{"id":10407,"date":"2022-07-19T11:07:58","date_gmt":"2022-07-19T11:07:58","guid":{"rendered":"https:\/\/www.stratign.com\/?page_id=10407"},"modified":"2024-03-05T10:52:08","modified_gmt":"2024-03-05T06:52:08","slug":"quantum-resistant-crytography","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/","title":{"rendered":"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; text_transform=&#8221;uppercase&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]Les algorithmes de cryptographie r\u00e9sistants aux Quantum prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l&#8217;\u00e8re des Quantums.[\/tm_heading][\/vc_column][vc_column offset=&#8221;vc_col-md-7&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La cryptographie \u00e0 cl\u00e9 publique est actuellement utilis\u00e9e par des milliards de personnes \u00e0 travers le monde pour crypter des donn\u00e9es et les prot\u00e9ger contre les menaces. La principale inqui\u00e9tude concernant le chiffrement \u00e0 cl\u00e9 publique est li\u00e9e aux puissants ordinateurs quantiques qui devraient sortir des laboratoires pour entrer dans le monde r\u00e9el d&#8217;ici quelques ann\u00e9es.[\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-80&#8243; xs_spacing=&#8221;margin_top:-80&#8243;][vc_column][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]L&#8217;\u00e9quipe de recherche et d\u00e9veloppement de Stratign s&#8217;associera \u00e0 votre organisation pour concevoir, d\u00e9velopper et mettre en \u0153uvre des solutions cryptographiques r\u00e9sistantes aux quantums afin de s\u00e9curiser les donn\u00e9es contre les menaces dans un avenir proche.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Les ordinateurs quantiques ont une puissance de calcul tr\u00e8s \u00e9lev\u00e9e qui leur permet de casser les algorithmes cryptographiques \u00e0 cl\u00e9 publique tels que RSA, ECC, etc. en quelques minutes. Par cons\u00e9quent, les donn\u00e9es seront facilement accessibles aux attaquants et la s\u00e9curit\u00e9 des donn\u00e9es devient une pr\u00e9occupation majeure. Toutefois, il est possible de s\u00e9curiser les donn\u00e9es en mettant en \u0153uvre des algorithmes de cryptographie r\u00e9sistants aux quanta.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704777020361{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Flux de travail[\/tm_heading][tm_spacer size=&#8221;lg:20&#8243;][vc_column_text]<\/p>\n<ul>\n<li>\u00c9tudier les finalistes du concours PQC du NIST.<\/li>\n<li>D\u00e9velopper un module d&#8217;encapsulation de cl\u00e9s \u00e0 s\u00e9curit\u00e9 quantique.<\/li>\n<li>D\u00e9velopper un module d&#8217;authentification de l&#8217;utilisateur \u00e0 s\u00e9curit\u00e9 quantique.<\/li>\n<li>D\u00e9velopper un module de cryptage de donn\u00e9es de 512 bits.<\/li>\n<li>D\u00e9velopper une fonction de d\u00e9rivation de cl\u00e9 de 512 bits.<\/li>\n<li>D\u00e9velopper une preuve de concept.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][tm_spacer size=&#8221;lg:10&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Network segmentation is an important element of IT security concepts. The Secure Domain Transition (SDoT) product family allows controlled unidirectional or bi-directional exchange of data between networks\/systems of different sensitivity level.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10407","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM - Stratign<\/title>\n<meta name=\"description\" content=\"Les algorithmes de cryptographie r\u00e9sistants aux quanta prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l&#039;\u00e8re quantique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM - Stratign\" \/>\n<meta property=\"og:description\" content=\"Les algorithmes de cryptographie r\u00e9sistants aux quanta prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l&#039;\u00e8re quantique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T06:52:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/quantum-resistant-crytography\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/quantum-resistant-crytography\\\/\",\"name\":\"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2022-07-19T11:07:58+00:00\",\"dateModified\":\"2024-03-05T06:52:08+00:00\",\"description\":\"Les algorithmes de cryptographie r\u00e9sistants aux quanta prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l'\u00e8re quantique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/quantum-resistant-crytography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/quantum-resistant-crytography\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/quantum-resistant-crytography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM - Stratign","description":"Les algorithmes de cryptographie r\u00e9sistants aux quanta prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l'\u00e8re quantique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/","og_locale":"en_US","og_type":"article","og_title":"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM - Stratign","og_description":"Les algorithmes de cryptographie r\u00e9sistants aux quanta prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l'\u00e8re quantique.","og_url":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T06:52:08+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/","url":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/","name":"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2022-07-19T11:07:58+00:00","dateModified":"2024-03-05T06:52:08+00:00","description":"Les algorithmes de cryptographie r\u00e9sistants aux quanta prot\u00e8gent les donn\u00e9es contre les attaques et am\u00e9liorent la s\u00e9curit\u00e9 des donn\u00e9es \u00e0 l'\u00e8re quantique.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/quantum-resistant-crytography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"CRYPTOGRAPHIE R\u00c9SISTANTE AU QUANTUM"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/10407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=10407"}],"version-history":[{"count":7,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/10407\/revisions"}],"predecessor-version":[{"id":15148,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/10407\/revisions\/15148"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=10407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}