{"id":3530,"date":"2022-03-20T18:16:03","date_gmt":"2022-03-20T17:16:03","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-71\/"},"modified":"2024-02-04T22:26:05","modified_gmt":"2024-02-04T21:26:05","slug":"enkripcija-podataka-istorija-i-osnove-epizoda-1","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/","title":{"rendered":"Enkripcija podataka: Istorija i osnove (Epizoda 1)"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: left;\"><!-- [if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:TrackMoves\/>  <w:TrackFormatting\/>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:DoNotPromoteQF\/>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>   <w:SplitPgBreakAndParaMark\/>   <w:EnableOpenTypeKerning\/>   <w:DontFlipMirrorIndents\/>   <w:OverrideTableStyleHps\/>   <w:UseFELayout\/>  <\/w:Compatibility>  <w:DoNotOptimizeForBrowser\/>  <m:mathPr>   <m:mathFont m_val=\"Cambria Math\"\/>   <m:brkBin m_val=\"before\"\/>   <m:brkBinSub m_val=\"&#45;-\"\/>   <m:smallFrac m_val=\"off\"\/>   <m:dispDef\/>   <m:lMargin m_val=\"0\"\/>   <m:rMargin m_val=\"0\"\/>   <m:defJc m_val=\"centerGroup\"\/>   <m:wrapIndent m_val=\"1440\"\/>   <m:intLim m_val=\"subSup\"\/>   <m:naryLim m_val=\"undOvr\"\/>  <\/m:mathPr><\/w:WordDocument><\/xml><![endif]--><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Enkripcija u sajber prostoru je moderna forma kriptografije koja omogu\u0107ava korisniku da sakrije informacije od drugih. Po definiciji enkripcija je kriptografska transformacija podataka u formu koja sakriva originalno zna\u010denje podatka na na\u010din da spre\u010dava spoznaju ili kori\u0161tenje. Jednostavnije re\u010deno, enkripcija koristi kompleksan algoritam \u2013 \u0161ifru da pretvori obi\u010dne podatke u seriju nepovezanih proizvoljnih znakova koji se ne mogu pro\u010ditati bez specijalnog klju\u010da za de\u0161ifrovanje. Onaj ko ima klju\u010d i primjeni ga, mo\u017ee ponovo da vidi obi\u010dne podatke umjesto besmislenog niza proizvoljnih znakova.<\/span><\/span><\/p>\n<div id=\"attachment_3829\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3829\" class=\"size-full wp-image-3829\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enkripcija-copy.jpg\" alt=\"Encryption\" width=\"1024\" height=\"650\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enkripcija-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enkripcija-copy-300x190.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enkripcija-copy-768x488.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enkripcija-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3829\" class=\"wp-caption-text\">Enkripcija; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Sadr\u017eaj<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#ISTORIJA\" >ISTORIJA<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Drevni_Egipat\" >Drevni Egipat<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Grcka\" >Gr\u010dka<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Julije_Cezar\" >Julije Cezar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Dzefersonov_disk\" >D\u017eefersonov disk<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Cokto_i_Navaho_sifranti\" >\u010cokto i Navaho \u0161ifranti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Enigma\" >Enigma<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#SIGABA\" >SIGABA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Moderna_kriptografija\" >Moderna kriptografija<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#OSNOVE\" >OSNOVE<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Povjerljivosti\" >Povjerljivosti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Integritet\" >Integritet<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/20\/enkripcija-podataka-istorija-i-osnove-epizoda-1\/#Dostupnost\" >Dostupnost<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<h2 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"ISTORIJA\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>ISTORIJA<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Jedna od najstarijih nau\u010dnih formi je enkripcija. Od preistorijskih vremena do modernog doba ljude zaokuplja \u017eelja da sakriju, maskiraju ili za\u0161tite osjetljive informacije od radoznalih o\u010diju. Ovo se jednostavno postizalo zamjenom znakova u originalnoj poruci dogovorenoj ranije izme\u0111u po\u0161iljaoca i primaoca. Na ovaj na\u010din, poruku je mogao pro\u010ditati samo primalac koji ima pravi klju\u010d za otkrivanje pravilnog rasporeda znakova kako bi postali \u010ditljivi. Sad je lako zaklju\u010diti da problem nije bio u kompleksnosti \u0161ifre koja se koristila nego u sigurnosti i tajnosti klju\u010da za dekripciju. Istorijski gledano to izgleda ovako:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Drevni_Egipat\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Drevni Egipat<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Postoji nekoliko scenarija po kojima je enkripcija nastala, ali sa sigurno\u0161\u0107u se mo\u017ee re\u0107i da je nastala u drevnom Egiptu. Jedan od razloga bi mogla biti potreba egipatskih sve\u0161tenika da u tajnosti sa\u010duvaju svoje religijske rituale ili da bi dali svojim dokumentima zvani\u010dni izgled. Skoro prije 4000 godina, egipatski pisar u \u017eelji da sa\u010duva pri\u010du o \u017eivotu svoga gospodara, zapisao istu u hijeroglifima i tako napravio prvu formu kriptografije. Poslije njega, egipatski plemi\u0107 je prilikom izgradnje grobnice za faraona, izvr\u0161io zamjenu simbola na pojedinim mjestima i tako neupu\u0107enim onemogu\u0107io da pro\u010ditaju zapis. Kako je civilizacija napredovala, oni su koristili tehniku zamjene pojedinih simbola, umjesto cijelog dokumenta, \u0161to je prili\u010dno primitivno, jer je pa\u017eljiv posmatra\u010d to mogao lako otkriti.<\/span><\/span><\/p>\n<div id=\"attachment_3832\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3832\" class=\"size-full wp-image-3832\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hijeroglifi-c2.jpg\" alt=\"Hieroglyphs\" width=\"1024\" height=\"164\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hijeroglifi-c2.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hijeroglifi-c2-300x48.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hijeroglifi-c2-768x123.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/hijeroglifi-c2-18x3.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3832\" class=\"wp-caption-text\">Hijeroglifi; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Grcka\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Gr\u010dka<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">U anti\u010dkoj Gr\u010dkoj, Spartanci su prvobitno koristili \u0161ifru transpozicije ili \u0161ifru pomjeranja. U ovom slu\u010daju, elementi otvorenog teksta se ostavljaju nepromijenjeni, ali se mijenja njihov me\u0111usobni polo\u017eaj. U petom vijeku prije nove ere, Spartanci su razvili sistem pod nazivom\u00a0 Skitel (eng. <em>Scytale<\/em>) koji je bio vi\u0161e od jednostavnog pomjeranja znakova. Na\u010din funkcionisanja je bio veoma jednostavan, ali komplikovan za navedeni period. Sastojao se od trakastog komada papirusa i okruglog \u0161tapa. Po\u0161iljalac bi ispisao poruku na traci papirusa koja bi bila umotana oko \u0161tapa. Kada se odmota, znakovi jedni ispod drugih ne bi imali smisla. Primalac poruke je morao imati \u0161tap istog pre\u010dnika da oko njega umota traku papirusa kako bi se znakovi ponovo slo\u017eili u rije\u010di. Veoma primitivan na\u010din, po\u0161to je za de\u0161ifrovanje bio potreban samo \u0161tap istog pre\u010dnika, me\u0111utim u to doba je veoma mali broj ljudi znao \u010ditati i pisati.<\/span><\/span><\/p>\n<div id=\"attachment_3833\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3833\" class=\"size-full wp-image-3833\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Scytale-copy.jpg\" alt=\"Spartan's Scytale\" width=\"1024\" height=\"819\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Scytale-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Scytale-copy-300x240.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Scytale-copy-768x614.