« Cryptographie Post-Quantique/en » : différence entre les versions

De Wiki Campus Cyber
Aller à :navigation, rechercher
(Page créée avec « # Raising awareness of the challenges of Post-Quantic Cryptography # Provide post-quantum robustness today for long-term equipment that cannot be upgraded (SIM cards, IoT, etc.). # Propose solutions for the "quantum trigger", i.e. the moment when the quantum computer will be powerful enough to compromise all current and past exchanges secured by current asymmetric cryptography. # Orient cryptographic implementations towards greater agility, to enable any equipmen... »)
(Mise à jour pour être en accord avec la nouvelle version de la source de la page)
Balise : Révocation manuelle
 
(3 versions intermédiaires par 2 utilisateurs non affichées)
Ligne 17 : Ligne 17 :
# Orient cryptographic implementations towards greater agility, to enable any equipment to have a satisfactory level of security at all times.
# Orient cryptographic implementations towards greater agility, to enable any equipment to have a satisfactory level of security at all times.


<div lang="fr" dir="ltr" class="mw-content-ltr">
===Deliverables ===
=== Livrables ===
White book
Livre Blanc
</div>


<div lang="fr" dir="ltr" class="mw-content-ltr">
== Agenda ==
== Calendrier ==
==Logbook==
==Journal de bord==
Follow the progress of the working group through the "logbook" maintained in the community of interest. [[CI Cryptographie post-quantique]]
Suivez les avancées du groupe de travail grâce au '''journal de bord''' maintenu dans la communauté d'intérêt [[CI Cryptographie post-quantique]]
</div>
{{PageSubHeader Groupe de travail
{{PageSubHeader Groupe de travail
|Communauté d'intérêt=CI Cryptographie post-quantique
|Communauté d'intérêt=CI Cryptographie post-quantique
}}
}}

Dernière version du 4 mars 2024 à 13:20

Sensibiliser aux enjeux de la Cryptographie Post Quantique et orienter les implémentations cryptographiques vers davantage d’agilité

Catégorie : Groupe de travail Cycle : 4 Statut : En cours




Date de début : novembre 2022


Description

Quantum computing undermines current cryptography, and wipes out asymmetric cryptography. Since 2017, NIST has launched a global competition to find robust asymmetric algorithms for the era of quantum computing. The transition to such algorithms is already underway, but the standards are not yet finalized. Some devices will be able to migrate to these new algorithms, while others are not as agile. What are tomorrow's challenges? How can we achieve post-quantum cryptography today?

Goals

  1. Raising awareness of the challenges of Post-Quantic Cryptography
  2. Provide post-quantum robustness today for long-term equipment that cannot be upgraded (SIM cards, IoT, etc.).
  3. Propose solutions for the "quantum trigger", i.e. the moment when the quantum computer will be powerful enough to compromise all current and past exchanges secured by current asymmetric cryptography.
  4. Orient cryptographic implementations towards greater agility, to enable any equipment to have a satisfactory level of security at all times.

Deliverables

White book

Agenda

Logbook

Follow the progress of the working group through the "logbook" maintained in the community of interest. CI Cryptographie post-quantique

Porté par la communauté

CI Cryptographie post-quantique (Sensibiliser aux enjeux de la Cryptographie Post Quantique et orienter les implémentations cryptographiques vers davantage d’agilité.)