{"id":9871,"date":"2017-06-30T17:31:14","date_gmt":"2017-06-30T16:31:14","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=9871\/"},"modified":"2019-12-31T10:05:29","modified_gmt":"2019-12-31T09:05:29","slug":"informatique-quantique-securite","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/06\/informatique-quantique-securite\/","title":{"rendered":"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ?"},"content":{"rendered":"<p><em>Depuis des ann\u00e9es, des chercheurs partout dans le monde, ainsi que les plus grandes entreprises de technologies, parmi lesquelles IBM, Google et Microsoft, s\u2019\u00e9chinent \u00e0 mettre au point un ordinateur quantique. Cette technologie pourrait r\u00e9soudre des probl\u00e8mes math\u00e9matiques complexes et insolubles pour les ordinateurs classiques, promettant d\u2019offrir des ordinateurs capables d\u2019aller th\u00e9oriquement des millions de fois plus rapidement que nos serveurs actuels, r\u00e9volutionnant ainsi l\u2019\u00e8re du num\u00e9rique. Face aux exploits prometteurs et tr\u00e8s attendus de l\u2019informatique quantique, la construction d\u2019une telle machine pose un r\u00e9el d\u00e9fi en mati\u00e8re de cybers\u00e9curit\u00e9.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>Qu\u2019est-ce que l\u2019informatique quantique et pourquoi s\u2019y int\u00e9resser\u00a0?<\/h2>\n<p>La mani\u00e8re dont les ordinateurs sont encore tr\u00e8s majoritairement con\u00e7us aujourd\u2019hui repose sur une architecture principalement s\u00e9quentielle : les op\u00e9rations sont effectu\u00e9es par l\u2019ordinateur les unes apr\u00e8s les autres, selon un programme d\u2019instructions \u00e9crit par l\u2019homme. Le micro-processeur ex\u00e9cute alors les op\u00e9rations de fa\u00e7on quasi s\u00e9quentielle, et c\u2019est ici l\u2019une des principales faiblesses de cette architecture et de ses variantes.<\/p>\n<p>L\u2019informatique quantique viendrait alors combler cette faiblesse en proposant des machines dot\u00e9es d\u2019une <strong>facult\u00e9 de parall\u00e9lisme<\/strong>, permettant <strong>d\u2019augmenter consid\u00e9rablement la puissance de calculs complexes, la <\/strong><strong>rapidit\u00e9 de traitement et la capacit\u00e9 (th\u00e9orique) de stockage. <\/strong>Cette technologie s&#8217;appuie sur le ph\u00e9nom\u00e8ne de superposition d&#8217;\u00e9tats quantiques pour d\u00e9velopper des capacit\u00e9s de calcul beaucoup plus importantes que l&#8217;informatique classique. En effet, l\u2019information est repr\u00e9sent\u00e9e par des \u00ab quantum bits \u00bb (qubit) similaires aux bits binaires utilis\u00e9s dans l\u2019informatique num\u00e9rique. Pour rappel, le bit peut prendre deux valeurs, 0 ou 1 selon l\u2019\u00e9tat du transistor. Le qubit, peut avoir trois \u00e9tats, le 1, le 0 mais aussi les deux \u00e0 la fois : c\u2019est ce qu\u2019on appelle la superposition.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-9877 media-9877\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9877 \" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Image1-4.png\" alt=\"\" width=\"314\" height=\"285\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>Cette capacit\u00e9 de superposition multiplierait le nombre d\u2019op\u00e9rations complexes r\u00e9alisables dans un temps limit\u00e9. Ainsi, l\u00e0 o\u00f9 le traitement d\u2019informations volumineuses peut parfois prendre plusieurs jours, semaines, mois \u00e0 \u00eatre trait\u00e9es par des ordinateurs classiques, les syst\u00e8mes de l\u2019informatique quantique le traiteraient en quelques secondes.<\/p>\n<p>Malheureusement, cette technologie impose de maintenir l\u2019\u00e9tat quantique pour atteindre de telles capacit\u00e9s de calcul, le probl\u00e8me \u00e9tant que cet \u00e9tat ne peut \u00eatre atteint qu\u2019en pla\u00e7ant l\u2019<strong>ordinateur proche du z\u00e9ro absolu<\/strong>, soit -273 \u00b0C, seules temp\u00e9ratures pour lesquelles le qubit est r\u00e9ellement stable. De mani\u00e8re \u00e9vidente, il est extr\u00eamement complexe de maintenir de telles temp\u00e9ratures avec un syst\u00e8me simple, peu on\u00e9reux et peu encombrant pour une longue p\u00e9riode de temps.