Choisir une blockchain appropriée
  • Concevoir l'architecture du portefeuille
  • Implémenter les fonctionnalités de base (création et gestion des clés, transactions)
  • Intégrer les mécanismes de sécurité
  • Tester et déployer le portefeuille
Concevoir une solution Blockchain pour un problème du monde réel
Concevoir une solution Blockchain pour un problème du monde réel vous aidera à appliquer vos connaissances et à développer des compétences pratiques.
Browse courses on Blockchain
Show steps
  • Identifier un problème auquel la Blockchain peut apporter une solution
  • Concevoir l'architecture de la solution Blockchain
  • Développer un prototype ou une simulation de la solution
  • Tester et évaluer la solution
  • Documenter et présenter la solution

Career center

Learners who complete Blockchain : enjeux et mécanismes cryptographiques will develop knowledge and skills that may be useful to these careers:
Cryptocurrency Developer
Cryptocurrency Developers are essential to the growth and adoption of cryptocurrencies by improving the functionality and security of cryptocurrency systems. They work on developing new and innovative features for cryptocurrencies, as well as designing and implementing security measures to protect against fraud and theft. This course will provide you with a strong foundation in the principles of cryptography and blockchain technology, which are essential for a successful career as a Cryptocurrency Developer.
Blockchain Engineer
Blockchain Engineers are responsible for designing, developing, and maintaining blockchain networks and applications. They work on a variety of tasks, including developing new blockchain protocols, designing smart contracts, and implementing security measures. This course will provide you with a comprehensive overview of blockchain technology, as well as the skills and knowledge necessary to become a successful Blockchain Engineer.
Cryptography Engineer
Cryptography Engineers are responsible for designing, developing, and implementing cryptographic algorithms and protocols. They work on a variety of tasks, including developing new encryption algorithms, designing secure communication protocols, and implementing security measures for networks and applications. This course will provide you with a strong foundation in the principles of cryptography, as well as the skills and knowledge necessary to become a successful Cryptography Engineer.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work on a variety of tasks, including developing security policies and procedures, implementing security measures, and monitoring security threats. This course will provide you with a comprehensive overview of information security, as well as the skills and knowledge necessary to become a successful Information Security Analyst.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining security measures for computer networks. They work on a variety of tasks, including developing security policies and procedures, implementing firewalls and intrusion detection systems, and monitoring network traffic for security threats. This course will provide you with a comprehensive overview of network security, as well as the skills and knowledge necessary to become a successful Network Security Engineer.
Security Architect
Security Architects are responsible for designing and implementing security measures for an organization's information systems. They work on a variety of tasks, including developing security policies and procedures, designing security architectures, and implementing security controls. This course will provide you with a comprehensive overview of information security, as well as the skills and knowledge necessary to become a successful Security Architect.
Software Engineer
Software Engineers are responsible for designing, developing, and maintaining software applications. They work on a variety of tasks, including developing new software applications, modifying existing software applications, and fixing software bugs. This course will provide you with a strong foundation in the principles of software engineering, as well as the skills and knowledge necessary to become a successful Software Engineer.
Systems Engineer
Systems Engineers are responsible for designing, implementing, and maintaining computer systems. They work on a variety of tasks, including developing system architectures, implementing system software, and troubleshooting system problems. This course will provide you with a comprehensive overview of systems engineering, as well as the skills and knowledge necessary to become a successful Systems Engineer.
Data Scientist
Data Scientists are responsible for collecting, analyzing, and interpreting data in order to extract meaningful insights for businesses. They work on a variety of tasks, including developing data models, performing data analysis, and presenting data findings. This course will provide you with a strong foundation in the principles of data science, as well as the skills and knowledge necessary to become a successful Data Scientist.
Business Analyst
Business Analysts are responsible for analyzing business processes and systems in order to identify areas for improvement. They work on a variety of tasks, including developing business models, conducting cost-benefit analysis, and making recommendations for process improvement. This course will provide you with a strong foundation in the principles of business analysis, as well as the skills and knowledge necessary to become a successful Business Analyst.
Financial Analyst
Financial Analysts are responsible for analyzing financial data in order to make investment recommendations. They work on a variety of tasks, including developing financial models, conducting financial analysis, and making investment recommendations. This course may provide you with some of the skills and knowledge necessary to become a successful Financial Analyst, but it is important to note that a master's degree in finance is typically required for this role.
Management Consultant
Management Consultants are responsible for providing advice to businesses on how to improve their operations. They work on a variety of tasks, including developing business strategies, conducting market research, and implementing change management initiatives. This course may provide you with some of the skills and knowledge necessary to become a successful Management Consultant, but it is important to note that a master's degree in business administration is typically required for this role.
Marketing Manager
Marketing Managers are responsible for developing and implementing marketing campaigns for products and services. They work on a variety of tasks, including developing marketing strategies, conducting market research, and managing advertising campaigns. This course may provide you with some of the skills and knowledge necessary to become a successful Marketing Manager, but it is important to note that a bachelor's degree in marketing is typically required for this role.
Project Manager
Project Managers are responsible for planning, organizing, and executing projects. They work on a variety of tasks, including developing project plans, managing project budgets, and coordinating project resources. This course may provide you with some of the skills and knowledge necessary to become a successful Project Manager, but it is important to note that a bachelor's degree in project management is typically required for this role.
Technical Writer
Technical Writers are responsible for creating documentation for technical products and services. They work on a variety of tasks, including writing user manuals, developing training materials, and creating marketing collateral. This course may provide you with some of the skills and knowledge necessary to become a successful Technical Writer, but it is important to note that a bachelor's degree in technical writing is typically required for this role.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Blockchain : enjeux et mécanismes cryptographiques.
A practical guide to understanding and implementing Bitcoin's underlying technology and principles, including blockchain fundamentals and development.
An exploration of distributed ledger technology's potential to revolutionize the financial industry, offering insights into its benefits, challenges, and future prospects.
An overview of the cryptocurrency landscape, providing insights into Bitcoin and other cryptoassets, their underlying technology, and investment considerations.
An exploration of Bitcoin's potential to serve as a decentralized alternative to central banking systems, examining its economic and monetary implications.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Blockchain : enjeux et mécanismes cryptographiques.
Apprivoiser l’apprentissage automatique
Most relevant
Principes de base du support technique
Most relevant
Epargner et Investir
Most relevant
Originalité et modernité du mutualisme
Most relevant
Planification de projet : Tout mettre en place
Most relevant
L'essentiel de l'apprentissage profond
Most relevant
La Philanthropie : Comprendre et Agir
Most relevant
Configurer un environnement dev avec la pile LEMP sous...
Most relevant
Administration système et services d’infrastructure...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser