Zoom Video Communications¤Ï5·î21Æü(Êƹñ»þ´Ö)¡¢¡ÖZoom bolsters security offering with the inclusion of post-quantum end-to-end encryption in Zoom Workplace¡ÃZoom - Zoom¡×¤Ë¤ª¤¤¤Æ¡¢ZoomÀ½Éʤ˥ݥ¹¥ÈÎ̻ҥ¨¥ó¥É¡¦¥Ä¡¼¡¦¥¨¥ó¥É°Å¹æ²½(Post-Quantum End-to-End Encryption)¤òƳÆþ¤¹¤ë¤Èȯɽ¤·¤¿¡£Zoom Workplace¤ª¤è¤ÓZoom Meetings¤ÏÀ¤³¦Ãæ¤ÇÍøÍѲÄǽ¤È¤Ê¤Ã¤Æ¤ª¤ê¡¢Zoom Phone¤ª¤è¤ÓZoom Rooms¤Ï´Ö¤â¤Ê¤¯Äó¶¡Í½Äê¤È¤µ¤ì¤ë¡£

Zoom bolsters security offering with the inclusion of post-quantum end-to-end encryption in Zoom Workplace¡ÃZoom - Zoom

¡û¥Ý¥¹¥ÈÎ̻ҥ¨¥ó¥É¡¦¥Ä¡¼¡¦¥¨¥ó¥É°Å¹æ²½¤È¤Ï

¥Ý¥¹¥ÈÎ̻ҰŹæ(PQC: Post-Quantum Cryptography)¤Ï¡¢¾­Íè½Ð¸½¤¬Í½ÁÛ¤µ¤ì¤Æ¤¤¤ëÎ̻ҥ³¥ó¥Ô¥å¡¼¥¿¡¼¤Ë¤è¤ë°Å¹æ²òÆɤËÂѤ¨¤é¤ì¤ë°Å¹æ¥¢¥ë¥´¥ê¥º¥à¤Î¤³¤È¡£¸½»þÅÀ¤Ç¤Ï°Å¹æ²òÆɤ¬Æñ¤·¤¤°Å¹æ¥¢¥ë¥´¥ê¥º¥à¤â¡¢Î̻ҥ³¥ó¥Ô¥å¡¼¥¿¤Î°µÅÝŪ¤Ê·×»»Â®Å٤ˤè¤ê²òÆɤµ¤ì¤ë²ÄǽÀ­¤¬¤¢¤ë¡£

¤¹¤Ç¤Ë¡ÖHarvest Now, Decrypt Later¹¶·â¡×(ÊÌ̾: Store Now, Decrypt Later¹¶·â)¤È¸Æ¤Ð¤ì¤ë¹¶·â¼êË¡¤¬»ØŦ¤µ¤ì¤Æ¤¤¤ë¡£¸½»þÅÀ¤Ç¤Ï²òÆɤǤ­¤Ê¤¤µ¡Ì©¾ðÊó¤òÊݴɤ·¤Æ¤ª¤­¡¢Î̻ҥ³¥ó¥Ô¥å¡¼¥¿¡¼¤¬À½Éʲ½¤µ¤ì¤Æ¤«¤é²òÆɤ¹¤ë¡£

¥¨¥ó¥É¡¦¥Ä¡¼¡¦¥¨¥ó¥É°Å¹æ²½(E2EE: End-to-end encryption)¤ÏÃæ·Ñ¥µ¡¼¥Ð¤ò²ð¤·¤¿Ã¼Ëö´Ö¤ÎÄÌ¿®¤Ë¤ª¤¤¤Æ¡¢Ã¼Ëö¾å¤Ç°Å¹æ²½¤ª¤è¤ÓÉü¹æ¤ò¹Ô¤¦¤³¤È¤ÇÃæ·Ñ¥µ¡¼¥Ð¤Ê¤É·ÐÏ©¾å¤ÎÅðÄ°¡¢²þ¤¶¤ó¤òËɻߤ¹¤ëÄÌ¿®µ»½Ñ¤Î¤³¤È¡£¤³¤Îµ»½Ñ¤ò»È¤Ã¤¿¥á¥Ã¥»¡¼¥¸¤Î¤ä¤ê¼è¤ê¤Ç¤Ï¡¢Á÷¿®¼Ô¤ª¤è¤Ó¼õ¿®¼Ô¤Î¤ß¤¬¥á¥Ã¥»¡¼¥¸¤ò±ÜÍ÷¤¹¤ë¤³¤È¤¬¤Ç¤­¡¢¥µ¡¼¥Ó¥¹¤ò±¿±Ä¤·¤Æ¤¤¤ë´ë¶È¤ò´Þ¤áÂè3¼Ô¤Ï±ÜÍ÷¤¹¤ë¤³¤È¤¬¤Ç¤­¤Ê¤¯¤Ê¤ë¡£

