{"id":400,"date":"2021-09-28T14:53:34","date_gmt":"2021-09-28T14:53:34","guid":{"rendered":"https:\/\/www.domenzavrl.com\/?p=400"},"modified":"2021-09-14T15:29:56","modified_gmt":"2021-09-14T15:29:56","slug":"evolucija-kriptografije-v-mobilnih-omrezjih","status":"publish","type":"post","link":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/","title":{"rendered":"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH"},"content":{"rendered":"<p><span data-contrast=\"none\">V\u00a0dana\u0161njem\u00a0svetu\u00a0se\u00a0vsem\u00a0zdi\u00a0samoumevno, da\u00a0svoje\u00a0hi\u0161e,\u00a0avtomobile\u00a0in\u00a0drugo\u00a0premo\u017eenje\u00a0zavarujemo\u00a0s\u00a0klju\u010di\u00a0in\u00a0klju\u010davnicami. Z\u00a0razvojem\u00a0tehnologije\u00a0in\u00a0pospe\u0161eno\u00a0digitalizacijo\u00a0je\u00a0vsak\u00a0dan\u00a0bolj\u00a0pomembno\u00a0tudi\u00a0varovanje\u00a0na\u0161ih\u00a0podatkov\u00a0in\u00a0komunikacije. V\u00a0obeh\u00a0primerih\u00a0bolj\u00a0ali\u00a0manj\u00a0uspe\u0161no\u00a0prepre\u010dimo\u00a0dostop\u00a0do\u00a0lastnine\u00a0nepoobla\u0161\u010denim\u00a0osebam\u00a0brez\u00a0veljavnega\u00a0klju\u010da.\u00a0V\u00a0kibernetskem\u00a0svetu\u00a0uporabljamo\u00a0za\u00a0varno\u00a0komunikacijo\u00a0algoritme\u00a0in\u00a0varnostne\u00a0protokole, ki\u00a0temeljijo\u00a0na\u00a0zapletenih\u00a0matemati\u010dnih\u00a0problemih\u00a0in\u00a0izra\u010dunih.\u00a0Cilj\u00a0kriptografije\u00a0je\u00a0zagotoviti\u00a0zaupnost\u00a0in\u00a0celovitost\u00a0podatkov\u00a0ter\u00a0integriteto,\u00a0tudi\u00a0v\u00a0primeru\u00a0zlonamernega\u00a0napada\u00a0na\u00a0sistem.\u00a0Zaupnost\u00a0pomeni\u00a0zagotavljanje\u00a0zasebnosti\u00a0z\u00a0uporabo\u00a0\u0161ifriranja\u00a0podatkov.\u00a0Celovitost\u00a0podatkov\u00a0pomeni\u00a0nedotakljivost\u00a0in\u00a0razkrivanje\u00a0nepoobla\u0161\u010denega\u00a0dostopa\u00a0ali\u00a0celo\u00a0spreminjanja\u00a0podatkov.\u00a0Pristnost\u00a0nam\u00a0zagotavlja, da\u00a0podatki\u00a0prihajajo\u00a0od\u00a0zaupanja\u00a0vrednega,\u00a0avtenti\u010dnega\u00a0vira.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Mobilna\u00a0omre\u017eja\u00a0so\u00a0kriti\u010dna\u00a0infrastruktura\u00a0in\u00a0mo\u010dni\u00a0kriptografski\u00a0algoritmi\u00a0uporabnikom\u00a0zagotavljajo\u00a0varnost\u00a0informacij\u00a0in\u00a0za\u0161\u010dito\u00a0zasebnosti.\u00a0Kriptografski\u00a0algoritmi\u00a0in\u00a0protokoli\u00a0v\u00a0mobilnih\u00a0komunikacijah\u00a0so\u00a0prehodili\u00a0dolgo\u00a0pot od\u00a0mobilnih\u00a0omre\u017eij\u00a0generacije\u00a02G do\u00a0zadnje\u00a05G\u00a0generacije.\u00a0Specifikacije\u00a0kriptografskih\u00a0algoritmov\u00a0za\u00a0uporabo\u00a0v\u00a0mobilnih\u00a0omre\u017ejih\u00a0so\u00a0nepregledno\u00a0razpr\u0161ene\u00a0po\u00a0\u0161tevilnih\u00a0dokumentih, ki so\u00a0jih\u00a0v\u00a0zadnjih\u00a030\u00a0letih\u00a0objavile\u00a0tri\u00a0organizacije\u00a0za\u00a0standardizacijo: 3GPP, ETSI in GSMA.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<div id=\"attachment_425\" style=\"width: 481px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-425\" class=\"size-full wp-image-425\" src=\"https:\/\/www.domenzavrl.com\/wp-content\/uploads\/2021\/09\/V-Mobilnih-Omrezjih.jpg\" alt=\"Domen Zavrl\" width=\"471\" height=\"673\" srcset=\"https:\/\/www.domenzavrl.com\/wp-content\/uploads\/2021\/09\/V-Mobilnih-Omrezjih.jpg 471w, https:\/\/www.domenzavrl.com\/wp-content\/uploads\/2021\/09\/V-Mobilnih-Omrezjih-210x300.jpg 210w\" sizes=\"(max-width: 471px) 100vw, 471px\" \/><p id=\"caption-attachment-425\" class=\"wp-caption-text\"><a href=\"https:\/\/issuu.com\/domen-zavrl\/docs\/evolucija_kriptografije_v_mobilnih_omre_jih\">EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH<\/a><\/p><\/div>\n<p><b><span data-contrast=\"none\">2G &#8211;\u00a0ROJSTVO KRIPTOGRAFSKE VARNOSTI MOBILNIH OMRE\u017dIJ<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Mobilna\u00a0omre\u017eja\u00a0druge\u00a0generacije\u00a0(2G\u00a0ali\u00a0GSM)\u00a0so\u00a0omogo\u010dala\u00a0po\u00a0dana\u0161njih\u00a0standardih\u00a0sorazmerno\u00a0nizko\u00a0varnost.\u00a0Vendar\u00a0pa je\u00a0bil\u00a0GSM\u00a0prvi\u00a0komunikacijski\u00a0sistem\u00a0za\u00a0mno\u017ei\u010dni\u00a0trg, ki je\u00a0uporabljal\u00a0kriptografijo.\u00a0\u0160ifrirna\u00a0algoritma\u00a0A5\/1 in A5\/2\u00a0sta\u00a0\u0161ifrirala\u00a0podatke\u00a0s\u00a064-bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0Sledili\u00a0so\u00a0algoritmi\u00a0COMP128 in\u00a0kasneje\u00a0GEA.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">3G\u00a0IN 4G\u00a0&#8211;\u00a0DVIG VARNOSTI MOBILNIH OMRE\u017dIJ<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Tretja\u00a0generacija\u00a0(3G\u00a0ali\u00a0UMTS)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0uvedla\u00a0128-bitne\u00a0algoritme\u00a0za\u00a0\u0161ifriranje\u00a0in\u00a0varovanje\u00a0integritete.\u00a0Za\u00a03G je\u00a0algoritme\u00a0izbrala\u00a0skupina\u00a0strokovnjakov\u00a0za\u00a0varnostne\u00a0algoritme\u00a0ETSI (SAGE), ki je od\u00a0od\u00a0takrat\u00a0izdajala\u00a0tudi\u00a0priporo\u010dila\u00a0za\u00a0vse\u00a0naslednje\u00a0algoritme\u00a0v\u00a0mobilnih\u00a0omre\u017ejih.\u00a0Algoritmi\u00a03G\u00a0mobilnih\u00a0omre\u017eij\u00a0\u0161e\u00a0danes\u00a0veljajo\u00a0za\u00a0zadovoljivo\u00a0varne.\u00a0Predstavnika\u00a0sta\u00a0UEA1, UEA2,\u00a03GPP\u00a0pa je\u00a0definiral\u00a0tudi\u00a0dobro\u00a0zasnovan\u00a0algoritem\u00a0Milenage, ki\u00a0se\u00a0pogosto\u00a0uporablja\u00a0v\u00a0praksi.\u00a0Vsi\u00a03G\u00a0algoritmi\u00a0so\u00a0bili\u00a0kompatibilni\u00a0navzdol\u00a0z\u00a02G\u00a0omre\u017eji.\u00a0\u010cetrta\u00a0generacija\u00a0(4G\u00a0ali\u00a0LTE)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0med\u00a0drugimi\u00a0uvedla\u00a0Tuak, novo\u00a0dru\u017eino\u00a0algoritmov.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/assets.pinterest.com\/ext\/embed.html?id=765541636665237553\" width=\"450\" height=\"423\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><b><span data-contrast=\"none\">5G, PRIHODNOST\u00a0IN HITROST<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Peta\u00a0generacija\u00a0(5G\u00a0ali\u00a0NR)\u00a0uporablja\u00a0enake\u00a0algoritme\u00a0kot\u00a04G,\u00a0saj\u00a0omogo\u010dajo\u00a0dovolj\u00a0visoko\u00a0varnost.\u00a0Te\u017eava\u00a0je, da\u00a0trenutno\u00a0uporabljeni\u00a0algoritmi\u00a0niso\u00a0primerni\u00a0za\u00a0prihodnje\u00a0zahteve.\u00a0\u010ceprav\u00a0hitrost\u00a0\u0161e\u00a0zado\u0161\u010da\u00a0za\u00a0omre\u017eje\u00a05G, se\u00a0strokovnjaki\u00a0strinjajo, da\u00a0ne\u00a0bodo\u00a0primerni\u00a0za 6G\u00a0omre\u017eje\u00a0prihodnosti,\u00a0saj\u00a0mobilna\u00a0omre\u017eja\u00a0zahtevajo\u00a0najvi\u0161je\u00a0varnostne\u00a0standarde.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Algoritmi\u00a0za\u00a05G in 6G\u00a0bodo\u00a0zelo\u00a0verjetno\u00a0podpirali\u00a0256-bitno\u00a0ali\u00a0dalj\u0161o\u00a0dol\u017eino\u00a0klju\u010da.\u00a0\u010ceprav\u00a0128-bitni\u00a0algoritmi\u00a0v\u00a0praksi\u00a0\u0161\u010ditijo\u00a0pred\u00a0kvantnimi\u00a0ra\u010dunalniki,\u00a0\u017ee\u00a0danes\u00a0vlade\u00a0in\u00a0finan\u010dne\u00a0institucije\u00a0vse\u00a0ve\u010dkrat\u00a0zahtevajo\u00a0vi\u0161jo\u00a0varnostno\u00a0stopnjo\u00a0za\u00a0za\u0161\u010dito\u00a0svojih\u00a0komunikacij.\u00a0Tudi\u00a0najbolj\u00a0varni\u00a0algoritem\u00a0\u0161ifriranja\u00a0postane\u00a0ranljiv\u00a0za\u00a0napade,\u00a0\u010de\u00a0uporablja\u00a0nezadostno\u00a0bitno\u00a0dol\u017eino\u00a0klju\u010da.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">V\u00a0preteklosti\u00a0so\u00a0bili\u00a0zlomi\u00a0algoritmov\u00a0dokaj\u00a0pogosti,\u00a0vendar\u00a0pa so\u00a0ostali\u00a0v\u00a0praksi\u00a0nezlomljivi\u00a0vsi\u00a0algoritmi, ki so\u00a0bili\u00a0po\u00a0letu\u00a02000\u00a0standardizirani\u00a0pri\u00a0NIST, IRTF CFRG in ETSI SAGE. Seveda pa\u00a0vsak,\u00a0\u0161e\u00a0tako\u00a0varen\u00a0in\u00a0cetrificiran\u00a0algoritem,\u00a0lahko\u00a0z\u00a0napredkom\u00a0tehnologije\u00a0postane\u00a0ranljiv,\u00a0zato\u00a0je\u00a0nujno\u00a0stalno\u00a0preverjanje\u00a0in\u00a0posodabljanje.