<?xml version="1.0" encoding="UTF-8"?>
<lom:lom xmlns:lom="http://ltsc.ieee.org/xsd/LOM" xmlns:lomfr="http://www.lom-fr.fr/xsd/LOMFR" xmlns:unit="http://www.unit.eu/xsd/LOM"><lom:general><lom:identifier><lom:catalog>URI</lom:catalog><lom:entry>http://ori.unit-c.fr/uid/unit-ori-wf-1-4831</lom:entry></lom:identifier><lom:title><lom:string language="fre">Enigma</lom:string></lom:title><lom:language>fre</lom:language><lom:description><lom:string language="fre">Est-ce une antique machine à écrire ? Non point ! Sous cette apparence trompeuse se cache la clé des secrets de la Seconde Guerre Mondiale. Ce document présente l’histoire du décryptage de la fameuse machine de chiffrement allemande, en soulignant la contribution des Polonais.</lom:string></lom:description><lom:keyword><lom:string language="fre">chiffrement</lom:string></lom:keyword><lom:keyword><lom:string language="fre">cryptanalyse</lom:string></lom:keyword><lom:keyword><lom:string language="fre">bombe de Turing</lom:string></lom:keyword><lom:keyword><lom:string language="fre">communications militaires</lom:string></lom:keyword><lom:keyword><lom:string language="fre">fuscia</lom:string></lom:keyword><lom:structure><lom:source>LOMv1.0</lom:source><lom:value>atomic</lom:value></lom:structure><lom:aggregationLevel><lom:source>LOMv1.0</lom:source><lom:value>1</lom:value></lom:aggregationLevel><lomfr:documentType><lomfr:source>LOMv1.0</lomfr:source><lomfr:value>texte</lomfr:value></lomfr:documentType><lomfr:documentType><lomfr:source>LOMv1.0</lomfr:source><lomfr:value>image</lomfr:value></lomfr:documentType><lomfr:documentType><lomfr:source>LOMv1.0</lomfr:source><lomfr:value>ressource interactive</lomfr:value></lomfr:documentType></lom:general><lom:lifeCycle><lom:status><lom:source>LOMv1.0</lom:source><lom:value>final</lom:value></lom:status><lom:contribute><lom:role><lom:source>LOMv1.0</lom:source><lom:value>author</lom:value></lom:role><lom:entity>BEGIN:VCARD
VERSION:3.0
N:Orlowski ;Arkadiusz
FN:Arkadiusz Orlowski
EMAIL;TYPE=INTERNET:
ORG:Académie des sciences de Pologne
END:VCARD</lom:entity><lom:date><lom:dateTime>2004-10-26</lom:dateTime></lom:date></lom:contribute><lom:contribute><lom:role><lom:source>LOMv1.0</lom:source><lom:value>publisher</lom:value></lom:role><lom:entity>BEGIN:VCARD
VERSION:3.0
N:Institut National de Recherche en Informatique et en Automatique / Interstices
FN:Institut National de Recherche en Informatique et en Automatique / Interstices
URL: http://www.inria.fr
EMAIL;TYPE=internet:
ORG: INRIA
UID:0601223D
EMAIL;TYPE=INTERNET:
END:VCARD</lom:entity><lom:date><lom:dateTime>2005-06-14</lom:dateTime></lom:date></lom:contribute></lom:lifeCycle><lom:metaMetadata><lom:identifier><lom:catalog>URI</lom:catalog><lom:entry>http://ori.unit-c.fr/uid/unit-ori-wf-1-4832</lom:entry></lom:identifier><lom:contribute><lom:role><lom:source>LOMv1.0</lom:source><lom:value>creator</lom:value></lom:role><lom:entity>BEGIN:VCARD
N:Comte;Marie-Hélène
FN:Marie-Hélène Comte
EMAIL;TYPE=INTERNET:marie-helene.comte@inria.fr
ORG:INRIA/fuscia</lom:entity><lom:date><lom:dateTime>2005-06-14</lom:dateTime></lom:date></lom:contribute><lom:metadataSchema>LOMv1.0</lom:metadataSchema><lom:metadataSchema>LOMFRv1.0</lom:metadataSchema><lom:metadataSchema>SupLOMFRv1.0</lom:metadataSchema><lom:language>fre</lom:language></lom:metaMetadata><lom:technical><lom:format>text/html</lom:format><lom:location>http://interstices.info/jcms/c_9752/enigma</lom:location><lom:installationRemarks><lom:string language="fre"/></lom:installationRemarks></lom:technical><lom:educational><lom:learningResourceType><lom:source>LOMv1.0</lom:source><lom:value>lecture</lom:value></lom:learningResourceType><lom:learningResourceType><lom:source>LOMFRv1.0</lom:source><lom:value>démonstration</lom:value></lom:learningResourceType><lom:intendedEndUserRole><lom:source>LOMv1.0</lom:source><lom:value>learner</lom:value></lom:intendedEndUserRole><lom:context><lom:source>LOMv1.0</lom:source><lom:value>higher education</lom:value></lom:context><lom:typicalAgeRange><lom:string language="fre">18+</lom:string></lom:typicalAgeRange><lom:description><lom:string language="fre"/></lom:description><lom:language>fre</lom:language></lom:educational><lom:rights><lom:cost><lom:source>LOMv1.0</lom:source><lom:value>no</lom:value></lom:cost><lom:copyrightAndOtherRestrictions><lom:source>LOMv1.0</lom:source><lom:value>yes</lom:value></lom:copyrightAndOtherRestrictions><lom:description><lom:string language="fre">Ce document est diffusé sous licence Creative Common :
Paternité - Pas d'utilisation commerciale - Pas de modification. http://creativecommons.org/licenses/by-nc-nd/2.0/fr/legalcode </lom:string></lom:description></lom:rights><lom:annotation/><lom:classification><lom:purpose><lom:source>LOMv1.0</lom:source><lom:value>discipline</lom:value></lom:purpose><lom:taxonPath><lom:source><lom:string language="fre">Classification UNIT</lom:string></lom:source><lom:taxon><lom:id>1309</lom:id><lom:entry><lom:string language="fre">Sécurité des données: chiffrement, virus, cryptographie</lom:string></lom:entry></lom:taxon></lom:taxonPath></lom:classification><lom:classification><lom:purpose><lom:source>LOMv1.0</lom:source><lom:value>discipline</lom:value></lom:purpose><lom:taxonPath><lom:source><lom:string language="fre">CDD 22e éd.</lom:string></lom:source><lom:taxon><lom:id>005.82</lom:id><lom:entry><lom:string language="fre"/></lom:entry></lom:taxon></lom:taxonPath></lom:classification><unit:unit><unit:lmdLevel>L3</unit:lmdLevel></unit:unit></lom:lom>