{"id":3523,"date":"2022-04-22T17:07:03","date_gmt":"2022-04-22T16:07:03","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-64\/"},"modified":"2024-02-04T23:34:34","modified_gmt":"2024-02-04T22:34:34","slug":"enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/","title":{"rendered":"Enkripcija podataka: Upravljanje klju\u010devima i nedostaci enkripcije  (Epizoda 3)"},"content":{"rendered":"<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"UPRAVLJANJE_KLJUCEVIMA\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>UPRAVLJANJE KLJU\u010cEVIMA<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ve\u0107 ranije je re\u010deno da je klju\u010d osnovni dio enkripcije, toliko da je u modernom svijetu kriptografije klju\u010d tajan, a ne algoritam. Jaki enkripcijski klju\u010devi su osmi\u0161ljeni da ako neko i poznaje algoritam, ne mo\u017ee de\u0161ifrovati podatak bez poznavanja odgovaraju\u0107eg klju\u010da. Iz ovoga se vidi, da prije nego \u0161to se primjeni \u0161ifra, po\u0161iljalac i primalac moraju da imaju <span style=\"font-size: 14pt;\">klju\u010d ili set klju\u010deva kako bi de\u0161ifrovali dokument ili informaciju. Dakle, ako postoji namjera primjene enkripcije, enkripcijski klju\u010devi su sastavni i veoma va\u017ean dio procesa i na njih treba obratiti pa\u017enju.<\/span>\u00a0<\/span><\/span><\/div>\n<div><\/div>\n<div id=\"attachment_3788\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3788\" class=\"size-full wp-image-3788\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-3-copy.jpg\" alt=\"Upravljanje klju\u010devima\" width=\"1024\" height=\"613\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-3-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-3-copy-300x180.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-3-copy-768x460.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-3-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3788\" class=\"wp-caption-text\">Upravljanje klju\u010devima i nedostaci enkripcije; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<div><\/div>\n<div><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Sadr\u017eaj<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#UPRAVLJANJE_KLJUCEVIMA\" >UPRAVLJANJE KLJU\u010cEVIMA<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Generisanje_kljuca\" >Generisanje klju\u010da<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Dijeljenje_kljuca\" >Dijeljenje klju\u010da<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Upotreba_kljuca\" >Upotreba klju\u010da<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Zamjena_kljuca\" >Zamjena klju\u010da<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#PRISTUP_UPRAVLJANJU_ENKRIPCIJSKIM_KLJUCEVIMA\" >PRISTUP UPRAVLJANJU ENKRIPCIJSKIM KLJU\u010cEVIMA<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Decentralizovan\" >Decentralizovan<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Distribuiran\" >Distribuiran<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Centralizovan\" >Centralizovan<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#PRIJETNJE_I_IZAZOVI\" >PRIJETNJE I IZAZOVI<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Slabe_kljuceve\" >Slabe klju\u010deve<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Nepravilnu_upotrebu\" >Nepravilnu upotrebu<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Reciklazu_kljuceva\" >Recikla\u017eu klju\u010deva<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Nepravilno_cuvanje\" >Nepravilno \u010duvanje<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Nepravilnu_zastitu\" >Nepravilnu za\u0161titu<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Nepravilnu_distribuciju\" >Nepravilnu distribuciju<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Sigurno_skladistenje_kljuceva\" >Sigurno skladi\u0161tenje klju\u010deva<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Pristup_kljucevima\" >Pristup klju\u010devima<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Rezervnu_kopiju_kljuca\" >Rezervnu kopiju klju\u010da<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#NEDOSTACI\" >NEDOSTACI<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Enkripcijski_kljucevi\" >Enkripcijski klju\u010devi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Cijena\" >Cijena<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Sigurnost\" >Sigurnost<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#Kompatibilnost\" >Kompatibilnost<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/22\/enkripcija-podataka-upravljanje-kljucevima-i-nedostaci-enkripcije-epizoda-3\/#ZAKLJUCAK\" >ZAKLJU\u010cAK<\/a><\/li><\/ul><\/nav><\/div>\n<\/div>\n<div><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Kada bi se tra\u017eila adekvatna analogija, enkripcijski klju\u010d bi bio \u0161ifra za sef. Bez obzira koliko je sef dobar, ako lopov zna kombinaciju za otvaranje sefa, sef vi\u0161e nije problem otvoriti. Ako je enkripcija ura\u0111ena na pravilan na\u010din, veoma je otporna na napad. Me\u0111utim, ako je klju\u010d kompromitovan, sva trud i kompleksnost su uzaludni. Stoga se mo\u017ee zaklju\u010diti da prilikom enkripcije podataka, sigurnost nije enkripcija ve\u0107 sigurno i pravilno upravljanje enkripcijskim klju\u010devima. Vrijednost enkripcijskog klju\u010da se mo\u017ee izjedna\u010diti sa najvrednijom \u0161ifriranom informacijom ili podatkom.<\/span><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Upravljanje enkripcijskim klju\u010devima po\u010dinje na korisni\u010dkom nivou izme\u0111u korisnika ili izme\u0111u korisnika i sistema. Da bi to bezbjedno funkcionisalo, mora se voditi ra\u010duna o generisanju klju\u010da, dijeljenju, upotrebi, zamjeni, i brisanju klju\u010da. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Generisanje_kljuca\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Generisanje klju\u010da<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Ovo je prvi korak orijentisan na bezbjednost klju\u010da. Ako je predmetni klju\u010d generisan sa slabim enkripcijskim algoritmom, napada\u010d mo\u017ee lako da sazna njegovu vrijednost. Tako\u0111er, ako je klju\u010d generisan na lo\u0161e \u010duvanoj lokaciji, on mo\u017ee biti kompromitovan odmah nakon \u0161to je napravljen. Stoga je prilikom generisanja klju\u010da najva\u017enije obratiti pa\u017enju na njegovu sigurnost.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Dijeljenje_kljuca\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Dijeljenje klju\u010da<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Sljede\u0107i korak u \u017eivotnom ciklusu enkripcijskog klju\u010da je njegov dijeljene sa korisnicima. Klju\u010d treba biti poslat korisnicima na siguran na\u010din koji \u0107e omogu\u0107iti njegovu sigurnu primjenu u datom okru\u017eenju. U protivnom napada\u010d mo\u017ee do\u0107i do klju\u010da presretanjem nesigurne komunikacije prilikom slanja klju\u010da. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Upotreba_kljuca\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Upotreba klju\u010da<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Nakon dobijanja klju\u010da, on se koristi za kriptografske operacije. Veoma je va\u017eno da klju\u010d bude upotrebljavan samo od strane ovla\u0161tenih korisnika kako bi se mogla izbje\u0107i zloupotreba, kopiranje i sli\u010dno. Kada se klju\u010d iskoristi za \u0161ifrovanje, on mora biti spremljen da se kasnije upotrijebi za de\u0161ifrovanje. <\/span><\/p>\n<div id=\"attachment_3781\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3781\" class=\"size-full wp-image-3781\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cyber-gd37b2ecef_1920-copy.jpg\" alt=\"Security\" width=\"1024\" height=\"614\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cyber-gd37b2ecef_1920-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cyber-gd37b2ecef_1920-copy-300x180.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cyber-gd37b2ecef_1920-copy-768x461.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cyber-gd37b2ecef_1920-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3781\" class=\"wp-caption-text\"><em>Security protection<\/em>; Source: <a href=\"https:\/\/pixabay.com\/images\/id-4502913\/\" target=\"_blank\" rel=\"noopener\"><em>Pixabay<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Zamjena_kljuca\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Zamjena klju\u010da<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Jednom kada period va\u017eenja klju\u010da isteke, klju\u010d se mora zamijeniti. Prvo je potrebno izvr\u0161iti de\u0161ifrovanje podataka sa starim klju\u010dem, a onda izvr\u0161iti \u0161ifrovanje sa novim. Zamjena klju\u010da je neophodna zato \u0161to sa du\u017eom upotrebom klju\u010da rastu \u0161anse da neko ukrade klju\u010d ili sazna njegovu vrijednost. Do zamjene klju\u010da dolazi obi\u010dno prije nego \u0161to njegov period va\u017eenja isteke. A u slu\u010daju da se posumnja da je klju\u010d kompromitovan, on se tada opoziva ili uni\u0161tava.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"PRISTUP_UPRAVLJANJU_ENKRIPCIJSKIM_KLJUCEVIMA\"><\/span><span style=\"font-size: 14pt;\"><strong><span style=\"font-family: inherit;\">PRISTUP UPRAVLJANJU ENKRIPCIJSKIM KLJU\u010cEVIMA<\/span><\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Kako bi klju\u010deve za\u0161titili od gubitak i kra\u0111e imamo tri pristupa upravljanju enkripcijskim klju\u010devima:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Decentralizovan\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Decentralizovan<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">U ovom slu\u010daju potpuna odgovornost za enkripcijski klju\u010d je na korisniku i nema nadzora od strane organizacije.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Distribuiran\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Distribuiran<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">U ovom slu\u010daju svaki tim ili odjeljenje organizacije upravlja svojim klju\u010devima u skladu sa njihovim procesima i pravilima. Mo\u017ee, ali ne mora postojati koordinacija izme\u0111u drugih odjeljenja organizacije.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Centralizovan\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Centralizovan<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Ovaj pristup podrazumijeva postojanje jednog jedinstvenog seta pravila za upravljanje enkripcijskim klju\u010devima na nivou \u010ditave organizacije. Svaki korisnik, tim ili odjeljenje organizacije po\u0161tuju ista pravila upravljanja enkripcijskim klju\u010devima. <\/span><\/p>\n<div id=\"attachment_3783\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3783\" class=\"size-full wp-image-3783\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy.jpg\" alt=\"AES encryption crackdown\" width=\"1024\" height=\"1020\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy-300x300.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy-150x150.jpg 150w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy-768x765.