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">POSTKVANTNA VARNOST<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Veliko\u00a0delo\u00a0kriptografije\u00a0prihodnosti\u00a0bo\u00a0uvedba\u00a0kvantno\u00a0varnih\u00a0algoritmov\u00a0ali\u00a0post-kvantne\u00a0kriptografije\u00a0(PQC).\u00a0Algoritmi\u00a0PQC so\u00a0kriptografski\u00a0algoritmi, ki so\u00a0za\u0161\u010diteni\u00a0pred\u00a0napadi\u00a0iz\u00a0kvantnih\u00a0ra\u010dunalnikov. Sem\u00a0spada\u00a0ve\u010dina\u00a0sodobnih\u00a0algoritmov,\u00a0saj\u00a0se je\u00a03GPP dobro\u00a0pripravil. Prvi\u00a0kvantni\u00a0ra\u010dunalniki\u00a0\u017ee\u00a0delujejo,\u00a0vendar\u00a0\u0161e\u00a0ni\u00a0\u010disto\u00a0jasno,\u00a0kdaj\u00a0bodo\u00a0na\u00a0voljo\u00a0tako\u00a0zmogljivi\u00a0kvantni\u00a0ra\u010dunalniki,\u00a0da\u00a0bodo\u00a0sposobni\u00a0razbiti\u00a0tudi\u00a0sodobne\u00a0kriptografske\u00a0algoritme. 3GPP\u00a0na\u010drtuje\u00a0uvedbo\u00a0kvantno\u00a0varnih\u00a0algoritmov,\u00a0\u0161e\u00a0preden\u00a0bodo\u00a0kvantni\u00a0ra\u010dunalniki\u00a0sposobni\u00a0ogroziti\u00a0za\u0161\u010dito.\u00a0Ve\u010d\u00a0o\u00a0kriptografiji\u00a0si\u00a0preberite\u00a0na\u00a0blogu, ki ga\u00a0pi\u0161e\u00a0<\/span><a href=\"https:\/\/domenzavrlsvn.wordpress.com\/\"><span data-contrast=\"none\">Domen Zavrl<\/span><\/a><span data-contrast=\"none\">,\u00a0doktor\u00a0ekonomije\u00a0s\u00a0specializacijo\u00a0iz\u00a0kriptografije\u00a0na\u00a0univerzi\u00a0Stanford.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/tYerVZs4Uxo\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>V\u00a0dana\u0161njem\u00a0svetu\u00a0se\u00a0vsem\u00a0zdi\u00a0samoumevno, da\u00a0svoje\u00a0hi\u0161e,\u00a0avtomobile\u00a0in\u00a0drugo\u00a0premo\u017eenje\u00a0zavarujemo\u00a0s\u00a0klju\u010di\u00a0in\u00a0klju\u010davnicami. Z\u00a0razvojem\u00a0tehnologije\u00a0in\u00a0pospe\u0161eno\u00a0digitalizacijo\u00a0je\u00a0vsak\u00a0dan\u00a0bolj\u00a0pomembno\u00a0tudi\u00a0varovanje\u00a0na\u0161ih\u00a0podatkov\u00a0in\u00a0komunikacije. V\u00a0obeh\u00a0primerih\u00a0bolj\u00a0ali\u00a0manj\u00a0uspe\u0161no\u00a0prepre\u010dimo\u00a0dostop\u00a0do\u00a0lastnine\u00a0nepoobla\u0161\u010denim\u00a0osebam\u00a0brez\u00a0veljavnega\u00a0klju\u010da.\u00a0V\u00a0kibernetskem\u00a0svetu\u00a0uporabljamo\u00a0za\u00a0varno\u00a0komunikacijo\u00a0algoritme\u00a0in\u00a0varnostne\u00a0protokole, ki\u00a0temeljijo\u00a0na\u00a0zapletenih\u00a0matemati\u010dnih\u00a0problemih\u00a0in\u00a0izra\u010dunih.\u00a0Cilj\u00a0kriptografije\u00a0je\u00a0zagotoviti\u00a0zaupnost\u00a0in\u00a0celovitost\u00a0podatkov\u00a0ter\u00a0integriteto,\u00a0tudi\u00a0v\u00a0primeru\u00a0zlonamernega\u00a0napada\u00a0na\u00a0sistem.\u00a0Zaupnost\u00a0pomeni\u00a0zagotavljanje\u00a0zasebnosti\u00a0z\u00a0uporabo\u00a0\u0161ifriranja\u00a0podatkov.\u00a0Celovitost\u00a0podatkov\u00a0pomeni\u00a0nedotakljivost\u00a0in\u00a0razkrivanje\u00a0nepoobla\u0161\u010denega\u00a0dostopa\u00a0ali\u00a0celo\u00a0spreminjanja\u00a0podatkov.\u00a0Pristnost\u00a0nam\u00a0zagotavlja, da\u00a0podatki\u00a0prihajajo\u00a0od\u00a0zaupanja\u00a0vrednega,\u00a0avtenti\u010dnega\u00a0vira.\u00a0 Mobilna\u00a0omre\u017eja\u00a0so\u00a0kriti\u010dna\u00a0infrastruktura\u00a0in\u00a0mo\u010dni\u00a0kriptografski\u00a0algoritmi\u00a0uporabnikom\u00a0zagotavljajo\u00a0varnost\u00a0informacij\u00a0in\u00a0za\u0161\u010dito\u00a0zasebnosti.\u00a0Kriptografski\u00a0algoritmi\u00a0in\u00a0protokoli\u00a0v\u00a0mobilnih\u00a0komunikacijah\u00a0so\u00a0prehodili\u00a0dolgo\u00a0pot od\u00a0mobilnih\u00a0omre\u017eij\u00a0generacije\u00a02G do\u00a0zadnje\u00a05G\u00a0generacije.\u00a0Specifikacije\u00a0kriptografskih\u00a0algoritmov\u00a0za\u00a0uporabo\u00a0v\u00a0mobilnih\u00a0omre\u017ejih\u00a0so\u00a0nepregledno\u00a0razpr\u0161ene\u00a0po\u00a0\u0161tevilnih\u00a0dokumentih, ki so\u00a0jih\u00a0v\u00a0zadnjih\u00a030\u00a0letih\u00a0objavile\u00a0tri\u00a0organizacije\u00a0za\u00a0standardizacijo: 3GPP, ETSI in GSMA.