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019informatique quantique comme outil de s\u00e9curit\u00e9<\/h2>\n<p>Les apports de l\u2019informatique quantique en mati\u00e8re de capacit\u00e9 de r\u00e9solution et de traitements rapides d\u2019op\u00e9rations complexes sont tr\u00e8s convoit\u00e9s, et principalement dans le domaine de la s\u00e9curit\u00e9 informatique, o\u00f9 les mesures de protection et de d\u00e9tection n\u00e9cessitent de plus en plus de rapidit\u00e9 d\u2019ex\u00e9cution.<\/p>\n<p>Par exemple, la lutte contre la fraude est aujourd\u2019hui l\u2019une des principales probl\u00e9matiques de s\u00e9curit\u00e9 du secteur bancaire et a pour enjeu d\u2019exploiter des techniques pouss\u00e9es de d\u00e9tection de fraude, bas\u00e9es sur la collecte, le traitement et l\u2019analyse, en temps r\u00e9el, de donn\u00e9es volumineuses. Ces techniques sont tr\u00e8s gourmandes en puissance de calcul et, bien qu\u2019aujourd\u2019hui r\u00e9alisables par nos ordinateurs les plus performants, elles pourraient \u00eatre encore plus efficientes avec plus de puissance. Les ordinateurs quantiques, s\u2019ils voient le jour, pourraient ainsi constituer un <strong>pilier de la lutte contre la fraude<\/strong>, \u00e0 travers leur forte capacit\u00e9 (th\u00e9orique) de stockage et leur rapidit\u00e9 de traitement.<\/p>\n<p>De m\u00eame, les syst\u00e8mes quantiques pourraient notamment permettre de <strong>d\u00e9tecter et de corriger les erreurs<\/strong>. En effet, le qubit, sur lequel repose tout le fonctionnement de cette nouvelle g\u00e9n\u00e9ration informatique, est en effet tr\u00e8s sensible aux perturbations de son environnement (interception, changement de configuration, variations de temp\u00e9rature, champs magn\u00e9tiques\u2026). Le qubit peut constituer ainsi, dans ces conditions, un moyen fiable pour <strong>garantir l\u2019int\u00e9grit\u00e9 des donn\u00e9es stock\u00e9es<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019informatique quantique comme source de menace<\/h2>\n<p>Les communications s\u00e9curis\u00e9es, les syst\u00e8mes s\u00e9curis\u00e9s de paiements, les transactions financi\u00e8res, les monnaies virtuelles telles que le bitcoin, reposent tous sur des m\u00e9canismes cryptographiques, et en particulier sur les protocoles de chiffrement asym\u00e9triques. La s\u00e9curit\u00e9 de ces protocoles d\u00e9pend principalement du fait qu\u2019il faudrait plusieurs fois l\u2019\u00e2ge de la Terre \u00e0 des ordinateurs classiques pour casser une code par la \u00ab force brute \u00bb. Pour un ordinateur quantique, ce d\u00e9cryptage est th\u00e9oriquement r\u00e9alisable et en tr\u00e8s peu de temps. D\u2019o\u00f9 le <strong>risque non n\u00e9gligeable pour les<\/strong> <strong>syst\u00e8mes de chiffrement actuels<\/strong> si ces ordinateurs quantiques venaient \u00e0 \u00eatre d\u00e9mocratis\u00e9s.<\/p>\n<p>De plus, plusieurs attaques informatiques telles que les <strong>attaques par d\u00e9ni de service<\/strong> (DOS ou DDOS) n\u00e9cessitent d\u2019exploiter de fortes ressources en termes de traitement informatique qui, \u00e0 l\u2019aide des futurs ordinateurs quantiques, <strong>pourraient devenir facilement ex\u00e9cutables<\/strong>.<\/p>\n<p>C\u2019est pr\u00e9cis\u00e9ment pour ces raisons que les instigateurs de l\u2019informatique quantique se focalisent notamment sur le domaine de la s\u00e9curit\u00e9 afin de combler les failles qui pourraient potentiellement \u00eatre occasionn\u00e9es par l\u2019apparition des ordinateurs quantiques, et esp\u00e9rant ainsi offrir des communications totalement s\u00e9curis\u00e9es aux utilisateurs, en misant sur la <strong>cryptographie quantique<\/strong>. En effet, un r\u00e9seau de communication quantique serait th\u00e9oriquement inviolable. Toute tentative visant \u00e0 intercepter la \u00ab\u00a0cl\u00e9 de chiffrement quantique\u00a0\u00bb modifierait l\u2019int\u00e9grit\u00e9 physique des donn\u00e9es quantiques, changerait alors leurs \u00e9tats (passage au 0 ou au 1 par exemple), et pourraient ainsi d\u00e9clencher une alerte qui avertirait les personnes concern\u00e9es. Actuellement, plusieurs laboratoires dans diff\u00e9rents pays tentent de tirer le meilleur parti de cette technologie.