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy-12x12.jpg 12w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy-80x80.jpg 80w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/aes-copy-320x320.jpg 320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3783\" class=\"wp-caption-text\">Razbijanje 256-bit <em>AES<\/em> klju\u010da; Redesign by Sa\u0161a \u0110uri\u0107 &#8211; Source: <a href=\"https:\/\/www.universetoday.com\/12648\/will-earth-survive-when-the-sun-becomes-a-red-giant\/\" target=\"_blank\" rel=\"noopener\"><em>Universe Today<\/em><\/a>; <a href=\"https:\/\/www.eetimes.com\/how-secure-is-aes-against-brute-force-attacks\/\" target=\"_blank\" rel=\"noopener\"><em>EETimes<\/em><\/a>; <em>Wikipedia<\/em><\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><!-- [if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:TrackMoves\/>  <w:TrackFormatting\/>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:DoNotPromoteQF\/>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>   <w:SplitPgBreakAndParaMark\/>   <w:EnableOpenTypeKerning\/>   <w:DontFlipMirrorIndents\/>   <w:OverrideTableStyleHps\/>   <w:UseFELayout\/>  <\/w:Compatibility>  <w:DoNotOptimizeForBrowser\/>  <m:mathPr>   <m:mathFont m_val=\"Cambria Math\"\/>   <m:brkBin m_val=\"before\"\/>   <m:brkBinSub m_val=\"&#45;-\"\/>   <m:smallFrac m_val=\"off\"\/>   <m:dispDef\/>   <m:lMargin m_val=\"0\"\/>   <m:rMargin m_val=\"0\"\/>   <m:defJc m_val=\"centerGroup\"\/>   <m:wrapIndent m_val=\"1440\"\/>   <m:intLim m_val=\"subSup\"\/>   <m:naryLim m_val=\"undOvr\"\/>  <\/m:mathPr><\/w:WordDocument><\/xml><![endif]--><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><!-- [if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" DefUnhideWhenUsed=\"false\" DefSemiHidden=\"false\" DefQFormat=\"false\" DefPriority=\"99\" LatentStyleCount=\"371\">  <w:LsdException Locked=\"false\" Priority=\"0\" QFormat=\"true\" Name=\"Normal\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 9\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 6\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 7\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 8\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index 9\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toc 9\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Normal Indent\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"footnote text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"annotation text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"header\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"footer\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"index heading\"\/>  <w:LsdException Locked=\"false\" Priority=\"35\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"caption\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"table of figures\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"envelope address\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"envelope return\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"footnote reference\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"annotation reference\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"line number\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"page number\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"endnote reference\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"endnote text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"table of authorities\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"macro\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"toa heading\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Bullet 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Number 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"10\" QFormat=\"true\" Name=\"Title\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Closing\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Signature\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Default Paragraph Font\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text Indent\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"List Continue 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Message Header\"\/>  <w:LsdException Locked=\"false\" Priority=\"11\" QFormat=\"true\" Name=\"Subtitle\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Salutation\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Date\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text First Indent\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text First Indent 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Note Heading\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text Indent 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Body Text Indent 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Block Text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Hyperlink\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"FollowedHyperlink\"\/>  <w:LsdException Locked=\"false\" Priority=\"22\" QFormat=\"true\" Name=\"Strong\"\/>  <w:LsdException Locked=\"false\" Priority=\"20\" QFormat=\"true\" Name=\"Emphasis\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Document Map\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Plain Text\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"E-mail Signature\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Top of Form\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Bottom of Form\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Normal (Web)\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Acronym\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Address\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Cite\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Code\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Definition\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Keyboard\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Preformatted\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Sample\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Typewriter\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"HTML Variable\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Normal Table\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"annotation subject\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"No List\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Outline List 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Outline List 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Outline List 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Simple 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Simple 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Simple 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Classic 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Colorful 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Colorful 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Colorful 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Columns 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 6\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 7\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Grid 8\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 4\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 5\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 6\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 7\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table List 8\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table 3D effects 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table 3D effects 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table 3D effects 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Contemporary\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Elegant\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Professional\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Subtle 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Subtle 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Web 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Web 2\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Web 3\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Balloon Text\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"Table Grid\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Table Theme\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" Name=\"Placeholder Text\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" QFormat=\"true\" Name=\"No Spacing\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" SemiHidden=\"true\" Name=\"Revision\"\/>  <w:LsdException Locked=\"false\" Priority=\"34\" QFormat=\"true\" Name=\"List Paragraph\"\/>  <w:LsdException Locked=\"false\" Priority=\"29\" QFormat=\"true\" Name=\"Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"30\" QFormat=\"true\" Name=\"Intense Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"19\" QFormat=\"true\" Name=\"Subtle Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"21\" QFormat=\"true\" Name=\"Intense Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"31\" QFormat=\"true\" Name=\"Subtle Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"32\" QFormat=\"true\" Name=\"Intense Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"33\" QFormat=\"true\" Name=\"Book Title\"\/>  <w:LsdException Locked=\"false\" Priority=\"37\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" Name=\"Bibliography\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\" UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"TOC Heading\"\/>  <w:LsdException Locked=\"false\" Priority=\"41\" Name=\"Plain Table 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"42\" Name=\"Plain Table 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"43\" Name=\"Plain Table 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"44\" Name=\"Plain Table 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"45\" Name=\"Plain Table 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"40\" Name=\"Grid Table Light\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful Accent 6\"\/> <\/w:LatentStyles><\/xml><![endif]--><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Kako bi se upravljanje enkripcijskim klju\u010devima organizacije uradilo na pravilan na\u010din, moraju se sagledati i mogu\u0107i problemi. Osnovni problem bi bio gubitak klju\u010da, \u0161to automatski vodi do gubitka pristupa sistemu i podacima. Pored toga, upravljanje enkripcijskim klju\u010devima se komplikuje sa porastom i kompleksno\u0161\u0107u okru\u017eenja, a to donosi nove prijetnje i izazove. Najve\u0107a prijetnja je kompromitovanje enkripcijskog klju\u010da, \u0161to korisnik ne\u0107e znati dok ne bude kasno \u2013 odnosno dok ga napada\u010d ne iskoristi. <\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"PRIJETNJE_I_IZAZOVI\"><\/span><span style=\"font-size: 14pt;\"><strong><span style=\"font-family: inherit;\">PRIJETNJE I IZAZOV<\/span><span style=\"font-family: inherit;\">I<\/span><\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Pored toga, potrebno je jo\u0161 obratiti pa\u017enju i na:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Slabe_kljuceve\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Slabe klju\u010deve<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Du\u017eina klju\u010da bi trebala da ima kompleksnost koja odgovara vrijednosti podataka koje \u010duva i periodu vremena za koje se podaci \u0161tite.