{"id":1313,"date":"2024-11-28T17:58:46","date_gmt":"2024-11-28T16:58:46","guid":{"rendered":"https:\/\/ayrilys.com\/?p=1313"},"modified":"2024-11-28T18:19:20","modified_gmt":"2024-11-28T17:19:20","slug":"chiffrement-post-quantique-un-marche-francais-tres-balbutiant","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/","title":{"rendered":"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong>Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant<\/strong><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>R\u00e9sum\u00e9 de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p>L&rsquo;article met en lumi\u00e8re les risques que la technologie quantique pose pour la s\u00e9curit\u00e9 des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique. Voici les points principaux :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-risques-et-necessite-de-transition\">Risques et N\u00e9cessit\u00e9 de Transition<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Risque accru<\/strong>\u00a0: La technologie quantique pourrait casser les syst\u00e8mes de chiffrement actuels en quelques minutes.<\/li>\n\n\n\n<li><strong>Transition n\u00e9cessaire<\/strong>\u00a0: L&rsquo;ANSSI souligne l&rsquo;importance de passer \u00e0 une cryptographie r\u00e9sistante aux menaces quantiques.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-etudes-de-l-anssi\">\u00c9tudes de l&rsquo;ANSSI<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Premi\u00e8re \u00e9tude<\/strong>\u00a0: Constate l&rsquo;immaturit\u00e9 des solutions de cryptographie post-quantique, mais insiste sur la n\u00e9cessit\u00e9 d&rsquo;agir sans d\u00e9lai.<\/li>\n\n\n\n<li><strong>Deuxi\u00e8me \u00e9tude<\/strong>\u00a0: Note une absence de demande et d&rsquo;offre commerciale pour les solutions de transition post-quantique, due \u00e0 un manque de r\u00e9glementation et de sensibilisation.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-obstacles-identifies\">Obstacles Identifi\u00e9s<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Techniques<\/strong>\u00a0: Manque de normes, de briques logicielles, et inqui\u00e9tudes sur les performances.<\/li>\n\n\n\n<li><strong>Organisationnels<\/strong>\u00a0: Absence de plan de transition, incertitude sur la certification, et co\u00fbt de mise \u00e0 jour des comp\u00e9tences.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-marche-des-prestataires\">March\u00e9 des Prestataires<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Immaturit\u00e9<\/strong>\u00a0: Peu de prestataires ont une offre structur\u00e9e pour accompagner la transition.<\/li>\n\n\n\n<li><strong>Perspectives<\/strong>\u00a0: La majorit\u00e9 des prestataires pr\u00e9voient de d\u00e9velopper des offres de conseil et d&rsquo;accompagnement dans les deux prochaines ann\u00e9es.<\/li>\n<\/ul>\n\n\n\n<p>L&rsquo;article souligne l&rsquo;urgence de pr\u00e9parer les infrastructures num\u00e9riques \u00e0 la menace quantique malgr\u00e9 les d\u00e9fis actuels.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>D\u00e9tail de l&rsquo;article :<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png\" alt=\"D'ici quelques ann\u00e9es, casser en quelques minutes des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique pourra \u00eatre possible avec le quantique. (cr\u00e9dit : Geralt\/Pixabay)\" title=\"D'ici quelques ann\u00e9es, casser en quelques minutes des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique pourra \u00eatre possible avec le quantique. (cr\u00e9dit : Geralt\/Pixabay)\"\/><figcaption class=\"wp-element-caption\">D&rsquo;ici quelques ann\u00e9es, casser en quelques minutes des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique pourra \u00eatre possible avec le quantique. (cr\u00e9dit : Geralt\/Pixabay)<\/figcaption><\/figure>\n\n\n\n<p>Alors que la\u00a0technologie quantique progresse vite,\u00a0ses impacts sur la s\u00e9curit\u00e9 du chiffrement \u00e0 cl\u00e9 publique constituent un risque \u00e0 prendre tout \u00e0 fait au s\u00e9rieux. \u00ab\u00a0Le niveau de risque rend n\u00e9cessaire une transition de nos infrastructures num\u00e9riques vers une cryptographie r\u00e9sistante \u00e0 la menace quantique\u00a0\u00bb,\u00a0a pr\u00e9venu\u00a0l&rsquo;agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information qui vient de partager\u00a0deux \u00e9tudes sur le sujet. Men\u00e9es entre juillet 2023 et janvier 2024, celles-ci \u00ab\u00a0permettent de mieux comprendre le degr\u00e9 de connaissance de la menace quantique par ces acteurs, les contremesures \u00e9ventuellement mises en place pour y r\u00e9pondre, ainsi que les obstacles et besoins de ces entit\u00e9s dans le cadre de la transition.