\u00a0 2G &#8211;\u00a0ROJSTVO KRIPTOGRAFSKE VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Mobilna\u00a0omre\u017eja\u00a0druge\u00a0generacije\u00a0(2G\u00a0ali\u00a0GSM)\u00a0so\u00a0omogo\u010dala\u00a0po\u00a0dana\u0161njih\u00a0standardih\u00a0sorazmerno\u00a0nizko\u00a0varnost.\u00a0Vendar\u00a0pa je\u00a0bil\u00a0GSM\u00a0prvi\u00a0komunikacijski\u00a0sistem\u00a0za\u00a0mno\u017ei\u010dni\u00a0trg, ki je\u00a0uporabljal\u00a0kriptografijo.\u00a0\u0160ifrirna\u00a0algoritma\u00a0A5\/1 in A5\/2\u00a0sta\u00a0\u0161ifrirala\u00a0podatke\u00a0s\u00a064-bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0Sledili\u00a0so\u00a0algoritmi\u00a0COMP128 in\u00a0kasneje\u00a0GEA.\u00a0\u00a0 3G\u00a0IN 4G\u00a0&#8211;\u00a0DVIG VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Tretja\u00a0generacija\u00a0(3G\u00a0ali\u00a0UMTS)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0uvedla\u00a0128-bitne\u00a0algoritme\u00a0za\u00a0\u0161ifriranje\u00a0in\u00a0varovanje\u00a0integritete.\u00a0Za\u00a03G je\u00a0algoritme\u00a0izbrala\u00a0skupina\u00a0strokovnjakov\u00a0za\u00a0varnostne\u00a0algoritme\u00a0ETSI (SAGE), ki je od\u00a0od\u00a0takrat\u00a0izdajala\u00a0tudi\u00a0priporo\u010dila\u00a0za\u00a0vse\u00a0naslednje\u00a0algoritme\u00a0v\u00a0mobilnih\u00a0omre\u017ejih.\u00a0Algoritmi\u00a03G\u00a0mobilnih\u00a0omre\u017eij\u00a0\u0161e\u00a0danes\u00a0veljajo\u00a0za\u00a0zadovoljivo\u00a0varne.\u00a0Predstavnika\u00a0sta\u00a0UEA1, UEA2,\u00a03GPP\u00a0pa je\u00a0definiral\u00a0tudi\u00a0dobro\u00a0zasnovan\u00a0algoritem\u00a0Milenage, ki\u00a0se\u00a0pogosto\u00a0uporablja\u00a0v\u00a0praksi.\u00a0Vsi\u00a03G\u00a0algoritmi\u00a0so\u00a0bili\u00a0kompatibilni\u00a0navzdol\u00a0z\u00a02G\u00a0omre\u017eji.\u00a0\u010cetrta\u00a0generacija\u00a0(4G\u00a0ali\u00a0LTE)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0med\u00a0drugimi\u00a0uvedla\u00a0Tuak, novo\u00a0dru\u017eino\u00a0algoritmov.\u00a0 5G, PRIHODNOST\u00a0IN HITROST\u00a0 Peta\u00a0generacija\u00a0(5G\u00a0ali\u00a0NR)\u00a0uporablja\u00a0enake\u00a0algoritme\u00a0kot\u00a04G,\u00a0saj\u00a0omogo\u010dajo\u00a0dovolj\u00a0visoko\u00a0varnost.\u00a0Te\u017eava\u00a0je, da\u00a0trenutno\u00a0uporabljeni\u00a0algoritmi\u00a0niso\u00a0primerni\u00a0za\u00a0prihodnje\u00a0zahteve.\u00a0\u010ceprav\u00a0hitrost\u00a0\u0161e\u00a0zado\u0161\u010da\u00a0za\u00a0omre\u017eje\u00a05G, se\u00a0strokovnjaki\u00a0strinjajo, da\u00a0ne\u00a0bodo\u00a0primerni\u00a0za 6G\u00a0omre\u017eje\u00a0prihodnosti,\u00a0saj\u00a0mobilna\u00a0omre\u017eja\u00a0zahtevajo\u00a0najvi\u0161je\u00a0varnostne\u00a0standarde.\u00a0 Algoritmi\u00a0za\u00a05G in 6G\u00a0bodo\u00a0zelo\u00a0verjetno\u00a0podpirali\u00a0256-bitno\u00a0ali\u00a0dalj\u0161o\u00a0dol\u017eino\u00a0klju\u010da.\u00a0\u010ceprav\u00a0128-bitni\u00a0algoritmi\u00a0v\u00a0praksi\u00a0\u0161\u010ditijo\u00a0pred\u00a0kvantnimi\u00a0ra\u010dunalniki,\u00a0\u017ee\u00a0danes\u00a0vlade\u00a0in\u00a0finan\u010dne\u00a0institucije\u00a0vse\u00a0ve\u010dkrat\u00a0zahtevajo\u00a0vi\u0161jo\u00a0varnostno\u00a0stopnjo\u00a0za\u00a0za\u0161\u010dito\u00a0svojih\u00a0komunikacij.\u00a0Tudi\u00a0najbolj\u00a0varni\u00a0algoritem\u00a0\u0161ifriranja\u00a0postane\u00a0ranljiv\u00a0za\u00a0napade,\u00a0\u010de\u00a0uporablja\u00a0nezadostno\u00a0bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0 V\u00a0preteklosti\u00a0so\u00a0bili\u00a0zlomi\u00a0algoritmov\u00a0dokaj\u00a0pogosti,\u00a0vendar\u00a0pa [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[13,10],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/\" \/>\n<meta property=\"og:locale\" content=\"sl_SI\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl\" \/>\n<meta property=\"og:description\" content=\"V\u00a0dana\u0161njem\u00a0svetu\u00a0se\u00a0vsem\u00a0zdi\u00a0samoumevno, da\u00a0svoje\u00a0hi\u0161e,\u00a0avtomobile\u00a0in\u00a0drugo\u00a0premo\u017eenje\u00a0zavarujemo\u00a0s\u00a0klju\u010di\u00a0in\u00a0klju\u010davnicami. Z\u00a0razvojem\u00a0tehnologije\u00a0in\u00a0pospe\u0161eno\u00a0digitalizacijo\u00a0je\u00a0vsak\u00a0dan\u00a0bolj\u00a0pomembno\u00a0tudi\u00a0varovanje\u00a0na\u0161ih\u00a0podatkov\u00a0in\u00a0komunikacije. V\u00a0obeh\u00a0primerih\u00a0bolj\u00a0ali\u00a0manj\u00a0uspe\u0161no\u00a0prepre\u010dimo\u00a0dostop\u00a0do\u00a0lastnine\u00a0nepoobla\u0161\u010denim\u00a0osebam\u00a0brez\u00a0veljavnega\u00a0klju\u010da.