<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Archives des chiffrement - Catalyst Blue Phenix</title>
	<atom:link href="https://beta.catalystbluephenix.com/tag/chiffrement/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Wed, 02 Apr 2025 10:53:28 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://beta.catalystbluephenix.com/wp-content/uploads/2023/11/IMG_20241014_123254-1-150x150.png</url>
	<title>Archives des chiffrement - Catalyst Blue Phenix</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cryptographie post-quantique</title>
		<link>https://beta.catalystbluephenix.com/quantumcrypt/</link>
					<comments>https://beta.catalystbluephenix.com/quantumcrypt/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 10:47:08 +0000</pubDate>
				<category><![CDATA[Actualité Cyber]]></category>
		<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Quantum computing]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[algorithmes de cryptage]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cryptographie]]></category>
		<category><![CDATA[cybersécurité]]></category>
		<category><![CDATA[informatique quantique]]></category>
		<category><![CDATA[ordinateur quantique]]></category>
		<category><![CDATA[quantum computing]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=3108</guid>

					<description><![CDATA[<p>Cryptographie post-quantique Le paradigme post-quantique en cryptographie : évolutions, défis et perspectives RésuméL&#8217;avènement de l&#8217;informatique quantique représente un changement de paradigme majeur pour la cryptographie moderne. Cet article analyse les implications de cette révolution technologique sur les systèmes cryptographiques actuels, évalue l&#8217;état de l&#8217;art des ordinateurs quantiques, et examine les solutions cryptographiques post-quantiques émergentes.   [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/quantumcrypt/">Cryptographie post-quantique</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3108" class="elementor elementor-3108">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-d9be4d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="d9be4d9" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-02c887b" data-id="02c887b" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e260b32 elementor-widget elementor-widget-heading" data-id="e260b32" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Cryptographie post-quantique</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7d9962d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7d9962d" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10b9d13" data-id="10b9d13" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1c1d19c elementor-widget elementor-widget-heading" data-id="1c1d19c" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Le paradigme post-quantique en cryptographie : évolutions, défis et perspectives</h5>				</div>
				</div>
				<section class="elementor-section elementor-inner-section elementor-element elementor-element-328e427 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="328e427" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-05a6da5" data-id="05a6da5" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1b8ada6 elementor-widget elementor-widget-text-editor" data-id="1b8ada6" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><em><strong>Résumé</strong></em><br />L&rsquo;avènement de l&rsquo;informatique quantique représente un changement de paradigme majeur pour la cryptographie moderne. Cet article analyse les implications de cette révolution technologique sur les systèmes cryptographiques actuels, évalue l&rsquo;état de l&rsquo;art des ordinateurs quantiques, et examine les solutions cryptographiques post-quantiques émergentes.</p><p> </p><p><em><strong>Introduction</strong></em></p><p>La cryptographie asymétrique, pilier de la sécurité numérique moderne, repose sur des problèmes mathématiques considérés comme difficiles à résoudre avec des ordinateurs classiques. Cependant, l&rsquo;émergence de l&rsquo;informatique quantique menace directement ces fondements. L&rsquo;algorithme de Shor (1994) démontre qu&rsquo;un ordinateur quantique suffisamment puissant pourrait factoriser efficacement de grands nombres, compromettant ainsi les systèmes RSA et la cryptographie sur les courbes elliptiques.</p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dcb7769" data-id="dcb7769" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-fdd4714 elementor-widget elementor-widget-image" data-id="fdd4714" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="615" height="950" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/04/post-quantum-cryptography-png.avif" class="attachment-large size-large wp-image-3111 not-transparent" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/04/post-quantum-cryptography-png.avif 615w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/04/post-quantum-cryptography-194x300.avif 194w" sizes="(max-width: 615px) 100vw, 615px" data-has-transparency="false" data-dominant-color="ab7e7d" style="--dominant-color: #ab7e7d" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c482489 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c482489" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0561947" data-id="0561947" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5601e65 elementor-widget elementor-widget-heading" data-id="5601e65" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">État de l'art de l'informatique quantique</h5>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-180a730 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="180a730" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-03087fa" data-id="03087fa" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-b2789bb elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b2789bb" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3cf759c" data-id="3cf759c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-fb1ea28 elementor-widget elementor-widget-heading" data-id="fb1ea28" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h6 class="elementor-heading-title elementor-size-default">Avancées technologiques récentes</h6>				</div>