\u00a0\u00bb Au regard des r\u00e9sultats pour la France, quelques raisons d&rsquo;\u00eatre inquiets ressortent.<\/p>\n\n\n\n<p>Dans son\u00a0premier rapport\u00a0sur l&rsquo;\u00e9tat de l&rsquo;offres des solutions de cryptographie post-quantique en France, l&rsquo;ANSSI\u00a0pr\u00e9vient : \u00ab\u00a0l\u2019immaturit\u00e9 constat\u00e9e des solutions n\u2019est que transitoire et ne devrait pas servir de pr\u00e9texte \u00e0 l\u2019inaction. Certaines actions devront \u00eatre mises en \u0153uvre sans d\u00e9lai et d\u2019autres pourront \u00eatre d\u00e9ploy\u00e9es progressivement, dans les ann\u00e9es \u00e0 venir.\u00a0\u00bb La situation n&rsquo;est gu\u00e8re plus encourageante dans le\u00a0second rapport\u00a0sur l&rsquo;offre de prestations d&rsquo;accompagnement et de conseil pour accompagner cette transition post-quantique : \u00ab\u00a0nous observons une quasi absence de demande pour le moment et une quasi absence d\u2019offre commerciale. Les prestataires expliquent l\u2019absence de demande par un sentiment, chez leurs clients, qu\u2019il n\u2019est pas urgent d\u2019agir contre la menace quantique. Le fait qu\u2019il n\u2019y ait aucune obligation r\u00e9glementaire conforte les clients dans leur posture d\u2019attente.\u00a0\u00bb<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Des freins identifi\u00e9s<\/h2>\n\n\n\n<p>Plusieurs facteurs expliquant la frilosit\u00e9 des fournisseurs \u00e0 proposer des solutions de chiffrement post-quantique. Ceux-ci sont \u00e0 la fois d&rsquo;ordre technique (manque de normes\/standards et de briques logicielles de r\u00e9f\u00e9rences ou de guide de bonnes pratiques d&rsquo;impl\u00e9mentation, inqui\u00e9tudes sur les pertes de performance des signatures post-quantiques&#8230;) qu&rsquo;organisationnel (absence d&rsquo;un plan de transition, incertitude sur la certification des biblioth\u00e8ques cryptographiques, manque de sensibilisation des utilisateurs et co\u00fbt de mise \u00e0 jour des comp\u00e9tences.) A noter que sur la petite cinquantaine d\u2019\u00e9diteurs fran\u00e7ais approch\u00e9s par l\u2019Anssi pour son \u00e9tude, seulement 18 ont finalement \u00e9t\u00e9 retenus comme pertinents pour r\u00e9pondre \u00e0 ses questions.<\/p>\n\n\n\n<p>Du c\u00f4t\u00e9 des prestataires d&rsquo;accompagnement et de conseil en s\u00e9curit\u00e9, l&rsquo;agence pointe un march\u00e9 \u00ab\u00a0quasi inexistant\u00a0\u00bb : sur son \u00e9chantillon de 34 soci\u00e9t\u00e9s, plus d&rsquo;une vingtaine n&rsquo;a r\u00e9alis\u00e9 aucune prestation relative \u00e0 la menace quantique. \u00ab\u00a0L\u2019offre commerciale est tr\u00e8s immature et peu de prestataires ont une offre structur\u00e9e pour accompagner leurs (futurs) clients. 70% des prestataires n\u2019ont aucune offre structur\u00e9e\u00a0\u00bb, indique l&rsquo;agence. Tout n&rsquo;est cependant pas perdu : \u00ab\u00a0la quasi-totalit\u00e9 des prestataires d\u00e9clarent qu\u2019ils comptent d\u00e9velopper une offre commerciale de conseil et d\u2019accompagnement \u00e0 la transition post-quantique (80 %). Ils pensent \u00eatre \u00e0 m\u00eame de proposer une telle offre en deux ans au plus.\u00a0\u00bb<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/idg\/auteur\/moyen\/000000006958.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>Article r\u00e9dig\u00e9 par<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/auteur-dominique-filippone-484.html\">Dominique Filippone<\/a><\/p>\n\n\n\n<p>Chef des actualit\u00e9s LMI<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant R\u00e9sum\u00e9 de l&rsquo;article : L&rsquo;article met en lumi\u00e8re les risques que la technologie quantique pose pour la s\u00e9curit\u00e9 des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique. Voici les points principaux : Risques et N\u00e9cessit\u00e9 de Transition \u00c9tudes de l&rsquo;ANSSI Obstacles Identifi\u00e9s March\u00e9 des Prestataires L&rsquo;article souligne l&rsquo;urgence