{"id":9122,"date":"2020-12-07T19:07:26","date_gmt":"2020-12-07T18:07:26","guid":{"rendered":"https:\/\/open-organization.com\/?p=9122"},"modified":"2020-12-07T19:07:26","modified_gmt":"2020-12-07T18:07:26","slug":"francais-disruptions-a-lhorizon-les-telecommunications-quantiques","status":"publish","type":"post","link":"https:\/\/open-organization.com\/fr\/2020\/12\/07\/francais-disruptions-a-lhorizon-les-telecommunications-quantiques\/","title":{"rendered":"Disruptions \u00e0 l\u2019horizon : les t\u00e9l\u00e9communications quantiques"},"content":{"rendered":"<p>[et_pb_section bb_built=\u00a0\u00bb1&Prime;][et_pb_row][et_pb_column type=\u00a0\u00bb4_4&Prime;][et_pb_text _builder_version=\u00a0\u00bb4.4.8&Prime; text_text_shadow_horizontal_length=\u00a0\u00bbtext_text_shadow_style,%91object Object%93&Prime; text_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb text_text_shadow_vertical_length=\u00a0\u00bbtext_text_shadow_style,%91object Object%93&Prime; text_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb text_text_shadow_blur_strength=\u00a0\u00bbtext_text_shadow_style,%91object Object%93&Prime; text_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb link_text_shadow_horizontal_length=\u00a0\u00bblink_text_shadow_style,%91object Object%93&Prime; link_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb link_text_shadow_vertical_length=\u00a0\u00bblink_text_shadow_style,%91object Object%93&Prime; link_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb link_text_shadow_blur_strength=\u00a0\u00bblink_text_shadow_style,%91object Object%93&Prime; link_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb ul_text_shadow_horizontal_length=\u00a0\u00bbul_text_shadow_style,%91object Object%93&Prime; ul_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ul_text_shadow_vertical_length=\u00a0\u00bbul_text_shadow_style,%91object Object%93&Prime; ul_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ul_text_shadow_blur_strength=\u00a0\u00bbul_text_shadow_style,%91object Object%93&Prime; ul_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb ol_text_shadow_horizontal_length=\u00a0\u00bbol_text_shadow_style,%91object Object%93&Prime; ol_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ol_text_shadow_vertical_length=\u00a0\u00bbol_text_shadow_style,%91object Object%93&Prime; ol_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ol_text_shadow_blur_strength=\u00a0\u00bbol_text_shadow_style,%91object Object%93&Prime; ol_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb quote_text_shadow_horizontal_length=\u00a0\u00bbquote_text_shadow_style,%91object Object%93&Prime; quote_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb quote_text_shadow_vertical_length=\u00a0\u00bbquote_text_shadow_style,%91object Object%93&Prime; quote_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb quote_text_shadow_blur_strength=\u00a0\u00bbquote_text_shadow_style,%91object Object%93&Prime; quote_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_text_shadow_horizontal_length=\u00a0\u00bbheader_text_shadow_style,%91object Object%93&Prime; header_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_text_shadow_vertical_length=\u00a0\u00bbheader_text_shadow_style,%91object Object%93&Prime; header_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_text_shadow_blur_strength=\u00a0\u00bbheader_text_shadow_style,%91object Object%93&Prime; header_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_2_text_shadow_horizontal_length=\u00a0\u00bbheader_2_text_shadow_style,%91object Object%93&Prime; header_2_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_2_text_shadow_vertical_length=\u00a0\u00bbheader_2_text_shadow_style,%91object Object%93&Prime; header_2_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_2_text_shadow_blur_strength=\u00a0\u00bbheader_2_text_shadow_style,%91object Object%93&Prime; header_2_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_3_text_shadow_horizontal_length=\u00a0\u00bbheader_3_text_shadow_style,%91object Object%93&Prime; header_3_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_3_text_shadow_vertical_length=\u00a0\u00bbheader_3_text_shadow_style,%91object Object%93&Prime; header_3_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_3_text_shadow_blur_strength=\u00a0\u00bbheader_3_text_shadow_style,%91object Object%93&Prime; header_3_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_4_text_shadow_horizontal_length=\u00a0\u00bbheader_4_text_shadow_style,%91object