{"id":3837,"date":"2016-12-24T17:01:07","date_gmt":"2016-12-24T17:01:07","guid":{"rendered":"https:\/\/2100.org\/tv\/?p=3837"},"modified":"2017-01-29T12:03:46","modified_gmt":"2017-01-29T12:03:46","slug":"cryptologie-et-quantique-aide-ou-menaces","status":"publish","type":"post","link":"https:\/\/2100.org\/tv\/3837\/cryptologie-et-quantique-aide-ou-menaces\/","title":{"rendered":"Cryptologie et quantique, aide ou menaces ?"},"content":{"rendered":"<p>Par G\u00e9rard Peliks, Association des r\u00e9servistes du chiffre et de la s\u00e9curit\u00e9 de l\u2019information (ARCSI)<\/p>\n<p><small>Conf\u00e9rence propos\u00e9e par Dominique Lacroix, dans le cadre de l&#8217;atelier \u00ab Prospective et cyberstrat\u00e9gie \u00bb<\/small><br \/>\n<!--more--><\/p>\n<div id=\"wpfp_fec4a6b9d5d93582b64a02751d5000e8\" class=\"flowplayer no-brand is-splash is-paused skin-slim no-svg fp-slim fp-edgy has-playlist has-playlist-horizontal\" data-fv-embed=\"https:\/\/2100.org\/tv\/3837\/cryptologie-et-quantique-aide-ou-menaces\/fvp\/\" style=\"position:relative; max-width: 100%; \" data-ratio=\"0.75\">\n\t<div class=\"fp-ratio\" style=\"padding-top: 75%\"><\/div>\n\t<img decoding=\"async\" class=\"fp-splash\" alt=\"Premi\u00e8re partie;Deuxi\u00e8me partie;Troisi\u00e8me partie\" src=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/2016\/peliks1216_01.jpg\" style=\"position:absolute;top:0;width:100%\" \/>\n\t<div class=\"fp-ui\"><noscript>Please enable JavaScript<\/noscript><div class=\"fp-play fp-visible\"><svg class=\"fp-play-sharp-fill\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 100 100\"><defs><style>.fp-color-play{opacity:0.65;}.controlbutton{fill:#fff;}<\/style><\/defs><title>play-sharp-fill<\/title><path class=\"fp-color-play\" d=\"M49.9217-.078a50,50,0,1,0,50,50A50.0564,50.0564,0,0,0,49.9217-.078Z\"\/><polygon class=\"controlbutton\" points=\"73.601 50 37.968 70.573 37.968 29.427 73.601 50\" filter=\"url(#f1)\"\/><\/svg><\/div><div class=\"fp-preload\"><b><\/b><b><\/b><b><\/b><b><\/b><\/div><\/div>\n<div class='fvp-share-bar'><ul class=\"fvp-sharing\">\r\n    <li><a class=\"sharing-facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2F2100.org%2Ftv%2F3837%2Fcryptologie-et-quantique-aide-ou-menaces%2F\" target=\"_blank\"><\/a><\/li>\r\n    <li><a class=\"sharing-twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=TV+2100+&url=https%3A%2F%2F2100.org%2Ftv%2F3837%2Fcryptologie-et-quantique-aide-ou-menaces%2F\" target=\"_blank\"><\/a><\/li>\r\n    <li><a class=\"sharing-email\" href=\"mailto:?body=Check%20out%20the%20amazing%20video%20here%3A%20https%3A%2F%2F2100.org%2Ftv%2F3837%2Fcryptologie-et-quantique-aide-ou-menaces%2F\" target=\"_blank\"><\/a><\/li><\/ul><div><a class=\"sharing-link\" href=\"https:\/\/2100.org\/tv\/3837\/cryptologie-et-quantique-aide-ou-menaces\/\" target=\"_blank\">Link<\/a><\/div><div><label><a class=\"embed-code-toggle\" href=\"#\"><strong>Embed<\/strong><\/a><\/label><\/div><div class=\"embed-code\"><label>Copy and paste this HTML code into your webpage to embed.<\/label><textarea><\/textarea><\/div><\/div>\n<\/div>\n\t<div class=\"fp-playlist-external fv-playlist-design-2017 fp-playlist-horizontal fp-playlist-has-captions skin-slim\" rel=\"wpfp_fec4a6b9d5d93582b64a02751d5000e8\">\n\t\t<a href='#' data-item='{\"sources\":[{\"src\":\"https:\\\/\\\/2100.org\\\/tv\\\/wp-content\\\/uploads\\\/2016\\\/peliks1216_01.mp4\",\"type\":\"video\\\/mp4\"}],\"fv_title\":\"Premi\\u00e8re partie\",\"splash\":\"https:\\\/\\\/2100.org\\\/tv\\\/wp-content\\\/uploads\\\/2016\\\/peliks1216_01.jpg\"}'><div class='fvp-playlist-thumb-img'><img  src='https:\/\/2100.org\/tv\/wp-content\/uploads\/2016\/peliks1216_01.jpg' \/><\/div><h4><span>Premi\u00e8re partie<\/span><i class=\"dur\">47:47<\/i><\/h4><\/a>\n\t\t<a