				</div>
				<div class="elementor-element elementor-element-578bcad elementor-widget elementor-widget-image" data-id="578bcad" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="685" height="386" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/04/cse-quantumcompu.2e16d0ba.fill-933x525-c100.format-avif.avif" class="attachment-large size-large wp-image-3112 not-transparent" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/04/cse-quantumcompu.2e16d0ba.fill-933x525-c100.format-avif.avif 685w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/04/cse-quantumcompu.2e16d0ba.fill-933x525-c100.format-avif-300x169.avif 300w" sizes="(max-width: 685px) 100vw, 685px" data-has-transparency="false" data-dominant-color="637788" style="--dominant-color: #637788" />															</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eb90ef9" data-id="eb90ef9" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b8ac6e7 elementor-widget elementor-widget-text-editor" data-id="b8ac6e7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Les progrès en informatique quantique s&rsquo;accélèrent significativement. IBM a atteint en 2023 le cap des 133 qubits avec son processeur Osprey, tandis que Google revendique la suprématie quantique depuis 2019 avec Sycamore. Toutefois, ces systèmes restent limités par la décohérence quantique et les taux d&rsquo;erreur.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-85c4860 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="85c4860" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b221008" data-id="b221008" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-fd1a48b elementor-widget elementor-widget-text-editor" data-id="fd1a48b" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h5><strong>Depuis, l&rsquo;innovation s&rsquo;accélère : </strong></h5><p class="" data-start="177" data-end="200"><strong data-start="177" data-end="200">Progrès matériels :</strong></p><ul data-start="202" data-end="516"><li class="" data-start="202" data-end="360"><p class="" data-start="204" data-end="360"><strong data-start="204" data-end="238">Google et le processeur Willow</strong> : <span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]">En décembre 2024, Google a dévoilé Willow, un processeur quantique capable de résoudre en cinq minutes des tâches qui prendraient des temps astronomiques aux superordinateurs classiques. Ce processeur de 105 qubits se distingue par une réduction notable des erreurs de traitement, grâce à des améliorations en correction d&rsquo;erreurs quantiques.</span></p></li><li class="" data-start="362" data-end="516"><p class="" data-start="364" data-end="516"><strong data-start="364" data-end="394">IBM et le processeur Heron</strong> : <span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]">IBM a présenté en décembre 2023 Heron, un processeur quantique de 156 qubits doté de coupleurs réglables, visant à éliminer les erreurs d&rsquo;interférence présentes dans les versions précédentes. Heron est intégré au système IBM Quantum System Two et est accessible aux utilisateurs via le cloud.</span></p></li></ul><p class="" data-start="518" data-end="556"><strong data-start="518" data-end="556">Avancées en correction d&rsquo;erreurs :</strong></p><ul data-start="558" data-end="849"><li class="" data-start="558" data-end="709"><p class="" data-start="560" data-end="709"><strong data-start="560" data-end="587">Microsoft et Quantinuum</strong> : <span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]">En avril 2024, Microsoft et Quantinuum ont démontré une amélioration de 800 fois du taux d&rsquo;erreur en utilisant des qubits logiques. En employant 30 qubits physiques pour former quatre qubits logiques sur le matériel à ions piégés de Quantinuum, ils ont réussi à corriger les erreurs en temps réel sans détruire les qubits logiques.</span> <span class="ml-1 inline-flex max-w-full items-center relative top-[-0.094rem]"><a class="flex h-6 overflow-hidden rounded-xl px-2.5 text-[0.5625em] font-medium !bg-[#F4F4F4] !text-token-text-secondary dark:!bg-[#303030]" href="https://en.wikipedia.org/wiki/Physical_and_logical_qubits?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative bottom-0 left-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between absolute"><span class="max-w-full grow overflow-hidden truncate text-center">Wikipedia</span><span class="-mr-1 ml-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]">+4</span></span><span class="flex h-4 w-full items-center justify-between"><span class="max-w-full grow overflow-hidden truncate text-center">Wikipedia</span><span class="-mr-1 ml-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]">+4</span></span><span class="flex h-4 w-full items-center justify-between absolute"><span class="max-w-full grow overflow-hidden truncate text-center">Wikipedia</span><span class="-mr-1 ml-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]">+4</span></span></span></a></span></p></li><li class="" data-start="711" data-end="849"><p class="" data-start="713" data-end="849"><strong data-start="713" data-end="723">Google</strong> : <span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]">En février 2023, les chercheurs de Google ont montré que l&rsquo;augmentation du nombre de qubits physiques dans un code de surface pouvait réduire le taux d&rsquo;erreur, atteignant environ 2,9 % pour une matrice de qubits de distance 5.