Object%93&Prime; header_4_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_4_text_shadow_vertical_length=\u00a0\u00bbheader_4_text_shadow_style,%91object Object%93&Prime; header_4_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_4_text_shadow_blur_strength=\u00a0\u00bbheader_4_text_shadow_style,%91object Object%93&Prime; header_4_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_5_text_shadow_horizontal_length=\u00a0\u00bbheader_5_text_shadow_style,%91object Object%93&Prime; header_5_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_5_text_shadow_vertical_length=\u00a0\u00bbheader_5_text_shadow_style,%91object Object%93&Prime; header_5_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_5_text_shadow_blur_strength=\u00a0\u00bbheader_5_text_shadow_style,%91object Object%93&Prime; header_5_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_6_text_shadow_horizontal_length=\u00a0\u00bbheader_6_text_shadow_style,%91object Object%93&Prime; header_6_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_6_text_shadow_vertical_length=\u00a0\u00bbheader_6_text_shadow_style,%91object Object%93&Prime; header_6_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_6_text_shadow_blur_strength=\u00a0\u00bbheader_6_text_shadow_style,%91object Object%93&Prime; header_6_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb box_shadow_horizontal_tablet=\u00a0\u00bb0px\u00a0\u00bb box_shadow_vertical_tablet=\u00a0\u00bb0px\u00a0\u00bb box_shadow_blur_tablet=\u00a0\u00bb40px\u00a0\u00bb box_shadow_spread_tablet=\u00a0\u00bb0px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb0&Prime; horizontal_offset_tablet=\u00a0\u00bb0&Prime; z_index_tablet=\u00a0\u00bb0&Prime;]<\/p>\n<h2><span style=\"font-weight: 400;\">Introduction<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Un syst\u00e8me de t\u00e9l\u00e9communications r\u00e9alise dans l\u2019id\u00e9al un bon niveau de protection de la transmission contre tout espionnage. Les technologies de l\u2019information quantique sont susceptibles d\u2019am\u00e9liorer les performances des syst\u00e8mes existants sur ce plan. Les t\u00e9l\u00e9communications quantiques, bas\u00e9es sur la ma\u00eetrise de technologies bas\u00e9es en particulier sur l\u2019intrication quantique, impactent significativement le domaine de la cryptographie. Elles exigent la mise au point de nouvelles infrastructures, qui formeront \u00e0 terme un Internet quantique.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">La cryptographie post-quantique<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Il est souvent question du bouleversement qu\u2019induiraient dans les standards cryptographiques l\u2019arriv\u00e9e des ordinateurs quantiques op\u00e9rationnels. Les algorithmes quantiques viendraient tr\u00e8s rapidement \u00e0 bout de toutes les d\u00e9fenses existantes : \u00e0 condition de disposer d\u2019ordinateurs quantiques de taille suffisante pour faire tourner, notamment, un algorithme de factorisation en nombre premiers. Ce n\u2019est pas le cas actuellement, mais c\u2019est un sc\u00e9nario \u00e0 prendre en compte en d\u00e9veloppant une cryptographie post-quantique.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">Le partage de cl\u00e9s quantiques<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Les technologies quantiques poss\u00e8dent \u00e0 court terme d\u2019autres ramifications hautement disruptives pour le status quo actuel dans le domaine des t\u00e9l\u00e9communications. La technologie la mieux ma\u00eetris\u00e9e est celle du partage de cl\u00e9s quantiques. Le principe consiste \u00e0 op\u00e9rer un m\u00eame protocole de mesure de la polarisation de deux photons intriqu\u00e9s, \u00e9loign\u00e9s dans l\u2019espace. Le r\u00e9sultat de la mesure, qui n\u2019est pas connaissable \u00e0 l\u2019avance, est le m\u00eame aux deux endroits, et peut servir de cl\u00e9 cryptographique. Mieux, toute interception sera ais\u00e9e \u00e0 d\u00e9tecter. En principe, le partage de cl\u00e9s quantiques rend impossible le fait d\u2019espionner une cible sans que la cible le sache. Une rupture majeure, en soi. On sait notamment qu\u2019un partage \u00e0 longue distance a \u00e9t\u00e9 effectu\u00e9 entre la Chine et l\u2019Autriche en 2016. Cette technique requiert cependant des infrastructures de <\/span><a href=\"https:\/\/open-organization.com\/fr\/2017\/08\/23\/un-grand-innovateur-qui-na-rien-invente-charles-kao-et-la-naissance-des-telecommunications-par-fibres-optiques\/\"><span style=\"font-weight: 400;\">fibres optiques<\/span><\/a><span style=\"font-weight: 400;\"> de haute qualit\u00e9. Plusieurs organisations de R&amp;D explorent actuellement des pistes permettant de mettre l\u2019intrication au service de la cryptographie de mani\u00e8re plus efficiente.