{"version":"1.0","provider_name":"Domen Zavrl","provider_url":"https:\/\/www.domenzavrl.com\/sl\/","author_name":"Domen Zavrl","author_url":"https:\/\/www.domenzavrl.com\/sl\/author\/admin\/","title":"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"iahXDFkTIF\"><a href=\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/\">EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/embed\/#?secret=iahXDFkTIF\" width=\"600\" height=\"338\" title=\"&#8220;EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH&#8221; &#8212; Domen Zavrl\" data-secret=\"iahXDFkTIF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.domenzavrl.com\/wp-content\/uploads\/2021\/08\/KRIPTOGRAFIJE-V-MOBILNIH.jpg","thumbnail_width":1000,"thumbnail_height":667,"description":"V\u00a0dana\u0161njem\u00a0svetu\u00a0se\u00a0vsem\u00a0zdi\u00a0samoumevno, da\u00a0svoje\u00a0hi\u0161e,\u00a0avtomobile\u00a0in\u00a0drugo\u00a0premo\u017eenje\u00a0zavarujemo\u00a0s\u00a0klju\u010di\u00a0in\u00a0klju\u010davnicami. Z\u00a0razvojem\u00a0tehnologije\u00a0in\u00a0pospe\u0161eno\u00a0digitalizacijo\u00a0je\u00a0vsak\u00a0dan\u00a0bolj\u00a0pomembno\u00a0tudi\u00a0varovanje\u00a0na\u0161ih\u00a0podatkov\u00a0in\u00a0komunikacije. V\u00a0obeh\u00a0primerih\u00a0bolj\u00a0ali\u00a0manj\u00a0uspe\u0161no\u00a0prepre\u010dimo\u00a0dostop\u00a0do\u00a0lastnine\u00a0nepoobla\u0161\u010denim\u00a0osebam\u00a0brez\u00a0veljavnega\u00a0klju\u010da.\u00a0V\u00a0kibernetskem\u00a0svetu\u00a0uporabljamo\u00a0za\u00a0varno\u00a0komunikacijo\u00a0algoritme\u00a0in\u00a0varnostne\u00a0protokole, ki\u00a0temeljijo\u00a0na\u00a0zapletenih\u00a0matemati\u010dnih\u00a0problemih\u00a0in\u00a0izra\u010dunih.\u00a0Cilj\u00a0kriptografije\u00a0je\u00a0zagotoviti\u00a0zaupnost\u00a0in\u00a0celovitost\u00a0podatkov\u00a0ter\u00a0integriteto,\u00a0tudi\u00a0v\u00a0primeru\u00a0zlonamernega\u00a0napada\u00a0na\u00a0sistem.\u00a0Zaupnost\u00a0pomeni\u00a0zagotavljanje\u00a0zasebnosti\u00a0z\u00a0uporabo\u00a0\u0161ifriranja\u00a0podatkov.\u00a0Celovitost\u00a0podatkov\u00a0pomeni\u00a0nedotakljivost\u00a0in\u00a0razkrivanje\u00a0nepoobla\u0161\u010denega\u00a0dostopa\u00a0ali\u00a0celo\u00a0spreminjanja\u00a0podatkov.\u00a0Pristnost\u00a0nam\u00a0zagotavlja, da\u00a0podatki\u00a0prihajajo\u00a0od\u00a0zaupanja\u00a0vrednega,\u00a0avtenti\u010dnega\u00a0vira.\u00a0 Mobilna\u00a0omre\u017eja\u00a0so\u00a0kriti\u010dna\u00a0infrastruktura\u00a0in\u00a0mo\u010dni\u00a0kriptografski\u00a0algoritmi\u00a0uporabnikom\u00a0zagotavljajo\u00a0varnost\u00a0informacij\u00a0in\u00a0za\u0161\u010dito\u00a0zasebnosti.\u00a0Kriptografski\u00a0algoritmi\u00a0in\u00a0protokoli\u00a0v\u00a0mobilnih\u00a0komunikacijah\u00a0so\u00a0prehodili\u00a0dolgo\u00a0pot od\u00a0mobilnih\u00a0omre\u017eij\u00a0generacije\u00a02G do\u00a0zadnje\u00a05G\u00a0generacije.\u00a0Specifikacije\u00a0kriptografskih\u00a0algoritmov\u00a0za\u00a0uporabo\u00a0v\u00a0mobilnih\u00a0omre\u017ejih\u00a0so\u00a0nepregledno\u00a0razpr\u0161ene\u00a0po\u00a0\u0161tevilnih\u00a0dokumentih, ki so\u00a0jih\u00a0v\u00a0zadnjih\u00a030\u00a0letih\u00a0objavile\u00a0tri\u00a0organizacije\u00a0za\u00a0standardizacijo: 3GPP, ETSI in GSMA.\u00a0 2G &#8211;\u00a0ROJSTVO KRIPTOGRAFSKE VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Mobilna\u00a0omre\u017eja\u00a0druge\u00a0generacije\u00a0(2G\u00a0ali\u00a0GSM)\u00a0so\u00a0omogo\u010dala\u00a0po\u00a0dana\u0161njih\u00a0standardih\u00a0sorazmerno\u00a0nizko\u00a0varnost.