\u00a0V\u00a0kibernetskem\u00a0svetu\u00a0uporabljamo\u00a0za\u00a0varno\u00a0komunikacijo\u00a0algoritme\u00a0in\u00a0varnostne\u00a0protokole, ki\u00a0temeljijo\u00a0na\u00a0zapletenih\u00a0matemati\u010dnih\u00a0problemih\u00a0in\u00a0izra\u010dunih.\u00a0Cilj\u00a0kriptografije\u00a0je\u00a0zagotoviti\u00a0zaupnost\u00a0in\u00a0celovitost\u00a0podatkov\u00a0ter\u00a0integriteto,\u00a0tudi\u00a0v\u00a0primeru\u00a0zlonamernega\u00a0napada\u00a0na\u00a0sistem.\u00a0Zaupnost\u00a0pomeni\u00a0zagotavljanje\u00a0zasebnosti\u00a0z\u00a0uporabo\u00a0\u0161ifriranja\u00a0podatkov.\u00a0Celovitost\u00a0podatkov\u00a0pomeni\u00a0nedotakljivost\u00a0in\u00a0razkrivanje\u00a0nepoobla\u0161\u010denega\u00a0dostopa\u00a0ali\u00a0celo\u00a0spreminjanja\u00a0podatkov.\u00a0Pristnost\u00a0nam\u00a0zagotavlja, da\u00a0podatki\u00a0prihajajo\u00a0od\u00a0zaupanja\u00a0vrednega,\u00a0avtenti\u010dnega\u00a0vira.\u00a0 Mobilna\u00a0omre\u017eja\u00a0so\u00a0kriti\u010dna\u00a0infrastruktura\u00a0in\u00a0mo\u010dni\u00a0kriptografski\u00a0algoritmi\u00a0uporabnikom\u00a0zagotavljajo\u00a0varnost\u00a0informacij\u00a0in\u00a0za\u0161\u010dito\u00a0zasebnosti.\u00a0Kriptografski\u00a0algoritmi\u00a0in\u00a0protokoli\u00a0v\u00a0mobilnih\u00a0komunikacijah\u00a0so\u00a0prehodili\u00a0dolgo\u00a0pot od\u00a0mobilnih\u00a0omre\u017eij\u00a0generacije\u00a02G do\u00a0zadnje\u00a05G\u00a0generacije.\u00a0Specifikacije\u00a0kriptografskih\u00a0algoritmov\u00a0za\u00a0uporabo\u00a0v\u00a0mobilnih\u00a0omre\u017ejih\u00a0so\u00a0nepregledno\u00a0razpr\u0161ene\u00a0po\u00a0\u0161tevilnih\u00a0dokumentih, ki so\u00a0jih\u00a0v\u00a0zadnjih\u00a030\u00a0letih\u00a0objavile\u00a0tri\u00a0organizacije\u00a0za\u00a0standardizacijo: 3GPP, ETSI in GSMA.\u00a0 2G &#8211;\u00a0ROJSTVO KRIPTOGRAFSKE VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Mobilna\u00a0omre\u017eja\u00a0druge\u00a0generacije\u00a0(2G\u00a0ali\u00a0GSM)\u00a0so\u00a0omogo\u010dala\u00a0po\u00a0dana\u0161njih\u00a0standardih\u00a0sorazmerno\u00a0nizko\u00a0varnost.\u00a0Vendar\u00a0pa je\u00a0bil\u00a0GSM\u00a0prvi\u00a0komunikacijski\u00a0sistem\u00a0za\u00a0mno\u017ei\u010dni\u00a0trg, ki je\u00a0uporabljal\u00a0kriptografijo.\u00a0\u0160ifrirna\u00a0algoritma\u00a0A5\/1 in A5\/2\u00a0sta\u00a0\u0161ifrirala\u00a0podatke\u00a0s\u00a064-bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0Sledili\u00a0so\u00a0algoritmi\u00a0COMP128 in\u00a0kasneje\u00a0GEA.\u00a0\u00a0 3G\u00a0IN 4G\u00a0&#8211;\u00a0DVIG VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Tretja\u00a0generacija\u00a0(3G\u00a0ali\u00a0UMTS)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0uvedla\u00a0128-bitne\u00a0algoritme\u00a0za\u00a0\u0161ifriranje\u00a0in\u00a0varovanje\u00a0integritete.\u00a0Za\u00a03G je\u00a0algoritme\u00a0izbrala\u00a0skupina\u00a0strokovnjakov\u00a0za\u00a0varnostne\u00a0algoritme\u00a0ETSI (SAGE), ki je od\u00a0od\u00a0takrat\u00a0izdajala\u00a0tudi\u00a0priporo\u010dila\u00a0za\u00a0vse\u00a0naslednje\u00a0algoritme\u00a0v\u00a0mobilnih\u00a0omre\u017ejih.\u00a0Algoritmi\u00a03G\u00a0mobilnih\u00a0omre\u017eij\u00a0\u0161e\u00a0danes\u00a0veljajo\u00a0za\u00a0zadovoljivo\u00a0varne.\u00a0Predstavnika\u00a0sta\u00a0UEA1, UEA2,\u00a03GPP\u00a0pa je\u00a0definiral\u00a0tudi\u00a0dobro\u00a0zasnovan\u00a0algoritem\u00a0Milenage, ki\u00a0se\u00a0pogosto\u00a0uporablja\u00a0v\u00a0praksi.\u00a0Vsi\u00a03G\u00a0algoritmi\u00a0so\u00a0bili\u00a0kompatibilni\u00a0navzdol\u00a0z\u00a02G\u00a0omre\u017eji.\u00a0\u010cetrta\u00a0generacija\u00a0(4G\u00a0ali\u00a0LTE)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0med\u00a0drugimi\u00a0uvedla\u00a0Tuak, novo\u00a0dru\u017eino\u00a0algoritmov.\u00a0 5G, PRIHODNOST\u00a0IN HITROST\u00a0 Peta\u00a0generacija\u00a0(5G\u00a0ali\u00a0NR)\u00a0uporablja\u00a0enake\u00a0algoritme\u00a0kot\u00a04G,\u00a0saj\u00a0omogo\u010dajo\u00a0dovolj\u00a0visoko\u00a0varnost.