<\/span><span style=\"font-family: inherit; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Nepravilnu_upotrebu\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Nepravilnu upotrebu<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Jedan klju\u010d bi trebalo da bude generisan samo za jednu odre\u0111enu namjenu ili odre\u0111eni zadatak.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Reciklazu_kljuceva\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Recikla\u017eu klju\u010deva<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Ponovna upotreba jednog klju\u010da za neke druge svrhe mo\u017ee biti opasna i mo\u017ee opasno ugroziti organizaciju.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Nepravilno_cuvanje\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Nepravilno \u010duvanje<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Ovo je veoma va\u017eno, klju\u010d nikada ne bi trebalo da bude \u010duvan zajedno sa podacima koji se \u0161tite.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Nepravilnu_zastitu\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Nepravilnu za\u0161titu<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Enkripcijski klju\u010devi bi trebali biti \u0161ifrovani bilo gdje da su uskladi\u0161teni i dostupni smo u svom izvornom obliku u za\u0161ti\u0107enom okru\u017eenju.<\/span><span style=\"font-family: inherit; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Nepravilnu_distribuciju\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Nepravilnu distribuciju<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Veoma je va\u017eno kako se klju\u010devi kre\u0107u izme\u0111u sistema, pa bi kretanje klju\u010deva trebalo da bude za\u0161ti\u0107eno enkripcijom.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">U praksi se pokazalo da je nabolje obratiti pa\u017enju na:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Sigurno_skladistenje_kljuceva\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Sigurno skladi\u0161tenje klju\u010deva<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Enkripcijski klju\u010devi moraju biti za\u0161ti\u0107eni sa kompleksnim klju\u010dem da bi se postigla optimalna sigurnost \u2013 isto kao i sa drugim povjerljivim podacima. Nivo za\u0161tite mora biti isti bilo da se radi o skladi\u0161tenju, prenosu ili rezervnoj kopiji. Nepravilno skladi\u0161tenje klju\u010da mo\u017ee dovesti do gubitka svih podataka.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Pristup_kljucevima\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Pristup klju\u010devima<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Pristup enkripcijskim klju\u010devima mora biti ograni\u010den samo na korisnike koji moraju da ih koriste. Trebalo bi omogu\u0107iti primjenu pravila po kojem korisnik koji koristi klju\u010d nije korisnik koji skladi\u0161ti klju\u010d.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Rezervnu_kopiju_kljuca\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Rezervnu kopiju klju\u010da<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Gubitak enkripcijskog klju\u010da direktno zna\u010di i gubitak podatka koji se \u0161tite. Slu\u010dajan gubitak klju\u010da mo\u017ee biti poguban za poslovanje organizacije, pa je potrebna primjena alata za rezervnu kopiju i oporavak.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Zaklju\u010dak je dakle da, sigurnost enkripcijskih klju\u010deva treba biti upravljana na nivou svake pojedine organizacije ili nekog vjerodostojnog servisa. Pristup povjerljivim podacima\u00a0 ne treba biti dostupan svima, ve\u0107 ograni\u010den samo na one kojima je to potrebno da bi obavljali posao. Nu\u017eno je i postojanje tima za nadzor koji \u0107e pratiti aktivnosti pristupa povjerljivim podacima kako bi se smanjila \u0161ansa za kompromitovanje podataka. Tako\u0111er, povezivanje kriptografskih operacija i upravljanja enkripcijskim klju\u010devima sa sistemima za identifikaciju mo\u017ee omogu\u0107iti organizacijama veoma fleksibilnu integraciju ove tehnologije u njihov radni proces.<\/span><\/p>\n<div id=\"attachment_3784\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3784\" class=\"size-full wp-image-3784\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/pexels-wiredsmart-3868576-copy.jpg\" alt=\"Key Safety\" width=\"1024\" height=\"576\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/pexels-wiredsmart-3868576-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/pexels-wiredsmart-3868576-copy-300x169.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/pexels-wiredsmart-3868576-copy-768x432.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/pexels-wiredsmart-3868576-copy-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3784\" class=\"wp-caption-text\">Photo by <a href=\"https:\/\/www.pexels.com\/@wiredsmart-1957615?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\" target=\"_blank\" rel=\"noopener\"><em>Wiredsmart<\/em><\/a> from <a href=\"https:\/\/www.pexels.com\/photo\/keys-on-marble-surface-3868576\/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\" target=\"_blank\" rel=\"noopener\"><em>Pexels<\/em><\/a><\/p><\/div>\n<h2 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"NEDOSTACI\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>NEDOSTACI<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Enkripcija je veoma efektivan na\u010din \u010duvanja podataka, me\u0111utim iako je dizajnirana da sprije\u010di neovla\u0161tene osobe da pristupaju podacima, u nekim situacijama enkripcija mo\u017ee onemogu\u0107iti i vlasnika podataka da pristupi istim. Tako da se kao nedostaci enkripcije mogu navesti:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Enkripcijski_kljucevi\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Enkripcijski klju\u010devi<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Ovo je veoma ozbiljan zadatak za <em>IT<\/em> profesionalce u organizacijama. Sa pove\u0107anjem broja enkripcijskih pojavljuje se problem njihovog upravljanja i pove\u0107ava se rizik od gubitka. Jednom izgubljen enkripcijski klju\u010d je jednak i gubitku podataka na koje se primjenjuje.