\u00a0Vendar\u00a0pa je\u00a0bil\u00a0GSM\u00a0prvi\u00a0komunikacijski\u00a0sistem\u00a0za\u00a0mno\u017ei\u010dni\u00a0trg, ki je\u00a0uporabljal\u00a0kriptografijo.\u00a0\u0160ifrirna\u00a0algoritma\u00a0A5\/1 in A5\/2\u00a0sta\u00a0\u0161ifrirala\u00a0podatke\u00a0s\u00a064-bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0Sledili\u00a0so\u00a0algoritmi\u00a0COMP128 in\u00a0kasneje\u00a0GEA.\u00a0\u00a0 3G\u00a0IN 4G\u00a0&#8211;\u00a0DVIG VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Tretja\u00a0generacija\u00a0(3G\u00a0ali\u00a0UMTS)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0uvedla\u00a0128-bitne\u00a0algoritme\u00a0za\u00a0\u0161ifriranje\u00a0in\u00a0varovanje\u00a0integritete.\u00a0Za\u00a03G je\u00a0algoritme\u00a0izbrala\u00a0skupina\u00a0strokovnjakov\u00a0za\u00a0varnostne\u00a0algoritme\u00a0ETSI (SAGE), ki je od\u00a0od\u00a0takrat\u00a0izdajala\u00a0tudi\u00a0priporo\u010dila\u00a0za\u00a0vse\u00a0naslednje\u00a0algoritme\u00a0v\u00a0mobilnih\u00a0omre\u017ejih.\u00a0Algoritmi\u00a03G\u00a0mobilnih\u00a0omre\u017eij\u00a0\u0161e\u00a0danes\u00a0veljajo\u00a0za\u00a0zadovoljivo\u00a0varne.\u00a0Predstavnika\u00a0sta\u00a0UEA1, UEA2,\u00a03GPP\u00a0pa je\u00a0definiral\u00a0tudi\u00a0dobro\u00a0zasnovan\u00a0algoritem\u00a0Milenage, ki\u00a0se\u00a0pogosto\u00a0uporablja\u00a0v\u00a0praksi.\u00a0Vsi\u00a03G\u00a0algoritmi\u00a0so\u00a0bili\u00a0kompatibilni\u00a0navzdol\u00a0z\u00a02G\u00a0omre\u017eji.\u00a0\u010cetrta\u00a0generacija\u00a0(4G\u00a0ali\u00a0LTE)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0med\u00a0drugimi\u00a0uvedla\u00a0Tuak, novo\u00a0dru\u017eino\u00a0algoritmov.\u00a0 5G, PRIHODNOST\u00a0IN HITROST\u00a0 Peta\u00a0generacija\u00a0(5G\u00a0ali\u00a0NR)\u00a0uporablja\u00a0enake\u00a0algoritme\u00a0kot\u00a04G,\u00a0saj\u00a0omogo\u010dajo\u00a0dovolj\u00a0visoko\u00a0varnost.\u00a0Te\u017eava\u00a0je, da\u00a0trenutno\u00a0uporabljeni\u00a0algoritmi\u00a0niso\u00a0primerni\u00a0za\u00a0prihodnje\u00a0zahteve.\u00a0\u010ceprav\u00a0hitrost\u00a0\u0161e\u00a0zado\u0161\u010da\u00a0za\u00a0omre\u017eje\u00a05G, se\u00a0strokovnjaki\u00a0strinjajo, da\u00a0ne\u00a0bodo\u00a0primerni\u00a0za 6G\u00a0omre\u017eje\u00a0prihodnosti,\u00a0saj\u00a0mobilna\u00a0omre\u017eja\u00a0zahtevajo\u00a0najvi\u0161je\u00a0varnostne\u00a0standarde.\u00a0 Algoritmi\u00a0za\u00a05G in 6G\u00a0bodo\u00a0zelo\u00a0verjetno\u00a0podpirali\u00a0256-bitno\u00a0ali\u00a0dalj\u0161o\u00a0dol\u017eino\u00a0klju\u010da.\u00a0\u010ceprav\u00a0128-bitni\u00a0algoritmi\u00a0v\u00a0praksi\u00a0\u0161\u010ditijo\u00a0pred\u00a0kvantnimi\u00a0ra\u010dunalniki,\u00a0\u017ee\u00a0danes\u00a0vlade\u00a0in\u00a0finan\u010dne\u00a0institucije\u00a0vse\u00a0ve\u010dkrat\u00a0zahtevajo\u00a0vi\u0161jo\u00a0varnostno\u00a0stopnjo\u00a0za\u00a0za\u0161\u010dito\u00a0svojih\u00a0komunikacij.\u00a0Tudi\u00a0najbolj\u00a0varni\u00a0algoritem\u00a0\u0161ifriranja\u00a0postane\u00a0ranljiv\u00a0za\u00a0napade,\u00a0\u010de\u00a0uporablja\u00a0nezadostno\u00a0bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0 V\u00a0preteklosti\u00a0so\u00a0bili\u00a0zlomi\u00a0algoritmov\u00a0dokaj\u00a0pogosti,\u00a0vendar\u00a0pa [&hellip;]"}