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Scytale-copy-15x12.jpg 15w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3833\" class=\"wp-caption-text\">Spartanski Skitel; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<h3 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Julije_Cezar\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Julije Cezar<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Prva upotreba enkripcija u vojne kori\u0161tena je od strane Rimljana. U svojoj potrebi da \u0161alje poruke vojsci na rati\u0161tu na sigurna na\u010din, Cezar je razvio metodu supstitucione \u0161ifre. U ovo metodi, on je jednostavno pomjeraju\u0107i raspored slova za tri mjesta onemogu\u0107io neupu\u0107enim da pro\u010ditaju poruku. Veoma jednostavan, ali i efikasan metod.<\/span><\/span><\/p>\n<div id=\"attachment_3835\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3835\" class=\"size-full wp-image-3835\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Julije-Cezar-copy.jpg\" alt=\"Caesar cipher\" width=\"1024\" height=\"582\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Julije-Cezar-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Julije-Cezar-copy-300x171.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Julije-Cezar-copy-768x437.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/Julije-Cezar-copy-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3835\" class=\"wp-caption-text\">Cezarova \u0161ifra; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Dzefersonov_disk\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>D\u017eefersonov disk<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ameri\u010dki pronalaza\u010d Tomas D\u017eeferson (<em>Thomas Jefferson<\/em>) je 1795. izmislio sistem \u0161ifriranja koji je poslije ameri\u010dka vojska koristila od 1923-1942. godine. Zanimljivo je da vojska nije znala za D\u017eefersonov sistem, ve\u0107 su ga ponovo smislili i nazvali <em>M-64<\/em>. Sistem je koristio 26 to\u010dki\u0107a sa slovima alfabeta na svakom, proizvoljno upisanih. Klju\u010d funkcionisanja je bio da to\u010dki\u0107i moraju biti u ta\u010dno odre\u0111enom polo\u017eaju oko ose rotacije da se poruka mogla de\u0161ifrovati.<\/span><\/span><\/p>\n<div id=\"attachment_3834\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3834\" class=\"size-full wp-image-3834\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/jefferson-cipher-wheel.jpg\" alt=\"Jefferson Cipher Wheel\" width=\"1024\" height=\"680\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/jefferson-cipher-wheel.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/jefferson-cipher-wheel-300x199.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/jefferson-cipher-wheel-768x510.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/jefferson-cipher-wheel-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3834\" class=\"wp-caption-text\">&#8220;<a href=\"https:\/\/www.flickr.com\/photos\/14405058@N08\/5176773952\" target=\"_blank\" rel=\"noopener\"><em>Jefferson Cipher Wheel<\/em><\/a>&#8221; by <a href=\"https:\/\/www.flickr.com\/photos\/14405058@N08\" target=\"_blank\" rel=\"noopener\"><em>Ryan Somma<\/em><\/a> is marked with <a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/?ref=openverse\" target=\"_blank\" rel=\"noopener\"><em>CC BY 2.0<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Cokto_i_Navaho_sifranti\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>\u010cokto i Navaho \u0161ifranti<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ameri\u010dka vojska je imala problem \u0161to su njihovi telefonski pozivi u Prvom svjetskom ratu bili prestretani od stane Nijemaca. Kako bi rije\u0161ili problem, ameri\u010dka vojska je iskoristila kompleksan jezik \u010cokto indijanaca. Osam pripadnika ovog plemena je bilo raspore\u0111eno na odre\u0111enim komandnim mjestima i prenosili su poruke na svom jeziku izme\u0111u njih. Nijemci nisu uspjeli nikad da de\u0161ifruju ovaj na\u010din komunikacije. Sli\u010dno se desilo i tokom Drugog svjetskog rata na pacifi\u010dkom rati\u0161tu. Problem je nastao time \u0161to su mnogi japanski oficiri zavr\u0161ili \u0161kolovanje u Americi i odli\u010dno poznavali engleski jezik. Ameri\u010dka vojska je ovaj put upotrijebila jezik Navaho indijanaca, koji japanska mornarica nije uspjela de\u0161ifrovati.