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Cijena\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Cijena<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Enkripcija se u odre\u0111enim situacijama mo\u017ee pokazati veoma skupa, jer su tu zahtjevi za nadogradnjom i odr\u017eavanjem. Bez odgovaraju\u0107ih sistema, mo\u017ee do\u0107i do usporavanja redovnih procesa koji su obuhva\u0107eni enkripcijom.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Sigurnost\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Sigurnost<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Najva\u017enija stvar prilikom primjene enkripcije je primjena jakih kompleksnih\u00a0 klju\u010deva. Enkripcija je sigurna i bezbjedna koliko i klju\u010d koji se koristi za de\u0161ifrovanje.<\/span><\/p>\n<div id=\"attachment_3785\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3785\" class=\"size-full wp-image-3785\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cryptography-g04b8926a0_1920-copy.jpg\" alt=\"Cryptography\" width=\"1024\" height=\"724\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cryptography-g04b8926a0_1920-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cryptography-g04b8926a0_1920-copy-300x212.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cryptography-g04b8926a0_1920-copy-768x543.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/cryptography-g04b8926a0_1920-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3785\" class=\"wp-caption-text\"><em>Cryptography, encryption<\/em>, privacy; Source: <a href=\"https:\/\/pixabay.com\/images\/id-1091254\/\" target=\"_blank\" rel=\"noopener\"><em>Pixabay<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Kompatibilnost\"><\/span><span style=\"font-family: inherit; font-size: 14pt;\"><strong>Kompatibilnost<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\">Tehnologija enkripcije podataka \u010desto mo\u017ee biti nezgodna za primjenu sa postoje\u0107im sistemima i aplikacijama. Ovo mo\u017ee imati negativan uticaj na redovne procese organizacije.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"ZAKLJUCAK\"><\/span><strong><span style=\"font-size: 14pt;\">ZAKLJU\u010cAK<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-family: inherit; font-size: 14pt;\"> Dugoro\u010dno gledano, enkripciju treba ili ne treba koristiti u zavisnosti od slu\u010daja do slu\u010daja. Ono \u0161to je ipak o\u010digledno i pored navedenih nedostataka je to da je enkripcija tehnologija koja se koristi i koja \u0107e se koristiti.<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 50%; text-align: center; vertical-align: middle;\">\n<p><div id=\"attachment_3795\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/2022\/04\/10\/enkripcija-podataka-funkcionisanje-i-vrste-epizoda-2\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3795\" class=\"wp-image-3795 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-300x191.jpg\" alt=\"Encryption types and funcionality\" width=\"300\" height=\"191\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-300x191.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-768x489.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-18x12.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3795\" class=\"wp-caption-text\">Enkripcija podataka: Funkcionisanje i vrste (Epizoda 2)<\/p><\/div><\/td>\n<td style=\"width: 50%; text-align: center; vertical-align: middle;\">\n<p><div id=\"attachment_3869\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/2022\/06\/09\/enkripcija-podataka-hes-funkcija-epizoda-4\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3869\" class=\"wp-image-3869 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/06\/enkripcija-4-300x180.jpg\" alt=\"Hash function\" width=\"300\" height=\"180\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/06\/enkripcija-4-300x180.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/06\/enkripcija-4-768x460.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/06\/enkripcija-4-18x12.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/06\/enkripcija-4.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3869\" class=\"wp-caption-text\">Enkripcija podataka: He\u0161 funkcija (Epizoda 4)<\/p><\/div><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>UPRAVLJANJE KLJU\u010cEVIMA Ve\u0107 ranije je re\u010deno da je klju\u010d osnovni dio enkripcije, toliko da je u modernom svijetu kriptografije klju\u010d tajan, a ne algoritam. Jaki enkripcijski klju\u010devi su osmi\u0161ljeni da ako neko i poznaje&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3788,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[211,212,210,54],"class_list":["post-3523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-info","tag-encryption","tag-enkripcija","tag-podaci","tag-sajber-bezbjednost"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3523"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3523\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3788"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}