<\/p>\n<p>Par ailleurs, l\u2019histoire nous a montr\u00e9 que lorsqu\u2019un protocole de chiffrement \u00e9tait devenu \u00ab\u00a0cassable\u00a0\u00bb, des solutions de chiffrement plus s\u00e9curis\u00e9es voyaient le jour au m\u00eame moment. On peut donc imaginer que si un jour un ordinateur quantique permet de casser un chiffrement \u00ab\u00a0classique\u00a0\u00bb, une solution de chiffrement plus robuste, potentiellement bas\u00e9e sur la cryptographie quantique, sera disponible.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019informatique quantique, concr\u00e8tement\u2026<\/h2>\n<p>Dans l\u2019\u00e9tat actuel des recherches, tous ces concepts restent th\u00e9oriques et <strong>seuls quelques embryons d\u2019ordinateurs quantiques existent dans le monde<\/strong>, confin\u00e9s encore \u00e0 des laboratoires acad\u00e9miques, au sein des institutions les plus prestigieuses. Une qu\u00eate dans laquelle IBM et Google se sont d\u00e9j\u00e0 lanc\u00e9s depuis plusieurs ann\u00e9es. Intel a \u00e9galement rejoint la course \u00e0 l&#8217;informatique quantique en annon\u00e7ant investir 50 millions de dollars sur le sujet. La France n\u2019est pas en reste, avec notamment le Laboratoire Kastler Brossel qui a re\u00e7u r\u00e9cemment un troisi\u00e8me Prix Nobel pour des travaux allant dans ce sens.<\/p>\n<p>Du reste, les avis divergent sur cette nouvelle g\u00e9n\u00e9ration de l\u2019informatique\u00a0: Le National Institute of Standards and Technology (ou NIST) am\u00e9ricain a pr\u00e9venu que les diff\u00e9rentes agences gouvernementales devront \u00eatre pr\u00eates \u00e0 adopter de tels syst\u00e8mes en 2025.\u00a0 La NSA, l\u2019agence nationale de la s\u00e9curit\u00e9, conseille de mettre en place des processus de s\u00e9curit\u00e9 quantique aussi rapidement que possible. A l\u2019oppos\u00e9, certains cryptographes ne partagent pas cet avis, et ont d\u00e9clar\u00e9 lors de la derni\u00e8re Conf\u00e9rence RSA qu&#8217;<strong>ils doutent que les progr\u00e8s dans le calcul quantique et l&#8217;intelligence artificielle transformera r\u00e9ellement la s\u00e9curit\u00e9 informatique<\/strong>. Aussi, Eleni Diamanti, chercheuse au CNRS et membre de Paris Center for Quantum Computing, affirme pareillement que \u00ab m\u00eame si un qubit est plus puissant qu\u2019un bit, il en faut au moins un millier pour concurrencer les machines actuelles\u00a0\u00bb, ce qui est loin d\u2019\u00eatre concr\u00e9tis\u00e9 aujourd\u2019hui, au vu de la complexit\u00e9 de cr\u00e9ation d\u2019un qubit et de maintien dans des conditions stables.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depuis des ann\u00e9es, des chercheurs partout dans le monde, ainsi que les plus grandes entreprises de technologies, parmi lesquelles IBM, Google et Microsoft, s\u2019\u00e9chinent \u00e0 mettre au point un ordinateur quantique. Cette technologie pourrait r\u00e9soudre des probl\u00e8mes math\u00e9matiques complexes et&#8230;<\/p>\n","protected":false},"author":1287,"featured_media":9872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[95,1070,3302,146],"coauthors":[2848],"class_list":["post-9871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-innovation","tag-outillage","tag-security-architecture","tag-systeme-dinformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Depuis des ann\u00e9es, des chercheurs partout dans le monde, ainsi que les plus grandes entreprises de technologies, parmi lesquelles IBM, Google et Microsoft, s\u2019\u00e9chinent \u00e0 mettre au point un ordinateur quantique. Cette technologie pourrait r\u00e9soudre des probl\u00e8mes math\u00e9matiques complexes et...