¥Ý¥¹¥ÈÎ̻ҥ¨¥ó¥É¡¦¥Ä¡¦¡¼¥¨¥ó¥É°Å¹æ²½¤Ï¤³¤ì¤éµ»½Ñ¤òÁȤ߹ç¤ï¤»¤¿¤â¤Î¤Ç¡¢¥á¥Ã¥»¡¼¥¸¤ÎÆâÍƤò¾­Íè¤Ë¤ï¤¿¤Ã¤ÆÊݸ¤ë¡£Zoom¤Ç¤ÏÊƹñ¹ñΩɸ½àµ»½Ñ¸¦µæ½ê(NIST: National Institute of Standards and Technology)¤Ë¤è¤Ã¤Æɸ½à²½¤µ¤ì¤¿¥¢¥ë¥´¥ê¥º¥à¤Î¡ÖKyber 768¡×¤ª¤è¤Ó¡ÖML-KEM (FIPS 203)¡×¤ò»ÈÍѤ·¤Æ¤¤¤ë¡£

¡û¥Ç¡¼¥¿Êݸî¤Î½ÅÍ×À­

Zoom¤ÎºÇ¹â¾ðÊ󥻥­¥å¥ê¥Æ¥£ÀÕǤ¼ÔMichael Adams»á¤Ï¼¡¤Î¤è¤¦¤Ë½Ò¤Ù¡¢¤³¤Î¼è¤êÁȤߤνÅÍ×À­¤òÀâÌÀ¤·¤Æ¤¤¤ë¡£

2020ǯ¤ËZoom Meetings¡¢2022ǯ¤ËZoom Phone¤Ë¥¨¥ó¥É¡¦¥Ä¡¼¡¦¥¨¥ó¥É°Å¹æ²½¤òƳÆþ¤·¤Æ°ÊÍè¡¢¤³¤Îµ¡Ç½¤ÎÍøÍѤÏÁý¤¨¤Æ¤¤¤ë¡£¤³¤ì¤Ï¸ÜµÒ¤Î¥Ë¡¼¥º¤òËþ¤¿¤¹°ÂÁ´¤Ê¥×¥é¥Ã¥È¥Õ¥©¡¼¥à¤òÄ󶡤¹¤ë¤³¤È¤Î½ÅÍ×À­¤ò¼¨¤·¤Æ¤¤¤ë¡£

Zoom Meetings¤Ë¤ª¤±¤ë¥Ý¥¹¥ÈÎ̻ҥ¨¥ó¥É¡¦¥Ä¡¼¡¦¥¨¥ó¥É°Å¹æ²½¤ÎÍ­¸ú²½¤Î¼ê½ç¤ä¡¢¥µ¥Ý¡¼¥È¤·¤Æ¤¤¤ë¥Ð¡¼¥¸¥ç¥ó¤Ê¤É¤Ï¡ÖUsing end-to-end encryption (E2EE) in Zoom meetings¡×¤Ë¤Æ²òÀ⤷¤Æ¤¤¤ë¡£¤Ê¤ª¡¢¥¨¥ó¥É¡¦¥Ä¡¼¡¦¥¨¥ó¥É°Å¹æ²½¤ÏÍ­¸ú¤Ë¤¹¤ë¤È¾¤Î°ìÉôµ¡Ç½¤¬Ìµ¸ú¤Ë¤Ê¤ë¤¿¤á¡¢É¬Íפ˱þ¤¸¤Æ³èÍѤ¹¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£