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">L\u2019Internet quantique<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">L\u2019envoi de qubits sur de longues distances est \u00e0 distinguer du partage de cl\u00e9s \u00e9voqu\u00e9 ci-dessus. L\u2019id\u00e9e est de relier des processeurs quantiques et de les munir de m\u00e9moire quantique. Afin d\u2019utiliser au maximum l&rsquo;infrastructure de communication existante, il faut des commutateurs optiques capables de fournir des qubits \u00e0 un processeur quantique donn\u00e9. Ces commutateurs doivent pr\u00e9server la coh\u00e9rence quantique, ce qui les rend plus difficiles \u00e0 r\u00e9aliser que les commutateurs optiques standards. Sont \u00e9galement n\u00e9cessaires des r\u00e9p\u00e9teurs quantiques pour transporter les qubits sur de longues distances, car l&rsquo;amplification classique du signal n&rsquo;est pas possible (les qubits ne pouvant pas \u00eatre copi\u00e9s).<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion : Le chamboulement quantique de la s\u00e9curit\u00e9 des t\u00e9l\u00e9communications para\u00eet inexorable<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Quels sont les impacts pour l\u2019avenir \u00e0 vraiment prendre en compte dans les t\u00e9l\u00e9communications quantiques\u00a0? La question renvoie \u00e0 une double incertitude : technologique et strat\u00e9gique. Car la possesseur de ces technologies ne r\u00e9v\u00e9lera pas spontan\u00e9ment son avantage aux autres acteurs\u2026 une situation propice \u00e0 d\u00e9clencher une course technologique qui a malheureusement le potentiel d\u2019\u00eatre \u00e0 la fois vaine et ruineuse pour tout le monde. N\u00e9anmoins, il semble clair que la cryptographie constitue le domaine le plus mature des technologies de l\u2019information quantique, et que les progr\u00e8s attendus dans ce domaine auront un effet de rupture majeur. Il y aura, pour les acteurs strat\u00e9giques rompus \u00e0 la discipline des communications secr\u00e8tes, un avant et un apr\u00e8s cryptage quantique. Quand exactement, et avec quelles technologies pr\u00e9cises, l\u00e0 est toute la question qui se pose au niveau des roadmaps industrielles de <\/span><a href=\"http:\/\/presans.com\/\"><span style=\"font-weight: 400;\">nos<\/span><\/a><span style=\"font-weight: 400;\"> clients\u00a0!<\/span><\/p>\n<p>[\/et_pb_text][et_pb_post_nav _builder_version=\u00a0\u00bb3.14&Prime; prev_text=\u00a0\u00bbPrevious article\u00a0\u00bb next_text=\u00a0\u00bbNext article\u00a0\u00bb in_same_term=\u00a0\u00bbon\u00a0\u00bb background_color=\u00a0\u00bb#3d59a1&Prime; title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb title_font_size=\u00a0\u00bb15px\u00a0\u00bb custom_padding=\u00a0\u00bb10px|10px|10px|10px\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb border_width_all=\u00a0\u00bb1px\u00a0\u00bb border_color_all=\u00a0\u00bb#3d59a1&Prime; saved_tabs=\u00a0\u00bball\u00a0\u00bb custom_margin=\u00a0\u00bb30px|||\u00a0\u00bb global_module=\u00a0\u00bb8506&Prime; \/][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>La cryptographie constitue le domaine le plus mature des technologies de l\u2019information quantique, et les progr\u00e8s attendus dans ce domaine auront un effet de rupture majeur.<\/p>\n","protected":false},"author":177,"featured_media":9123,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[379,1386,1387],"_links":{"self":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/posts\/9122"}],"collection":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/comments?post=9122"}],"version-history":[{"count":0,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/posts\/9122\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/media\/9123"}],"wp:attachment":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/media?parent=9122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/categories?post=9122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/tags?post=9122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}