<\/span><\/span><\/p>\n<div id=\"attachment_3836\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3836\" class=\"size-full wp-image-3836\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/ChoctawCoders.jpg\" alt=\"Choctaw Coders\" width=\"800\" height=\"574\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/ChoctawCoders.jpg 800w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/ChoctawCoders-300x215.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/ChoctawCoders-768x551.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/ChoctawCoders-18x12.jpg 18w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-3836\" class=\"wp-caption-text\">\u010cokto \u0161ifranti; Source: <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:ChoctawCoders.jpg\" target=\"_blank\" rel=\"noopener\"><em>Wikimedia<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Enigma\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Enigma<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Razvijena od stane Nijemaca za potrebe komunikacije vojske u Drugo svjetskom ratu, imala je izgled pisa\u0107e ma\u0161ine sa rotorima i razvodnom plo\u010dom. U ranim po\u010decima razvoja ova ma\u0161ina je imala tastaturu od 26 slova i tri seta rotora i razvodnu plo\u010du. Kod ove verzije ma\u0161ine, poljski matemati\u010dari su imali uspjeha u razbijanju \u0161ifri. Me\u0111utim, kada je njema\u010dka vojska preuzela razvoj, oni su pove\u0107ali broj rotora na osam, pove\u0107avaju\u0107i broj kombinacija rotora na 60. Pored toga, razvodna plo\u010da je zavisno od postavke mogla da zamjeni bilo koje slovo sa nekim drugim pove\u0107avaju\u0107i eksponent broja kombinacija od 10 do 15. Na sve to pode\u0161avanja polo\u017eaja rotora i razvodne plo\u010de su mijenjanja svaka dva dana. Enigma je iz matemati\u010dkog ugla imala jaku enkripcija i bila sigurna. Me\u0111utim, problem nije bio u ma\u0161ini, ve\u0107 u pretjeranom pouzdanju korisnika u nju. Na kraju dvije stvari su presudile: Prva je to \u0161to su Nijemci rijetko mijenjali o\u017ei\u010denje na razvodnoj tabli, a druga stvar je bila ta \u0161to je svaka poruka po\u010dinjala i zavr\u0161avala isto \u2013 pozdravom Njema\u010dkom vojskovo\u0111i.<\/span><\/span><\/p>\n<div id=\"attachment_3837\" style=\"width: 693px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3837\" class=\"wp-image-3837 size-large\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920-683x1024.jpg\" alt=\"Enigma machine\" width=\"683\" height=\"1024\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920-683x1024.jpg 683w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920-200x300.jpg 200w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920-768x1152.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920-1024x1536.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920-8x12.jpg 8w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/enigma-1356492_1920.jpg 1280w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><p id=\"caption-attachment-3837\" class=\"wp-caption-text\">Enigma ma\u0161ina; Source: <a href=\"https:\/\/pixabay.com\/images\/id-1356492\/\" target=\"_blank\" rel=\"noopener\"><em>Pixabay<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"SIGABA\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>SIGABA<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ovaj ure\u0111aj je unaprije\u0111ena verzija njema\u010dke Enigme, koji koristi petnaest rotora u odnosu na Enigmu koja je koristila samo tri. Za razliku od brzinskog pokretanja rotora koji je kori\u0161ten kod Enigme, ovdje su konstruktori napravili mehanizam labirint koraka (eng. <em>stepping maze<\/em>) koji se ne mo\u017ee vidjeti golim okom, a to je u su\u0161tini zna\u010di kori\u0161tenje sistema enkripcije unutar sistema enkripcije. Kori\u0161tena je od kraja Drugog svjetskog rata do 1959. godine, kada je izba\u010dena iz upotrebe, jer vi\u0161e nije mogla pratiti razvoj modernih komunikacija.