\u00a0Te\u017eava\u00a0je, da\u00a0trenutno\u00a0uporabljeni\u00a0algoritmi\u00a0niso\u00a0primerni\u00a0za\u00a0prihodnje\u00a0zahteve.\u00a0\u010ceprav\u00a0hitrost\u00a0\u0161e\u00a0zado\u0161\u010da\u00a0za\u00a0omre\u017eje\u00a05G, se\u00a0strokovnjaki\u00a0strinjajo, da\u00a0ne\u00a0bodo\u00a0primerni\u00a0za 6G\u00a0omre\u017eje\u00a0prihodnosti,\u00a0saj\u00a0mobilna\u00a0omre\u017eja\u00a0zahtevajo\u00a0najvi\u0161je\u00a0varnostne\u00a0standarde.\u00a0 Algoritmi\u00a0za\u00a05G in 6G\u00a0bodo\u00a0zelo\u00a0verjetno\u00a0podpirali\u00a0256-bitno\u00a0ali\u00a0dalj\u0161o\u00a0dol\u017eino\u00a0klju\u010da.\u00a0\u010ceprav\u00a0128-bitni\u00a0algoritmi\u00a0v\u00a0praksi\u00a0\u0161\u010ditijo\u00a0pred\u00a0kvantnimi\u00a0ra\u010dunalniki,\u00a0\u017ee\u00a0danes\u00a0vlade\u00a0in\u00a0finan\u010dne\u00a0institucije\u00a0vse\u00a0ve\u010dkrat\u00a0zahtevajo\u00a0vi\u0161jo\u00a0varnostno\u00a0stopnjo\u00a0za\u00a0za\u0161\u010dito\u00a0svojih\u00a0komunikacij.\u00a0Tudi\u00a0najbolj\u00a0varni\u00a0algoritem\u00a0\u0161ifriranja\u00a0postane\u00a0ranljiv\u00a0za\u00a0napade,\u00a0\u010de\u00a0uporablja\u00a0nezadostno\u00a0bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0 V\u00a0preteklosti\u00a0so\u00a0bili\u00a0zlomi\u00a0algoritmov\u00a0dokaj\u00a0pogosti,\u00a0vendar\u00a0pa [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/\" \/>\n<meta property=\"og:site_name\" content=\"Domen Zavrl\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-28T14:53:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T15:29:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.domenzavrl.com\/wp-content\/uploads\/2021\/08\/KRIPTOGRAFIJE-V-MOBILNIH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Domen Zavrl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Domen Zavrl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/\",\"url\":\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/\",\"name\":\"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl\",\"isPartOf\":{\"@id\":\"https:\/\/www.domenzavrl.com\/#website\"},\"datePublished\":\"2021-09-28T14:53:34+00:00\",\"dateModified\":\"2021-09-14T15:29:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.domenzavrl.com\/#\/schema\/person\/1ac60ee7b0ba43c5f323a937b550a45c\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/#breadcrumb\"},\"inLanguage\":\"sl-SI\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.domenzavrl.com\/sl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.domenzavrl.com\/#website\",\"url\":\"https:\/\/www.domenzavrl.com\/\",\"name\":\"Domen Zavrl\",\"description\":\"International Businessman\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.domenzavrl.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"sl-SI\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.domenzavrl.com\/#\/schema\/person\/1ac60ee7b0ba43c5f323a937b550a45c\",\"name\":\"Domen Zavrl\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\/\/www.domenzavrl.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.domenzavrl.com\/wp-content\/litespeed\/avatar\/7b5d36e0623b6ed25632f4c0b3b606e1.jpg?ver=1775638007\",\"contentUrl\":\"https:\/\/www.domenzavrl.com\/wp-content\/litespeed\/avatar\/7b5d36e0623b6ed25632f4c0b3b606e1.jpg?ver=1775638007\",\"caption\":\"Domen Zavrl\"},\"url\":\"https:\/\/www.domenzavrl.com\/sl\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/","og_locale":"sl_SI","og_type":"article","og_title":"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl","og_description":"V\u00a0dana\u0161njem\u00a0svetu\u00a0se\u00a0vsem\u00a0zdi\u00a0samoumevno, da\u00a0svoje\u00a0hi\u0161e,\u00a0avtomobile\u00a0in\u00a0drugo\u00a0premo\u017eenje\u00a0zavarujemo\u00a0s\u00a0klju\u010di\u00a0in\u00a0klju\u010davnicami. Z\u00a0razvojem\u00a0tehnologije\u00a0in\u00a0pospe\u0161eno\u00a0digitalizacijo\u00a0je\u00a0vsak\u00a0dan\u00a0bolj\u00a0pomembno\u00a0tudi\u00a0varovanje\u00a0na\u0161ih\u00a0podatkov\u00a0in\u00a0komunikacije. V\u00a0obeh\u00a0primerih\u00a0bolj\u00a0ali\u00a0manj\u00a0uspe\u0161no\u00a0prepre\u010dimo\u00a0dostop\u00a0do\u00a0lastnine\u00a0nepoobla\u0161\u010denim\u00a0osebam\u00a0brez\u00a0veljavnega\u00a0klju\u010da.