href='#' data-item='{\"sources\":[{\"src\":\"https:\\\/\\\/2100.org\\\/tv\\\/wp-content\\\/uploads\\\/2016\\\/peliks1216_02.mp4\",\"type\":\"video\\\/mp4\"}],\"fv_title\":\"Deuxi\\u00e8me partie\",\"splash\":\"https:\\\/\\\/2100.org\\\/tv\\\/wp-content\\\/uploads\\\/2016\\\/peliks1216_02.jpg\"}'><div class='fvp-playlist-thumb-img'><img  src='https:\/\/2100.org\/tv\/wp-content\/uploads\/2016\/peliks1216_02.jpg' \/><\/div><h4><span>Deuxi\u00e8me partie<\/span><i class=\"dur\">50:13<\/i><\/h4><\/a>\n\t\t<a href='#' data-item='{\"sources\":[{\"src\":\"https:\\\/\\\/2100.org\\\/tv\\\/wp-content\\\/uploads\\\/2016\\\/peliks1216_03.mp4\",\"type\":\"video\\\/mp4\"}],\"fv_title\":\"Troisi\\u00e8me partie\",\"splash\":\"https:\\\/\\\/2100.org\\\/tv\\\/wp-content\\\/uploads\\\/2016\\\/peliks1216_03.jpg\"}'><div class='fvp-playlist-thumb-img'><img  src='https:\/\/2100.org\/tv\/wp-content\/uploads\/2016\/peliks1216_03.jpg' \/><\/div><h4><span>Troisi\u00e8me partie<\/span><i class=\"dur\">01:59<\/i><\/h4><\/a>\n\t<\/div>\n\n<p><strong>Diaporama de la conf\u00e9rence<\/strong> (veuillez patienter un peu \u00e0 la premi\u00e8re ouverture)<strong><br \/>\n<\/strong><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2F2100.org%2Ftv%2Fwp-content%2Fuploads%2Fchiffrement_quantique_peliks.pptx&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<\/p>\n<p><strong>Argument<br \/>\nLe chiffrement num\u00e9rique <\/strong>actuel est-il menac\u00e9 par l\u2019arriv\u00e9e dans un temps encore non d\u00e9termin\u00e9 des calculateurs quantiques ? Si, sauf secrets bien gard\u00e9s, ceux-ci n\u2019existent pas encore sur un plan op\u00e9rationnel, d\u2019un point de vue th\u00e9orique des simulateurs d\u2019ordinateurs quantiques existent et de gros moyens sont mis dans la recherche sur cette technologie de rupture.<br \/>\nLa physique quantique vient-elle au contraire au secours de la cryptologie, en appui \u00e0 la r\u00e9solution de probl\u00e8mes que ceux-ci vont poser quand les calculateurs quantiques seront capables de mener des calculs \u00e0 une vitesse d\u2019une magnitude plus \u00e9lev\u00e9e que celle dont sont capables les ordinateurs d\u2019aujourd\u2019hui ?<br \/>\nDe l\u2019utilisation des photons orient\u00e9s pour r\u00e9soudre le probl\u00e8me de la g\u00e9n\u00e9ration al\u00e9atoire de nombres qui vont servir \u00e0 constituer les cl\u00e9s secr\u00e8tes dans un chiffrement sym\u00e9trique, \u00e0 l\u2019utilisation de ces photons pour \u00e9changer les cl\u00e9s secr\u00e8tes d\u2019une mani\u00e8re s\u00fbre en se basant sur la d\u00e9coh\u00e9rence quantique, cette pr\u00e9sentation explorera les technologies op\u00e9rationnelles d\u00e8s aujourd\u2019hui. La g\u00e9n\u00e9ration spontan\u00e9e des cl\u00e9s sym\u00e9triques entre deux entit\u00e9s pouvant \u00eatre distantes de plusieurs centaines de kilom\u00e8tres, voire beaucoup plus, en utilisant l\u2019intrication quantique, sera aussi \u00e9voqu\u00e9e.<br \/>\nLa physique quantique, menace ou aide pour la cryptologie d\u2019aujourd\u2019hui et de demain ? C\u2019est la question qui sera pos\u00e9e et \u00e0 laquelle nous r\u00e9pondrons. Apr\u00e8s cet expos\u00e9, un dialogue sera organis\u00e9 entre les participants.<\/p>\n<p><strong>G\u00e9rard Peliks<\/strong> travaille depuis plus de vingt ans dans le domaine de la s\u00e9curit\u00e9 de l&#8217;information. Ing\u00e9nieur dipl\u00f4m\u00e9, son dernier employeur a \u00e9t\u00e9 Airbus <em>Defence &amp; Space Cybersecurity<\/em>.<br \/>\nIl est membre du Conseil d&#8217;administration de l&#8217;Association des R\u00e9servistes du Chiffre et de la S\u00e9curit\u00e9 de l&#8217;Information (ARCSI) et lieutenant-colonel de la R\u00e9serve Citoyenne de Cyberd\u00e9fense (DGGN). Il organise les \u00ab Lundi de l&#8217;IE \u00bb mensuels du Cercle d&#8217;intelligence \u00e9conomique du MEDEF \u00cele-de-France.