\u00a0 <\/span><\/span><\/p>\n<div id=\"attachment_3840\" style=\"width: 2058px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3840\" class=\"size-full wp-image-3840\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o.jpg\" alt=\"ECM Mark II or SIGABA\" width=\"2048\" height=\"1360\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o.jpg 2048w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o-300x199.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o-1024x680.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o-768x510.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o-1536x1020.jpg 1536w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/5176290494_99bc907c30_o-18x12.jpg 18w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><p id=\"caption-attachment-3840\" class=\"wp-caption-text\">&#8220;<a href=\"https:\/\/www.flickr.com\/photos\/14405058@N08\/5176290494\" target=\"_blank\" rel=\"noopener\"><em>SIGABA M-134-C (Army) CSP-888 (Navy)<\/em><\/a>&#8221; by <a href=\"https:\/\/www.flickr.com\/photos\/14405058@N08\" target=\"_blank\" rel=\"noopener\"><em>Ryan Somma<\/em><\/a> is marked with <a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/?ref=openverse\" target=\"_blank\" rel=\"noopener\"><em>CC BY 2.0<\/em><\/a><\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Moderna_kriptografija\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Moderna kriptografija<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Po\u010detkom sedamdesetih godina pro\u0161log vijeka kompanija <em>IBM<\/em> razvija nacionalni standard <em>Data Encryption Standard \u2013 DES<\/em>, koji je bio u upotrebi do 1997. kada je i razbijen ovaj na\u010din \u0161ifriranja. Po\u010detkom 2000-ih godina dolazi do zamjene <em>DES<\/em> standarda sa\u00a0 <em>Advanced Encryption Standard<\/em> ili <em>AES<\/em> standardom. Danas se ovaj standard koristi \u0161irom svijeta.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Istorijski gledano, enkripcija je bila potrebna iz mnogo razloga. Neko je \u0161ifrovanjem \u017eelio da sa\u010duva svoju istoriju, neko da sakrije dokumente od radoznalih o\u010diju ili neprijatelja. <\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"OSNOVE\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>OSNOVE<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">U dana\u0161njem modernom svijetu, za razliku od najve\u0107eg dijela ljudske istorije, informacije u realnom vremenu putuju sa kraja na kraj svijeta. Kada neko donese odluku na osnovu tako dobijene informacije, nije va\u017eno samo da je dobio informaciju ili da li je mo\u017ee dobiti. Mnogo va\u017enije je da je ta informacija pouzdana i \u010desto povjerljiva. U skladu sa tim zahtjevima, enkripcija danas omogu\u0107ava povjerljivost, pouzdanost i kontrolu. Tako da danas imamo sigurnosnu informativnu trijadu od povjerljivosti, integriteta i dostupnosti.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Povjerljivosti\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Povjerljivosti<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Podaci imaju vrijednost, pogotovo u dana\u0161njem dobu informacija. Mo\u017ee se govoriti o bankovnim ra\u010dunima, privatnim informacijama, trgova\u010dkim tajnama, dr\u017eavnim dokumentima i sli\u010dno. Svi imaju informacije koje \u017eele sa\u010duvati za sebe, a njihova za\u0161tita je veoma va\u017ean dio informacione bezbjednosti. Klju\u010dna komponenta u za\u0161titi povjerljivosti je enkripcija. Ona osigurava da samo ljudi koji imaju dekripcijski klju\u010d mogu pro\u010ditati informaciju.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Integritet\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Integritet<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Integritet podrazumijeva za\u0161titu od neovla\u0161tenog mijenjanja informacije, jer ona ima vrijednost samo ako je ta\u010dna. Izmijenjena informacija mo\u017ee izazvati u nekim situacijama ogromnu \u0161tetu i nezamislive posljedice. Enkripcija ovdje dolazi kao proaktivan korak, jer se preko kori\u0161tenog algoritma za enkripciju mo\u017ee osigurati integritet podatka.