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-30T16:31:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:05:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Y4smIn3eLHimdI\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Y4smIn3eLHimdI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\"},\"author\":{\"name\":\"Y4smIn3eLHimdI\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/93263f4b3a44f398df0d010f6371b40b\"},\"headline\":\"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ?\",\"datePublished\":\"2017-06-30T16:31:14+00:00\",\"dateModified\":\"2019-12-31T09:05:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\"},\"wordCount\":1385,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"keywords\":[\"Innovation\",\"outillage\",\"security architecture\",\"syst\u00e8me d'information\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\",\"name\":\"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"datePublished\":\"2017-06-30T16:31:14+00:00\",\"dateModified\":\"2019-12-31T09:05:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"width\":3873,\"height\":3873,\"caption\":\"Start up new business project with rocket and clouds image, vector illustration. Flat design. Speed. Rocket flying in the sky above the clouds. Blue sky with white clouds.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/93263f4b3a44f398df0d010f6371b40b\",\"name\":\"Y4smIn3eLHimdI\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/y4smin3elhimdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/","og_locale":"en_US","og_type":"article","og_title":"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ? - RiskInsight","og_description":"Depuis des ann\u00e9es, des chercheurs partout dans le monde, ainsi que les plus grandes entreprises de technologies, parmi lesquelles IBM, Google et Microsoft, s\u2019\u00e9chinent \u00e0 mettre au point un ordinateur quantique. Cette technologie pourrait r\u00e9soudre des probl\u00e8mes math\u00e9matiques complexes et...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/","og_site_name":"RiskInsight","article_published_time":"2017-06-30T16:31:14+00:00","article_modified_time":"2019-12-31T09:05:29+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","type":"image\/jpeg"}],"author":"Y4smIn3eLHimdI","twitter_misc":{"Written by":"Y4smIn3eLHimdI","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/"},"author":{"name":"Y4smIn3eLHimdI","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/93263f4b3a44f398df0d010f6371b40b"},"headline":"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ?","datePublished":"2017-06-30T16:31:14+00:00","dateModified":"2019-12-31T09:05:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/"},"wordCount":1385,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","keywords":["Innovation","outillage","security architecture","syst\u00e8me d'information"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/","url":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/","name":"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","datePublished":"2017-06-30T16:31:14+00:00","dateModified":"2019-12-31T09:05:29+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","width":3873,"height":3873,"caption":"Start up new business project with rocket and clouds image, vector illustration. Flat design. Speed. Rocket flying in the sky above the clouds. Blue sky with white clouds."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Informatique quantique et s\u00e9curit\u00e9 : menace ou opportunit\u00e9 ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/93263f4b3a44f398df0d010f6371b40b","name":"Y4smIn3eLHimdI","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/y4smin3elhimdi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1287"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=9871"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9871\/revisions"}],"predecessor-version":[{"id":9880,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9871\/revisions\/9880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9872"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=9871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=9871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=9871"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=9871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}