{"id":11060,"date":"2019-12-12T12:00:32","date_gmt":"2019-12-12T12:00:32","guid":{"rendered":"https:\/\/radioiptech.wpengine.com\/?p=11060"},"modified":"2020-10-01T08:52:26","modified_gmt":"2020-10-01T08:52:26","slug":"what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii","status":"publish","type":"post","link":"https:\/\/www.radio-ip.com\/fr\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/","title":{"rendered":"Qu&#39;est-ce que la cryptographie quantique et comment cela aidera-t-il l&#39;avenir de la s\u00e9curit\u00e9? Partie 2"},"content":{"rendered":"<p style=\"text-align: justify;\">Dans notre blog pr\u00e9c\u00e9dent, nous avons pr\u00e9sent\u00e9 l&#39;avenir de la cybers\u00e9curit\u00e9 et les vuln\u00e9rabilit\u00e9s qui existent pour les entreprises et leur logiciel de chiffrement actuel. Une mesure de s\u00e9curit\u00e9 importante qui devrait \u00eatre mise en \u0153uvre est la distribution de cl\u00e9s quantiques (QKD), qui vise \u00e0 d\u00e9tecter les pirates.<\/p>\n<h2 style=\"color: #000000; font-size: 26px; text-decoration: none; text-align: justify;\"><strong><span style=\"background: none; color: #3c78d8; font-size: 21.33px; text-decoration: none;\">L&#39;essor de la cryptographie quantique et comment faire partie de la r\u00e9sistance<\/span><\/strong><\/h2>\n<p style=\"text-align: justify;\">Le cryptage que nous utilisons aujourd&#39;hui est b\u00e9n\u00e9fique depuis des ann\u00e9es, mais il devient rapidement archa\u00efque et inutile. Les services cryptographiques que nous utilisons aujourd&#39;hui utilisent une cl\u00e9 pour modifier le message ou les donn\u00e9es et une deuxi\u00e8me cl\u00e9 pour d\u00e9coder les informations lorsqu&#39;elles parviennent au r\u00e9cepteur. La raison pour laquelle cette technologie devient moins efficace est que nos ordinateurs actuels ne sont pas assez rapides dans ce qu&#39;ils font.<\/p>\n<p style=\"text-align: justify;\">Pour que les ordinateurs ordinaires puissent briser le code, cela prendrait des ann\u00e9es, ce qui signifie que ces donn\u00e9es chiffr\u00e9es sont s\u00fbres. Nos ordinateurs actuels ne risquent pas d&#39;\u00eatre pirat\u00e9s s&#39;ils sont correctement chiffr\u00e9s, ce qui signifie que les donn\u00e9es sont en s\u00e9curit\u00e9. Avec les nouveaux ordinateurs quantiques, le processus pour briser le code et acc\u00e9der aux informations est beaucoup plus court, ce qui signifie que toutes les donn\u00e9es que nous pensions \u00eatre s\u00fbres peuvent \u00eatre obtenues avec de nouveaux ordinateurs quantiques, ce qui risque tr\u00e8s facilement de mettre en danger la s\u00e9curit\u00e9 publique.<\/p>\n<p style=\"text-align: justify;\">La nouvelle technologie quantique va aider les utilisateurs \u00e0 mieux prot\u00e9ger les donn\u00e9es sensibles qu&#39;ils souhaitent garder cach\u00e9es et \u00e0 s&#39;assurer que les donn\u00e9es que nous pensions \u00eatre s\u00fbres ne sont que cela. Ces nouveaux ordinateurs et la technologie QKD contribuent \u00e0 garantir que les donn\u00e9es que nous envoyons sont r\u00e9ellement s\u00e9curis\u00e9es et que d&#39;autres ne peuvent y acc\u00e9der sans notre autorisation.<\/p>\n<p style=\"text-align: justify;\">La technologie QKD n&#39;est pas si avanc\u00e9e \u00e0 l&#39;heure actuelle; actuellement, il ne peut envoyer des informations que sur un petit c\u00e2ble avant qu&#39;elles ne deviennent trop faibles pour \u00eatre re\u00e7ues. Les chercheurs esp\u00e8rent contribuer \u00e0 renforcer le signal au point qu&#39;il peut \u00eatre facilement utilis\u00e9 pour des transmissions \u00e0 longue port\u00e9e et comme moyen d&#39;envoyer r\u00e9ellement des informations r\u00e9ellement prot\u00e9g\u00e9es.<\/p>\n<p style=\"text-align: justify;\">La crypto actuelle est tr\u00e8s faible contre la crypto quantique; cependant, de nouveaux algorithmes en cours de d\u00e9veloppement sont r\u00e9sistants. Avec la grande quantit\u00e9 de collecte de donn\u00e9es et d&#39;informations sensibles stock\u00e9es dans toutes les industries, y compris les entreprises publiques et priv\u00e9es, les entreprises doivent placer la s\u00e9curit\u00e9 de leurs donn\u00e9es au premier plan.<\/p>\n<p style=\"text-align: justify;\">Quelques solutions qui devraient \u00eatre envisag\u00e9es incluent le cryptage homomorphique et la cryptographie sur r\u00e9seau.<\/p>\n<p style=\"text-align: justify;\">La cryptographie bas\u00e9e sur un r\u00e9seau sert de terme g\u00e9n\u00e9ral pour les constructions de primitives cryptographiques qui incluent des r\u00e9seaux dans la preuve de s\u00e9curit\u00e9 ou dans le d\u00e9veloppement lui-m\u00eame. L&#39;une des utilisations les plus importantes des constructions bas\u00e9es sur des r\u00e9seaux est la cryptographie post-quantique. Les constructions \u00e0 base de treillis ont la capacit\u00e9 de r\u00e9sister aux attaques contre les ordinateurs quantiques et classiques. Cela offre une couche importante de protection par rapport aux sch\u00e9mas \u00e0 cl\u00e9 publique, qui sont facilement attaqu\u00e9s par un ordinateur quantique.