\u00a0 Kako bi se osigurao integritet podataka prilikom enkripcije koriste se <a href=\"https:\/\/sajberinfo.com\/2022\/06\/09\/enkripcija-podataka-hes-funkcija-epizoda-4\/\" target=\"_blank\" rel=\"noopener\">he\u0161 (eng. <em>Hash<\/em>) algoritmi<\/a> koji prosto sa\u017emu (samelju u bukvalnom prevodu) svaku poruku ili fajl bez obzira na veli\u010dinu i na izlazu dobijamo niz od 128 ili 160 nula i jedinica, u zavisnosti koji algoritam je kori\u0161\u0107en. Pored toga, gotovo je nemogu\u0107e rekonstruisati ulaznu poruku, a isto tako gotovo je nemogu\u0107e na\u0107i dva ulaza sa istom he\u0161 vrijedno\u0161\u0107u. Va\u017eno je naglasiti da ovi algoritmi ne vr\u0161e enkripciju podataka, ve\u0107 omogu\u0107avaju da se upore\u0111ivanjem ulazne i izlazne vrijednosti he\u0161 algoritma garantuje integritet i ispravnost fajlova ili podataka.<\/span><\/span><\/p>\n<div id=\"attachment_3841\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3841\" class=\"size-full wp-image-3841\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/triada-copy.jpg\" alt=\"Triad of confidentiality\" width=\"1024\" height=\"679\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/triada-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/triada-copy-300x199.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/triada-copy-768x509.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/03\/triada-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3841\" class=\"wp-caption-text\">Sigurnosna informativna trijada; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Dostupnost\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Dostupnost<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Dostupnost informacija se odnosi na pristup informacijama u slu\u010daju potrebe samo od strane ovla\u0161tenih lica. Informacija ima vrijednost samo ako pravi ljudi u pravo vrijeme mogu da se koriste sa njom. U dana\u0161njem vremenu modernih komunikacija, onemogu\u0107avanje pristupa je postala popularna vrsta napada. Pored toga tu su jo\u0161 otkazivanje ure\u0111aja, nestanci struje i prirodne katastrofe. Kao odgovor na ovo, koristi se proces pravljenja <a href=\"https:\/\/sajberinfo.com\/2020\/11\/02\/rezervna-kopija-i-cuvanje-podataka\/\" target=\"_blank\" rel=\"noopener\">rezervne kopije podatka<\/a>. Bilo koji na\u010din pravljenja rezervne kopije podataka i \u010duvanja istih da se izabere, neodgovorno bi bilo podatke transportovati van organizacije ili \u010duvati ih na jednom mjestu a da nisu za\u0161ti\u0107eni enkripcijom. Na taj na\u010din podaci uvijek mogu biti na dohvat ruke ovla\u0161tenim licima, a opet nedostupni za radoznale o\u010di.<\/span><\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%; text-align: center;\">\n<p><div id=\"attachment_3795\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/2022\/04\/10\/enkripcija-podataka-funkcionisanje-i-vrste-epizoda-2\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3795\" class=\"wp-image-3795 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-300x191.jpg\" alt=\"Encryption types and funcionality\" width=\"300\" height=\"191\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-300x191.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-768x489.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy-18x12.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/04\/enkripcija-2-copy.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3795\" class=\"wp-caption-text\">Enkripcija podataka: Funkcionisanje i vrste (Epizoda 2)<\/p><\/div><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Enkripcija u sajber prostoru je moderna forma kriptografije koja omogu\u0107ava korisniku da sakrije informacije od drugih. Po definiciji enkripcija je kriptografska transformacija podataka u formu koja sakriva originalno zna\u010denje podatka na na\u010din da spre\u010dava&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3829,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[219,220,211,212,173,80],"class_list":["post-3530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-info","tag-algorithms","tag-decryption","tag-encryption","tag-enkripcija","tag-privacy","tag-privatnost"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3530"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3530\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3829"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}