\u00a0V\u00a0kibernetskem\u00a0svetu\u00a0uporabljamo\u00a0za\u00a0varno\u00a0komunikacijo\u00a0algoritme\u00a0in\u00a0varnostne\u00a0protokole, ki\u00a0temeljijo\u00a0na\u00a0zapletenih\u00a0matemati\u010dnih\u00a0problemih\u00a0in\u00a0izra\u010dunih.\u00a0Cilj\u00a0kriptografije\u00a0je\u00a0zagotoviti\u00a0zaupnost\u00a0in\u00a0celovitost\u00a0podatkov\u00a0ter\u00a0integriteto,\u00a0tudi\u00a0v\u00a0primeru\u00a0zlonamernega\u00a0napada\u00a0na\u00a0sistem.\u00a0Zaupnost\u00a0pomeni\u00a0zagotavljanje\u00a0zasebnosti\u00a0z\u00a0uporabo\u00a0\u0161ifriranja\u00a0podatkov.\u00a0Celovitost\u00a0podatkov\u00a0pomeni\u00a0nedotakljivost\u00a0in\u00a0razkrivanje\u00a0nepoobla\u0161\u010denega\u00a0dostopa\u00a0ali\u00a0celo\u00a0spreminjanja\u00a0podatkov.\u00a0Pristnost\u00a0nam\u00a0zagotavlja, da\u00a0podatki\u00a0prihajajo\u00a0od\u00a0zaupanja\u00a0vrednega,\u00a0avtenti\u010dnega\u00a0vira.\u00a0 Mobilna\u00a0omre\u017eja\u00a0so\u00a0kriti\u010dna\u00a0infrastruktura\u00a0in\u00a0mo\u010dni\u00a0kriptografski\u00a0algoritmi\u00a0uporabnikom\u00a0zagotavljajo\u00a0varnost\u00a0informacij\u00a0in\u00a0za\u0161\u010dito\u00a0zasebnosti.\u00a0Kriptografski\u00a0algoritmi\u00a0in\u00a0protokoli\u00a0v\u00a0mobilnih\u00a0komunikacijah\u00a0so\u00a0prehodili\u00a0dolgo\u00a0pot od\u00a0mobilnih\u00a0omre\u017eij\u00a0generacije\u00a02G do\u00a0zadnje\u00a05G\u00a0generacije.\u00a0Specifikacije\u00a0kriptografskih\u00a0algoritmov\u00a0za\u00a0uporabo\u00a0v\u00a0mobilnih\u00a0omre\u017ejih\u00a0so\u00a0nepregledno\u00a0razpr\u0161ene\u00a0po\u00a0\u0161tevilnih\u00a0dokumentih, ki so\u00a0jih\u00a0v\u00a0zadnjih\u00a030\u00a0letih\u00a0objavile\u00a0tri\u00a0organizacije\u00a0za\u00a0standardizacijo: 3GPP, ETSI in GSMA.\u00a0 2G &#8211;\u00a0ROJSTVO KRIPTOGRAFSKE VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Mobilna\u00a0omre\u017eja\u00a0druge\u00a0generacije\u00a0(2G\u00a0ali\u00a0GSM)\u00a0so\u00a0omogo\u010dala\u00a0po\u00a0dana\u0161njih\u00a0standardih\u00a0sorazmerno\u00a0nizko\u00a0varnost.\u00a0Vendar\u00a0pa je\u00a0bil\u00a0GSM\u00a0prvi\u00a0komunikacijski\u00a0sistem\u00a0za\u00a0mno\u017ei\u010dni\u00a0trg, ki je\u00a0uporabljal\u00a0kriptografijo.\u00a0\u0160ifrirna\u00a0algoritma\u00a0A5\/1 in A5\/2\u00a0sta\u00a0\u0161ifrirala\u00a0podatke\u00a0s\u00a064-bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0Sledili\u00a0so\u00a0algoritmi\u00a0COMP128 in\u00a0kasneje\u00a0GEA.\u00a0\u00a0 3G\u00a0IN 4G\u00a0&#8211;\u00a0DVIG VARNOSTI MOBILNIH OMRE\u017dIJ\u00a0 Tretja\u00a0generacija\u00a0(3G\u00a0ali\u00a0UMTS)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0uvedla\u00a0128-bitne\u00a0algoritme\u00a0za\u00a0\u0161ifriranje\u00a0in\u00a0varovanje\u00a0integritete.\u00a0Za\u00a03G je\u00a0algoritme\u00a0izbrala\u00a0skupina\u00a0strokovnjakov\u00a0za\u00a0varnostne\u00a0algoritme\u00a0ETSI (SAGE), ki je od\u00a0od\u00a0takrat\u00a0izdajala\u00a0tudi\u00a0priporo\u010dila\u00a0za\u00a0vse\u00a0naslednje\u00a0algoritme\u00a0v\u00a0mobilnih\u00a0omre\u017ejih.\u00a0Algoritmi\u00a03G\u00a0mobilnih\u00a0omre\u017eij\u00a0\u0161e\u00a0danes\u00a0veljajo\u00a0za\u00a0zadovoljivo\u00a0varne.\u00a0Predstavnika\u00a0sta\u00a0UEA1, UEA2,\u00a03GPP\u00a0pa je\u00a0definiral\u00a0tudi\u00a0dobro\u00a0zasnovan\u00a0algoritem\u00a0Milenage, ki\u00a0se\u00a0pogosto\u00a0uporablja\u00a0v\u00a0praksi.\u00a0Vsi\u00a03G\u00a0algoritmi\u00a0so\u00a0bili\u00a0kompatibilni\u00a0navzdol\u00a0z\u00a02G\u00a0omre\u017eji.\u00a0\u010cetrta\u00a0generacija\u00a0(4G\u00a0ali\u00a0LTE)\u00a0mobilnih\u00a0omre\u017eij\u00a0je\u00a0med\u00a0drugimi\u00a0uvedla\u00a0Tuak, novo\u00a0dru\u017eino\u00a0algoritmov.\u00a0 5G, PRIHODNOST\u00a0IN HITROST\u00a0 Peta\u00a0generacija\u00a0(5G\u00a0ali\u00a0NR)\u00a0uporablja\u00a0enake\u00a0algoritme\u00a0kot\u00a04G,\u00a0saj\u00a0omogo\u010dajo\u00a0dovolj\u00a0visoko\u00a0varnost.\u00a0Te\u017eava\u00a0je, da\u00a0trenutno\u00a0uporabljeni\u00a0algoritmi\u00a0niso\u00a0primerni\u00a0za\u00a0prihodnje\u00a0zahteve.