{"id":15960,"date":"2023-09-26T09:21:05","date_gmt":"2023-09-26T07:21:05","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=15960"},"modified":"2023-10-06T11:15:49","modified_gmt":"2023-10-06T09:15:49","slug":"pqc-et-qkd-quelles-differences","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/","title":{"rendered":"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ?"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Auteur : Arnaud DUFOURNET<\/strong>, Chief Marketing Officer<\/p>\n\n\n\n<p>En juillet dernier, le Gartner publiait la derni\u00e8re \u00e9dition de son \u00ab<a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2ELCN9T4&amp;ct=230731&amp;st=sb&amp;__hstc=263988819.1f032c66de8b9cb134f2d5b1cdea086b.1693382619821.1693382619821.1693382619821.1&amp;__hssc=263988819.3.1693382619821&amp;__hsfp=1187055526&amp;hsCtaTracking=417c1705-55cb-4040-bfd4-a82447a200ab%7Cef1745c5-22c7-4db3-83d4-4f015d56ae42#cppdip.791821\">&nbsp;Hype Cycle<\/a>&nbsp;\u00bb sur la s\u00e9curit\u00e9 des donn\u00e9es. Il s\u2019agit d\u2019une repr\u00e9sentation graphique de la maturit\u00e9 et de l\u2019adoption de technologies et d\u2019applications dans ce domaine. La cryptographie post-quantique et la cryptographie quantique (ou distribution de cl\u00e9s quantiques) figurent parmi les technologies tr\u00e8s prometteuses \u00e0 plus ou moins long terme, c\u2019est-\u00e0-dire d&rsquo;ici deux \u00e0 cinq ans. Cryptographie post-quantique (PQC ou <em>post-quantum cryptography<\/em> en anglais) et cryptographie quantique (QKD ou <em>quantum key distribution<\/em> en anglais) font souvent l\u2019objet de confusion. Cette publication du Gartner est l\u2019occasion de rappeler les grandes diff\u00e9rences entre ces deux technologies ainsi que les usages que l\u2019on peut en attendre.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Cryptographie quantique ou QKD<\/strong><\/strong><\/h2>\n\n\n\n<p>Commen\u00e7ons tout d\u2019abord par la plus ancienne des deux technologies. Invent\u00e9e par l\u2019Am\u00e9ricain Charles Bennett et le Canadien Gilles Brassard en 1984, la cryptographie quantique s\u2019appuie sur le principe de la QKD, qui consiste \u00e0 permettre l\u2019\u00e9change de cl\u00e9s de chiffrement, g\u00e9n\u00e9ralement sym\u00e9triques, par voie optique (fibre optique, liaison a\u00e9rienne ou satellite). Cette m\u00e9thode de communication est par essence inviolable, car elle exploite un principe fondamental de la m\u00e9canique quantique&nbsp;: l&rsquo;intrication de particules (g\u00e9n\u00e9ralement des photons). Toute tentative d\u2019intrusion dans la cha\u00eene de transmission engendre une perturbation qui est d\u00e9tect\u00e9e imm\u00e9diatement par le protocole de communication et provoque l\u2019arr\u00eat instantan\u00e9 de la communication. C\u2019est \u00e9videmment le principal int\u00e9r\u00eat de cette technologie.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:46% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-1024x574.jpg\" alt=\"\" class=\"wp-image-15966 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-1024x574.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-300x168.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-768x430.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-1536x861.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-2048x1148.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-100x56.jpg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Brique essentielle d\u2019un futur internet quantique, elle pr\u00e9sente n\u00e9anmoins plusieurs inconv\u00e9nients majeurs. La premi\u00e8re limite est qu\u2019elle n\u00e9cessite un r\u00e9seau physique nouveau et d\u00e9di\u00e9 \u00e0 ce mode de communication. En outre, il est difficile d\u2019\u00e9tendre des r\u00e9seaux quantiques sur de grandes distances.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>M\u00eame si de gros progr\u00e8s ont \u00e9t\u00e9 effectu\u00e9s depuis sa gen\u00e8se (la premi\u00e8re transmission par fibre optique en 1989 n\u2019avait qu\u2019une port\u00e9e de 30&nbsp;cm seulement), le nouveau record \u00e9tabli en juin dernier par une soci\u00e9t\u00e9 suisse, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20230615710544\/en\/Terra-Quantum-Breaks-Records-in-Quantum-Key-Distribution-Paving-Way-to-Offering-Unprecedented-Security-Over-Existing-Fiber-optic-Networks-Globally\">Terra Quantum<\/a>, d\u00e9passe tout juste les 1\u2009000&nbsp;kilom\u00e8tres. \u00ab&nbsp;<em>R\u00e9aliser de la QKD sur de grandes distances n\u00e9cessite de mettre en \u0153uvre des r\u00e9p\u00e9teurs de confiance entre deux terminaisons, ce qui augmente le p\u00e9rim\u00e8tre devant \u00eatre ma\u00eetris\u00e9<\/em>&nbsp;\u00bb, avait confi\u00e9 G\u00e9r\u00f4me Billois \u00e0 l\u2019occasion de la r\u00e9alisation du <a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/ebook\/quand-la-cryptographie-simpose-au-coeur-de-la-revolution-quantique\/\">livre blanc de TheGreenBow<\/a> sur la cryptographie au c\u0153ur de la r\u00e9volution quantique. Enfin, dernier inconv\u00e9nient de taille, la distribution de cl\u00e9s quantiques ne permet pas d\u2019assurer l\u2019authentification de la source \u00e9mettrice. Il faut lui adjoindre des m\u00e9canismes cryptographiques post-quantiques compl\u00e9mentaires. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Cryptographie post-quantique ou PQC<\/strong><\/strong><\/h2>\n\n\n\n<p>L\u2019objectif de la cryptographie post-quantique, ou r\u00e9sistante au quantique, est de r\u00e9sister \u00e0 des attaques d\u2019ordinateurs quantiques capables de jouer l\u2019algorithme de Shor et de Grover (voir notre article \u00ab\u00a0<a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/cryptographie-post-quantique-pourquoi-faut-il-sy-interesser-maintenant\/\">Cryptographie post-quantique\u00a0: pourquoi faut-il s\u2019y int\u00e9resser maintenant\u00a0?\u00a0<\/a>\u00bb. Certains voient cette technologie comme concurrente de la cryptographie quantique. D\u2019autres la voient au contraire compl\u00e9mentaire. Constitu\u00e9e d&rsquo;algorithmes fond\u00e9s sur des probl\u00e8mes math\u00e9matiques nouveaux (r\u00e9seaux euclidiens, codes correcteurs d\u2019erreurs, inversion de polyn\u00f4mes multivari\u00e9s\u2026), la cryptographie r\u00e9sistante au quantique a pour vocation de remplacer les algorithmes asym\u00e9triques existants, tels que Diffie-Hellman, RSA et ECC, r\u00e9put\u00e9s vuln\u00e9rables aux attaques quantiques.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 37%\"><div class=\"wp-block-media-text__content\">\n<p>Pour cela, le NIST (National Institute of Standards and Technology) a lanc\u00e9 un concours en 2016 pour mobiliser la communaut\u00e9 cryptographique internationale. Le troisi\u00e8me tour a abouti en juillet 2022 \u00e0 la s\u00e9lection de quatre algorithmes (un pour le chiffrement et trois pour la signature \u00e9lectronique) dont les standards d\u2019impl\u00e9mentation seront publi\u00e9s en avril 2024.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-1024x683.jpg\" alt=\"\" class=\"wp-image-16018 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-1024x683.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-300x200.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-768x512.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-1536x1024.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-2048x1365.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-100x67.jpg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-301x201.jpg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-343x229.jpg 343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>La grande diff\u00e9rence avec la QKD est que la PQC se d\u00e9ploie dans les infrastructures de s\u00e9curit\u00e9 existantes et permet de r\u00e9pondre d\u00e8s aujourd\u2019hui \u00e0 une menace existante&nbsp;: les attaques de type \u00ab&nbsp;Harvest Now Decrypt Later&nbsp;\u00bb dont la finalit\u00e9 est de s\u2019emparer de donn\u00e9es sensibles et \u00e0 dur\u00e9e de vie longue, pour pouvoir les d\u00e9chiffrer dans quelques ann\u00e9es avec un ordinateur quantique. C\u2019est la raison pour laquelle les grandes agences de s\u00e9curit\u00e9 (CISA, ENISA, ANSSI, NCSC, BSI \u2026) recommandent vivement aux entreprises et aux administrations de migrer vers cette nouvelle cryptographie d\u00e8s que possible.<\/p>\n\n\n\n<p>Ce chantier s\u2019annonce tr\u00e8s long (voir notre article de blog \u00ab&nbsp;<a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/migration-vers-cryptographie-resistante-au-quantique-pourquoi-commencer-maintenant\/\">Migration vers la cryptographie r\u00e9sistante au quantique&nbsp;: pourquoi commencer maintenant&nbsp;?<\/a>&nbsp;\u00bb) tant les cl\u00e9s RSA, Diffie-Hellman sont omnipr\u00e9sentes dans nos \u00e9changes de donn\u00e9es au quotidien. Les exp\u00e9riences pass\u00e9es ont montr\u00e9 qu\u2019il fallait souvent une bonne d\u00e9cennie pour migrer des syst\u00e8mes (logiciels, \u00e9quipements et les services associ\u00e9s). Dans le secteur financier, on se rappelle, par exemple, que la migration de MD5 (Message Digest&nbsp;5), une fonction de hachage cryptographique, a pris plus de dix ans \u00e0 \u00eatre supprim\u00e9e \u00e0 partir du moment o\u00f9 en 2008, cet algorithme avait \u00e9t\u00e9 r\u00e9put\u00e9 vuln\u00e9rable. D\u2019o\u00f9 la n\u00e9cessit\u00e9 de planifier et de d\u00e9marrer au plus vite la migration vers la cryptographie r\u00e9sistante au quantique.