<\/p>\n<p style=\"text-align: justify;\">Le cryptage homomorphique est une autre forme de cryptage utilis\u00e9e pour le stockage et le calcul externalis\u00e9s pr\u00e9servant la confidentialit\u00e9. Le cryptage homomorphique est une m\u00e9thode qui effectue des calculs sur les informations crypt\u00e9es sans d\u00e9cryptage en premier, les laissant plus s\u00e9curis\u00e9es contre les pirates.<\/p>\n<p style=\"text-align: justify;\">Pour plus d&#39;informations sur la cybers\u00e9curit\u00e9 et les solutions, vous pouvez contacter Radio IP par <a href=\"https:\/\/www.radio-ip.com\/fr\/\">en cliquant ici.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>In our previous blog, we introduced the future of cyber-security and the vulnerabilities that exist for companies and their current encryption software. One important security measure that should be implemented is Quantum Key Distribution (QKD), which works towards detecting hackers. The Rise of Quantum Cryptography&#8230;<\/p>","protected":false},"author":1,"featured_media":11061,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[124],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Quantum Cryptography and How Will it Help the Future of Security? Part 2<\/title>\n<meta name=\"description\" content=\"Here we outline the specifics concerning whether quantum cryptography is useful and how exactly adequate data encryption is achieved. Data encryption, reliability and security remain at the forefront of mission-critical uses, which can include uses from the U.S. military, Government and more.\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.radio-ip.com\/fr\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Quantum Cryptography and How Will it Help the Future of Security? Part 2\" \/>\n<meta property=\"og:description\" content=\"Here we outline the specifics concerning whether quantum cryptography is useful and how exactly adequate data encryption is achieved. Data encryption, reliability and security remain at the forefront of mission-critical uses, which can include uses from the U.S. military, Government and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.radio-ip.com\/fr\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"Radio IP\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-12T12:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-01T08:52:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2020\/02\/What-is-Quantum-Cryptography-and-How-Will-it-Help-the-Future-of-Security-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"621\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#website\",\"url\":\"https:\/\/www.radio-ip.com\/fr\/\",\"name\":\"Radio IP\",\"description\":\"Mobile Virtual Private Network Solutions (MVPN)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.radio-ip.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/#primaryimage\",\"inLanguage\":\"fr-CA\",\"url\":\"https:\/\/www.radio-ip.com\/wp-content\/uploads\/2020\/02\/What-is-Quantum-Cryptography-and-How-Will-it-Help-the-Future-of-Security-1.png\",\"width\":621,\"height\":344,\"caption\":\"Quantum Cryptography\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/#webpage\",\"url\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/\",\"name\":\"What is Quantum Cryptography and How Will it Help the Future of Security? Part 2\",\"isPartOf\":{\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/#primaryimage\"},\"datePublished\":\"2019-12-12T12:00:32+00:00\",\"dateModified\":\"2020-10-01T08:52:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#\/schema\/person\/5de4bfd4f618ba47ca66aab192dad145\"},\"description\":\"Here we outline the specifics concerning whether quantum cryptography is useful and how exactly adequate data encryption is achieved. Data encryption, reliability and security remain at the forefront of mission-critical uses, which can include uses from the U.S. military, Government and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.radio-ip.com\/\",\"url\":\"https:\/\/www.radio-ip.com\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/\",\"url\":\"https:\/\/www.radio-ip.com\/en\/what-is-quantum-cryptography-and-how-will-it-help-the-future-of-security-part-ii\/\",\"name\":\"What is Quantum Cryptography and How Will it Help the Future of Security? Part 2\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#\/schema\/person\/5de4bfd4f618ba47ca66aab192dad145\",\"name\":\"Radio IP\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.radio-ip.com\/fr\/#personlogo\",\"inLanguage\":\"fr-CA\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b085b200f78dc1631fca53d2ea29147?s=96&d=mm&r=g\",\"caption\":\"Radio IP\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts\/11060"}],"collection":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/comments?post=11060"}],"version-history":[{"count":5,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts\/11060\/revisions"}],"predecessor-version":[{"id":11784,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/posts\/11060\/revisions\/11784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/media\/11061"}],"wp:attachment":[{"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/media?parent=11060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/categories?post=11060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.radio-ip.com\/fr\/wp-json\/wp\/v2\/tags?post=11060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}