<br \/>\nPr\u00e9sident de l&#8217;atelier s\u00e9curit\u00e9 et vice-Pr\u00e9sident de l&#8217;association Forum Atena, dans lequel il cr\u00e9e et intervient dans de grands \u00e9v\u00e9nements sur l&#8217;avenir de l&#8217;Internet, le Big Data et la cybers\u00e9curit\u00e9 \/ cyberd\u00e9fense, il coordonne l&#8217;\u00e9criture du livre collectif <em>Mythes et l\u00e9gendes des TIC<\/em>.<br \/>\nIl participe \u00e0 plusieurs comit\u00e9s de pilotage de mast\u00e8res professionnels et est charg\u00e9 de cours sur diff\u00e9rentes facettes de la s\u00e9curit\u00e9 \u00e0 l&#8217;Institut Mines-T\u00e9l\u00e9com et au p\u00f4le L\u00e9onard de Vinci.<br \/>\nIl est pr\u00e9sident de l\u2019association CyberEdu, initiative de l\u2019ANSSI (Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information) pour que la s\u00e9curit\u00e9 du num\u00e9rique soit \u00e9voqu\u00e9e dans les cours d\u2019informatique de l\u2019enseignement sup\u00e9rieur.<\/p>\n<p><strong>Photos<\/strong> <small>(clich\u00e9s Dom Lacroix)<\/small><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-3848\" src=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_185317_resized-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_185317_resized-300x225.jpg 300w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_185317_resized-768x576.jpg 768w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_185317_resized-1024x768.jpg 1024w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_185317_resized.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-3849\" src=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_182116_resized-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_182116_resized-300x225.jpg 300w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_182116_resized-768x576.jpg 768w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_182116_resized-1024x768.jpg 1024w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_182116_resized.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/> <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-3850\" src=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_180154_resized-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_180154_resized-300x225.jpg 300w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_180154_resized-768x576.jpg 768w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_180154_resized-1024x768.jpg 1024w, https:\/\/2100.org\/tv\/wp-content\/uploads\/20161222_180154_resized.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Par G\u00e9rard Peliks, Association des r\u00e9servistes du chiffre et de la s\u00e9curit\u00e9 de l\u2019information (ARCSI) Conf\u00e9rence propos\u00e9e par Dominique Lacroix, dans le cadre de l&#8217;atelier \u00ab Prospective et cyberstrat\u00e9gie \u00bb<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"ngg_post_thumbnail":0,"footnotes":""},"categories":[6,8],"tags":[518,517,515,379,516],"class_list":["post-3837","post","type-post","status-publish","format-standard","hentry","category-communications","category-education","tag-cryptographie","tag-cybersecurite","tag-peliks-gerard","tag-informatique","tag-quantique"],"acf":[],"_links":{"self":[{"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/posts\/3837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/comments?post=3837"}],"version-history":[{"count":13,"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/posts\/3837\/revisions"}],"predecessor-version":[{"id":3967,"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/posts\/3837\/revisions\/3967"}],"wp:attachment":[{"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/media?parent=3837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/categories?post=3837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2100.org\/tv\/wp-json\/wp\/v2\/tags?post=3837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}