</span></p></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-11d1821 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="11d1821" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7420954" data-id="7420954" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d8b391b elementor-widget elementor-widget-text-editor" data-id="d8b391b" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Acteurs majeurs et écosystème</strong></p><p>Plusieurs catégories d&rsquo;acteurs se distinguent :</p><p>&#8211; Géants technologiques : IBM, Google, Intel, Microsoft<br />&#8211; Startups spécialisées : IonQ, Rigetti, PsiQuantum<br />&#8211; Instituts de recherche: CEA, CNRS, Delft University</p><p><strong>Limitations actuelles</strong></p><p>Les principaux défis incluent :<br />&#8211; La stabilité des qubits (temps de cohérence)<br />&#8211; La correction d&rsquo;erreurs quantiques<br />&#8211; Le passage à l&rsquo;échelle des systèmes</p><p>## 3. Impact sur les systèmes cryptographiques actuels</p><p>### 3.1 Vulnérabilités identifiées</p><p>Les algorithmes particulièrement menacés sont :<br />&#8211; RSA (toutes versions)<br />&#8211; Diffie-Hellman<br />&#8211; Cryptographie sur les courbes elliptiques (ECC)<br />&#8211; DSA et ses variantes</p><p>### 3.2 Estimation des risques temporels</p><p>Selon les projections du NIST, un ordinateur quantique capable de casser RSA-2048 pourrait émerger entre 2030 et 2040. Cette estimation impose une migration urgente vers des solutions post-quantiques.</p><p>## 4. Solutions cryptographiques post-quantiques</p><p>### 4.1 Cryptographie basée sur les réseaux</p><p>Les systèmes basés sur les réseaux euclidiens, comme NTRU et LWE (Learning With Errors), offrent une résistance prometteuse aux attaques quantiques. Le NIST a notamment sélectionné CRYSTALS-Kyber, basé sur Module-LWE, comme standard de chiffrement post-quantique.</p><p>### 4.2 Systèmes basés sur les codes</p><p>Les crypto-systèmes basés sur les codes correcteurs d&rsquo;erreurs, comme le système McEliece (1978), connaissent un regain d&rsquo;intérêt. BIKE (Bit Flipping Key Encapsulation) représente une évolution moderne de cette approche.</p><p>### 4.3 Signatures multivariées</p><p>Bien que plus limitées en applications, les signatures basées sur des systèmes d&rsquo;équations multivariées comme Rainbow présentent des propriétés intéressantes pour certains cas d&rsquo;usage spécifiques.</p><p>## 5. Stratégies de transition</p><p>### 5.1 Approche hybride</p><p>Une approche progressive combinant algorithmes classiques et post-quantiques est recommandée :<br />« `<br />Chiffrement_hybride(m) = EClassique(EPQ(m))<br />« `<br />Cette méthode garantit une sécurité minimale même en cas de vulnérabilité d&rsquo;un des systèmes.</p><p>### 5.2 Recommandations pour les organisations</p><p>1. Inventaire des systèmes cryptographiques<br />2. Évaluation des risques quantum<br />3. Développement de la « crypto-agilité »<br />4. Tests des solutions post-quantiques<br />5. Plan de migration progressive</p><p>## 6. Conclusion</p><p>La transition vers la cryptographie post-quantique représente un défi majeur pour la sécurité de l&rsquo;information. Si les ordinateurs quantiques suffisamment puissants pour menacer la cryptographie actuelle ne sont pas encore une réalité, l&rsquo;urgence de la migration est réelle compte tenu des délais de déploiement et de la nécessité de protéger les données sensibles à long terme.</p><p>## Références</p><p>1. Shor, P. W. (1994). « Algorithms for quantum computation: discrete logarithms and factoring »<br />2. NIST (2022). « Post-Quantum Cryptography Standardization »<br />3. Alagic, G. et al. (2023). « Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process »<br />4. IBM Quantum (2023). « IBM Quantum Hardware Roadmap »<br />5. Proos, J., &amp; Zalka, C. (2003). « Shor&rsquo;s discrete logarithm quantum algorithm for elliptic curves »</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/quantumcrypt/">Cryptographie post-quantique</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/quantumcrypt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Les piliers de la cybersécurité</title>
		<link>https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/</link>
					<comments>https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 10:26:55 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[approche holistique]]></category>
		<category><![CDATA[audits de sécurité]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cybersécurité]]></category>
		<category><![CDATA[formation sécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[politique de sécurité]]></category>
		<category><![CDATA[réponse aux incidents]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2383</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense IT Pro Tech Les trois piliers fondamentauxdela cybersécurité sont : Les personnes (le facteurhumain) La formation et la sensibilisation des utilisateurs La création d’une culture de sécurité dans l’organisation Le développement des compétences des équipes de sécurité La responsabilisation de chacun face aux enjeux de sécurité Les processus La [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/">Les piliers de la cybersécurité</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2383" class="elementor elementor-2383">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-e770e77 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e770e77" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f49c25" data-id="9f49c25" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-738ae70 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="738ae70" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-25850f3" data-id="25850f3" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-767dd64 