\u00a0\u010ceprav\u00a0hitrost\u00a0\u0161e\u00a0zado\u0161\u010da\u00a0za\u00a0omre\u017eje\u00a05G, se\u00a0strokovnjaki\u00a0strinjajo, da\u00a0ne\u00a0bodo\u00a0primerni\u00a0za 6G\u00a0omre\u017eje\u00a0prihodnosti,\u00a0saj\u00a0mobilna\u00a0omre\u017eja\u00a0zahtevajo\u00a0najvi\u0161je\u00a0varnostne\u00a0standarde.\u00a0 Algoritmi\u00a0za\u00a05G in 6G\u00a0bodo\u00a0zelo\u00a0verjetno\u00a0podpirali\u00a0256-bitno\u00a0ali\u00a0dalj\u0161o\u00a0dol\u017eino\u00a0klju\u010da.\u00a0\u010ceprav\u00a0128-bitni\u00a0algoritmi\u00a0v\u00a0praksi\u00a0\u0161\u010ditijo\u00a0pred\u00a0kvantnimi\u00a0ra\u010dunalniki,\u00a0\u017ee\u00a0danes\u00a0vlade\u00a0in\u00a0finan\u010dne\u00a0institucije\u00a0vse\u00a0ve\u010dkrat\u00a0zahtevajo\u00a0vi\u0161jo\u00a0varnostno\u00a0stopnjo\u00a0za\u00a0za\u0161\u010dito\u00a0svojih\u00a0komunikacij.\u00a0Tudi\u00a0najbolj\u00a0varni\u00a0algoritem\u00a0\u0161ifriranja\u00a0postane\u00a0ranljiv\u00a0za\u00a0napade,\u00a0\u010de\u00a0uporablja\u00a0nezadostno\u00a0bitno\u00a0dol\u017eino\u00a0klju\u010da.\u00a0 V\u00a0preteklosti\u00a0so\u00a0bili\u00a0zlomi\u00a0algoritmov\u00a0dokaj\u00a0pogosti,\u00a0vendar\u00a0pa [&hellip;]","og_url":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/","og_site_name":"Domen Zavrl","article_published_time":"2021-09-28T14:53:34+00:00","article_modified_time":"2021-09-14T15:29:56+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.domenzavrl.com\/wp-content\/uploads\/2021\/08\/KRIPTOGRAFIJE-V-MOBILNIH.jpg","type":"image\/jpeg"}],"author":"Domen Zavrl","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Domen Zavrl","Est. reading time":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/","url":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/","name":"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH - Domen Zavrl","isPartOf":{"@id":"https:\/\/www.domenzavrl.com\/#website"},"datePublished":"2021-09-28T14:53:34+00:00","dateModified":"2021-09-14T15:29:56+00:00","author":{"@id":"https:\/\/www.domenzavrl.com\/#\/schema\/person\/1ac60ee7b0ba43c5f323a937b550a45c"},"breadcrumb":{"@id":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/#breadcrumb"},"inLanguage":"sl-SI","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.domenzavrl.com\/sl\/evolucija-kriptografije-v-mobilnih-omrezjih\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.domenzavrl.com\/sl\/"},{"@type":"ListItem","position":2,"name":"EVOLUCIJA KRIPTOGRAFIJE V MOBILNIH OMRE\u017dJIH"}]},{"@type":"WebSite","@id":"https:\/\/www.domenzavrl.com\/#website","url":"https:\/\/www.domenzavrl.com\/","name":"Domen Zavrl","description":"International Businessman","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.domenzavrl.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"sl-SI"},{"@type":"Person","@id":"https:\/\/www.domenzavrl.com\/#\/schema\/person\/1ac60ee7b0ba43c5f323a937b550a45c","name":"Domen Zavrl","image":{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/www.domenzavrl.com\/#\/schema\/person\/image\/","url":"https:\/\/www.domenzavrl.com\/wp-content\/litespeed\/avatar\/7b5d36e0623b6ed25632f4c0b3b606e1.jpg?ver=1775638007","contentUrl":"https:\/\/www.domenzavrl.com\/wp-content\/litespeed\/avatar\/7b5d36e0623b6ed25632f4c0b3b606e1.jpg?ver=1775638007","caption":"Domen Zavrl"},"url":"https:\/\/www.domenzavrl.com\/sl\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/posts\/400"}],"collection":[{"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/comments?post=400"}],"version-history":[{"count":2,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/posts\/400\/revisions"}],"predecessor-version":[{"id":427,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/posts\/400\/revisions\/427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/media\/401"}],"wp:attachment":[{"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/media?parent=400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/categories?post=400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.domenzavrl.com\/sl\/wp-json\/wp\/v2\/tags?post=400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}