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>PQC vs QKD&nbsp;: ce que recommandent les agences de s\u00e9curit\u00e9<\/strong><\/h2>\n\n\n\n<p>Du fait de son caract\u00e8re inviolable, la QKD s\u2019av\u00e8re prometteuse notamment pour prot\u00e9ger les communications tr\u00e8s sensibles comme les communications militaires. Pour autant, la QKD ne constitue pas \u00e0 ce jour une alternative \u00e0 la cryptographie actuelle, en particulier celle bas\u00e9e sur des cl\u00e9s RSA. En premier lieu, elle n\u00e9cessite de nouvelles infrastructures qui seront couteuses \u00e0 maintenir. De plus, elle ne fonctionne que sur des distances encore trop courtes par rapport aux besoins, ce qui limite singuli\u00e8rement les cas d\u2019usages. C\u2019est le constat que fait la NSA (National Security Agency) et qui ajoute un dernier \u00e9l\u00e9ment en d\u00e9faveur de la QKD\u00a0: la NSA rel\u00e8ve que la QKD accro\u00eet le risque d\u2019attaque par d\u00e9ni de service. En effet, l\u2019agence am\u00e9ricaine fait remarquer que la confidentialit\u00e9 repose sur le principe que si une communication est \u00e9cout\u00e9e alors la perturbation engendr\u00e9e fait tomber instantan\u00e9ment la communication. Il est par cons\u00e9quent tentant pour un cyberattaquant de r\u00e9p\u00e9ter les perturbations afin d\u2019emp\u00eacher les communications. D\u2019autre part, la NSA voit la cryptographie r\u00e9sistante au quantique comme une solution moins couteuse et plus facile \u00e0 maintenir. C\u2019est pour toutes ces raisons qu\u2019elle demande d\u2019utiliser en priorit\u00e9 la PQC pour prot\u00e9ger les communications. De la m\u00eame mani\u00e8re, l\u2019ANSSI (lire le document de position de l\u2019ANSSI \u00ab\u00a0<a href=\"https:\/\/www.ssi.gouv.fr\/publication\/should-quantum-key-distribution-be-used-for-secure-communications\/\">Should Quantum Key Distribution be used for secure connections?\u00a0<\/a>\u00bb) et son homologue britannique le NCSC (consulter le livre blanc \u00ab\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/whitepaper\/quantum-security-technologies\">Quantum security technologies\u00a0<\/a>\u00bb) ne recommandent pas non plus l\u2019usage de la cryptographie quantique pour s\u00e9curiser l\u2019acc\u00e8s aux syst\u00e8mes d\u2019information.<\/p>\n\n\n\n<p>Toutefois \u00e0 terme, la PQC pourrait se combiner avec la QKD pour lui apporter des fonctions de signature, d\u2019authentification et de chiffrement tr\u00e8s robustes. C\u2019est la vision que partage Eleni Diamanti, directrice de recherche au CNRS. Pour notre livre blanc, elle avait confi\u00e9 \u00eatre \u00ab&nbsp;convaincue qu\u2019une hybridation des deux approches cryptographiques sera vertueuse pour l\u2019avenir \u00bb. Pour approfondir le sujet et en savoir plus sur ces deux technologies, nous vous recommandons la lecture de ce livre blanc.<\/p>\n\n\n\n<p><\/p>\n\n\n\n  <section  class=\"wp-block-acf-linked-pages  section-content linked-pages-section\"  itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n    <div class=\"grid-container\">\n     <div class=\"grid-x grid-padding-x align-center mobile-slider\">\n                <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/migration-vers-cryptographie-resistante-au-quantique-pourquoi-commencer-maintenant\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-727x486.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-301x201.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-343x229.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-1454x972.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-602x402.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-686x458.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ?\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Migration vers la cryptographie r\u00e9sistante au quantique<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/ebook\/quand-la-cryptographie-simpose-au-coeur-de-la-revolution-quantique\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2022\/06\/2022-06-03-613x410.png, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2022\/06\/2022-06-03-301x201.png, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2022\/06\/2022-06-03-343x229.png, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2022\/06\/2022-06-03-613x410.png, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2022\/06\/2022-06-03-602x402.png, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2022\/06\/2022-06-03-613x409.png, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:613,&quot;h&quot;:410},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:613,&quot;h&quot;:410},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:613,&quot;h&quot;:409}}\"  alt=\"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ?\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Quand la cryptographie s\u2019impose au coeur de la r\u00e9volution quantique<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/comment-securiser-les-communications-a-lere-du-post-quantique\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-scaled-727x486.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-301x201.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-343x229.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-scaled-1454x972.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-scaled-602x402.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-scaled-686x458.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ?\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Comment s\u00e9curiser les communications \u00e0 l\u2019\u00e8re du post-quantique ?<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n              \n            <\/div>\n          <\/div>\n\n        \n\t\t<\/div>\n    <\/div>\n  <\/section>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<\/div>\n","protected":false},"featured_media":15962,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[30],"class_list":["post-15960","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ? - TheGreenBow<\/title>\n<meta name=\"description\" content=\"Les technologies quantiques se d\u00e9veloppent rapidement. Connaissez-vous la diff\u00e9rence entre PQC et QKD ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ? - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"Les technologies quantiques se d\u00e9veloppent rapidement. Connaissez-vous la diff\u00e9rence entre PQC et QKD ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-06T09:15:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/\",\"name\":\"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ? - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cryptographie-Quantique_lite-scaled.jpg\",\"datePublished\":\"2023-09-26T07:21:05+00:00\",\"dateModified\":\"2023-10-06T09:15:49+00:00\",\"description\":\"Les technologies quantiques se d\u00e9veloppent rapidement. Connaissez-vous la diff\u00e9rence entre PQC et QKD ?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cryptographie-Quantique_lite-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cryptographie-Quantique_lite-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressource\\\/blog\\\/pqc-et-qkd-quelles-differences\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressources\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ? - TheGreenBow","description":"Les technologies quantiques se d\u00e9veloppent rapidement. Connaissez-vous la diff\u00e9rence entre PQC et QKD ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/","og_locale":"fr_FR","og_type":"article","og_title":"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ? - TheGreenBow","og_description":"Les technologies quantiques se d\u00e9veloppent rapidement. Connaissez-vous la diff\u00e9rence entre PQC et QKD ?","og_url":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/","og_site_name":"TheGreenBow","article_modified_time":"2023-10-06T09:15:49+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/","url":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/","name":"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ? - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","datePublished":"2023-09-26T07:21:05+00:00","dateModified":"2023-10-06T09:15:49+00:00","description":"Les technologies quantiques se d\u00e9veloppent rapidement. Connaissez-vous la diff\u00e9rence entre PQC et QKD ?","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/pqc-et-qkd-quelles-differences\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.thegreenbow.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/fr\/ressources\/blog\/"},{"@type":"ListItem","position":3,"name":"Cryptographie quantique, cryptographie r\u00e9sistante au quantique\u00a0: quelles diff\u00e9rences ?"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/fr\/#website","url":"https:\/\/www.thegreenbow.com\/fr\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/fr\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.thegreenbow.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource\/15960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/media\/15962"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/media?parent=15960"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/fr\/wp-json\/wp\/v2\/resource_category?post=15960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}