elementor-widget elementor-widget-wdt-post-author" data-id="767dd64" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4854803" data-id="4854803" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-49e0a0e elementor-widget elementor-widget-wdt-post-categories" data-id="49e0a0e" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-b06f794 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="b06f794" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-b06f794"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les trois piliers <span class="wdt-heading-colored-elements">fondamentaux</span><span class="wdt-heading-colored-elements">de</span>la cybersécurité sont :</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-8e68830 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="8e68830" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-8e68830"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les personnes (le <span class="wdt-heading-colored-elements">facteur</span><span class="wdt-heading-colored-elements">humain)</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f05dd4f common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f05dd4f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La formation et la sensibilisation des utilisateurs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La création d’une culture de sécurité dans l’organisation</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Le développement des compétences des équipes de sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La responsabilisation de chacun face aux enjeux de sécurité</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-886af55 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="886af55" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-886af55"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les processus</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-69bcfab common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="69bcfab" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La mise en place de politiques et procédures de sécurité claires</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La gestion des risques et la conformité réglementaire</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les plans de réponse aux incidents</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les audits et contrôles réguliers</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La documentation et les mises à jour des procédures</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-01cfa46 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="01cfa46" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-01cfa46"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">La technologie</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-59f0840 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="59f0840" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les solutions techniques de protection (pare-feu, antivirus, etc.)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La sécurisation des infrastructures et des données</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La surveillance et la détection des menaces</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les outils de chiffrement et d’authentification</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les sauvegardes et la continuité d’activité</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-e3639eb elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="e3639eb" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e3639eb"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Ces trois piliers <span class="wdt-heading-colored-elements">sont</span><span class="wdt-heading-colored-elements">interdépendants</span>– une stratégie de cybersécurité efficace nécessite un équilibre entre ces aspects.</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-3f7fd32 elementor-widget elementor-widget-wdt-post-navigation" data-id="3f7fd32" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">			<div class="post-prev-link no-post">
                <a href="#" style="background-image:url(https://beta.catalystbluephenix.com/wp-content/themes/themeforest-8K8rD7vY-aiglobe-artificial-intelligence-startup-technology-wordpress-theme/ai-globe/assets/images/no-post.jpg);" class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3>Not available to show!</h3>
				</div>
			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/Designer-39.jpeg) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/" title="PEBKAC - Le problème est entre la chaise et le clavier">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/" title="PEBKAC - Le problème est entre la chaise et le clavier">PEBKAC - Le problème est entre la chaise et le clavier</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-025cfc8 elementor-widget elementor-widget-wdt-post-tags" data-id="025cfc8" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/approche-holistique/" rel="tag">approche holistique</a> <a href="https://beta.catalystbluephenix.com/tag/audits-de-securite/" rel="tag">audits de sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/chiffrement/" rel="tag">chiffrement</a> <a href="https://beta.catalystbluephenix.com/tag/cybersecurite/" rel="tag">cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/formation-securite/" rel="tag">formation sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/politique-de-securite/" rel="tag">politique de sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/reponse-aux-incidents/" rel="tag">réponse aux incidents</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/">Les piliers de la cybersécurité</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