de&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJ0eHQiOiJDaGlmZnJlbWVudCBwb3N0LXF1YW50aXF1ZSA6IHVuIG1hcmNoXHUwMGU5IGZyYW5cdTAwZTdhaXMgdHJcdTAwZThzIGJhbGJ1dGlhbnQiLCJ0ZW1wbGF0ZSI6ImhpZ2h3YXkiLCJibG9nX2lkIjoyMzUzMzUwMjN9.7zfcq4HD3DyGiCGreKM4pvg7rBKzP9IFk3KpeE5f_gYMQ"},"version":2,"attached_media":[{"id":1145,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/ChatGPT-IA-mainstechnology-human-touch-background-modern-remake-creation-adam-scaled.jpeg","type":"image\/jpeg"}]}},"categories":[22],"tags":[],"class_list":["post-1313","post","type-post","status-publish","format-standard","hentry","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>La transition vers le chiffrement post quantique : Une n\u00e9cessit\u00e9 urgente Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez les risques de la technologie quantique pour la s\u00e9curit\u00e9 des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant\" \/>\r\n<meta property=\"og:description\" content=\"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-11-28T16:58:46+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-11-28T17:19:20+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant\",\"datePublished\":\"2024-11-28T16:58:46+00:00\",\"dateModified\":\"2024-11-28T17:19:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\"},\"wordCount\":798,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png\",\"articleSection\":[\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\",\"name\":\"La transition vers le chiffrement post quantique : Une n\u00e9cessit\u00e9 urgente Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png\",\"datePublished\":\"2024-11-28T16:58:46+00:00\",\"dateModified\":\"2024-11-28T17:19:20+00:00\",\"description\":\"D\u00e9couvrez les risques de la technologie quantique pour la s\u00e9curit\u00e9 des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage\",\"url\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png\",\"contentUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La transition vers le chiffrement post quantique : Une n\u00e9cessit\u00e9 urgente Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"D\u00e9couvrez les risques de la technologie quantique pour la s\u00e9curit\u00e9 des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/","og_locale":"fr_FR","og_type":"article","og_title":"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant","og_description":"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-11-28T16:58:46+00:00","article_modified_time":"2024-11-28T17:19:20+00:00","og_image":[{"url":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant","datePublished":"2024-11-28T16:58:46+00:00","dateModified":"2024-11-28T17:19:20+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/"},"wordCount":798,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage"},"thumbnailUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png","articleSection":["S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/","url":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/","name":"La transition vers le chiffrement post quantique : Une n\u00e9cessit\u00e9 urgente Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage"},"thumbnailUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png","datePublished":"2024-11-28T16:58:46+00:00","dateModified":"2024-11-28T17:19:20+00:00","description":"D\u00e9couvrez les risques de la technologie quantique pour la s\u00e9curit\u00e9 des syst\u00e8mes de chiffrement \u00e0 cl\u00e9 publique.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#primaryimage","url":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png","contentUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099947.png"},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/chiffrement-post-quantique-un-marche-francais-tres-balbutiant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Chiffrement post-quantique : un march\u00e9 fran\u00e7ais tr\u00e8s balbutiant"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=1313"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1313\/revisions"}],"predecessor-version":[{"id":1314,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1313\/revisions\/1314"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=1313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=1313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=1313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}