{"id":449,"date":"2022-04-08T16:15:20","date_gmt":"2022-04-08T14:15:20","guid":{"rendered":"https:\/\/battini.bzh\/?p=449"},"modified":"2022-04-09T16:18:41","modified_gmt":"2022-04-09T14:18:41","slug":"cybersecurite-et-calcul-quantique","status":"publish","type":"post","link":"https:\/\/battini.bzh\/index.php\/2022\/04\/08\/cybersecurite-et-calcul-quantique\/","title":{"rendered":"Cybers\u00e9curit\u00e9 et calcul quantique"},"content":{"rendered":"<p>Les risques de cybers\u00e9curit\u00e9 cr\u00e9\u00e9s par l\u2019irruption du calculateur quantique,<br \/>ainsi que les diff\u00e9rentes r\u00e9ponses.<\/p>\n<p>\u00c0 destination des sp\u00e9cialistes de cybers\u00e9curit\u00e9 qui \u2026<br \/>\u2026 ont une culture scientifique, et des bases math\u00e9matiques minimales,<br \/>\u2026 ne sont pas experts en m\u00e9canique ni en calcul quantique,<br \/>\u2026 veulent comprendre comment fonctionne la m\u00e9canique et le calculateur quantique,<br \/>\u2026 (re)d\u00e9couvriront attaques quantique, cryptographie quantique et post-quantique<\/p>\n<p>Mon m\u00e9moire de CES Cybers\u00e9curit\u00e9 pass\u00e9 avec Telecom Evolution, Telecom Paris et l&rsquo;institut Mines-Telecom!<br \/>Il constitue aussi un cours, qui se veut raisonnablement abordable pour un \u00ab\u00a0esprit \u00e9clair\u00e9 et curieux\u00a0\u00bb.<\/p>\n<p>Ce n&rsquo;est pas un article de recherche, bien s\u00fbr. C&rsquo;est une synth\u00e8se plut\u00f4t compl\u00e8te (1 ou 2 th\u00e9or\u00e8mes manquent&#8230;),<br \/>le socle culturel que devrait avoir tout RSSI.<\/p>\n\n\n<blockquote class=\"wp-block-quote\"><p><\/p><\/blockquote>\n\n\n<a href=\"https:\/\/battini.bzh\/wp-content\/uploads\/2022\/04\/Cybersecurite-Calcul-quantique-extraits.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Cybersecurite-Calcul-quantique-extraits<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les risques de cybers\u00e9curit\u00e9 cr\u00e9\u00e9s par l\u2019irruption du calculateur quantique,ainsi que les diff\u00e9rentes r\u00e9ponses. \u00c0 destination des sp\u00e9cialistes de cybers\u00e9curit\u00e9 qui \u2026\u2026 ont une culture scientifique, et des bases math\u00e9matiques minimales,\u2026 ne sont pas experts en m\u00e9canique ni en calcul quantique,\u2026 veulent comprendre comment fonctionne la m\u00e9canique et le calculateur quantique,\u2026 (re)d\u00e9couvriront attaques quantique, cryptographieLire la suite &rarr;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/posts\/449"}],"collection":[{"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":3,"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/posts\/449\/revisions"}],"predecessor-version":[{"id":456,"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/posts\/449\/revisions\/456"}],"wp:attachment":[{"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/media?parent=449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/categories?post=449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/battini.bzh\/index.php\/wp-json\/wp\/v2\/tags?post=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}