{"id":4120,"date":"2025-02-21T14:16:42","date_gmt":"2025-02-21T13:16:42","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=4120"},"modified":"2025-08-13T10:21:56","modified_gmt":"2025-08-13T08:21:56","slug":"elektronicky-podpis-kryptografia-a-certifikat","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/elektronicky-podpis-kryptografia-a-certifikat\/","title":{"rendered":"Elektronick\u00fd podpis &#8211; Kryptografia a certifik\u00e1t"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4120\" class=\"elementor elementor-4120\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cff37f elementor-widget elementor-widget-heading\" data-id=\"4cff37f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Electronic signature and encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc1b627 e-con-full e-flex e-con e-child\" data-id=\"dc1b627\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d8510 elementor-widget elementor-widget-button\" data-id=\"52d8510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d02e66d elementor-widget elementor-widget-button\" data-id=\"d02e66d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/elektronicky-podpis\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa102ad elementor-widget elementor-widget-button\" data-id=\"fa102ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/malver\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b3ff03 e-flex e-con-boxed e-con e-parent\" data-id=\"1b3ff03\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84f2f50 elementor-widget elementor-widget-text-editor\" data-id=\"84f2f50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From a technical point of view, an electronic signature uses the principles of <strong><span style=\"color: #0c3a76;\">encryption (cryptography)<\/span>,<\/strong> i.e. the process of transforming input data (so-called plain text) into a form that is unreadable for an unauthorized person (so-called encrypted text). An integral part of encryption (and decryption) are <span style=\"color: #0c3a76;\"><strong>keys.<\/strong> <\/span>A key can be understood as any sequence of characters. According to its type, we distinguish symmetric and asymmetric cryptography.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-015f1ed e-flex e-con-boxed e-con e-parent\" data-id=\"015f1ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f69d16 elementor-widget elementor-widget-heading\" data-id=\"1f69d16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Symmetric and asymmetric cryptography<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf51cc1 elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"bf51cc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Depending on whether the same key is used for encryption and decryption or different keys are used for both processes (systems), we distinguish between symmetric and asymmetric cryptography.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-049e901 elementor-widget elementor-widget-heading\" data-id=\"049e901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Symmetric cryptography<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b164c94 elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b164c94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The same key is used for both encryption and decryption. The process itself is fast and the keys do not have to be as long as in asymmetric cryptography. However, it is necessary to solve the problem of secure key distribution.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d38f08 elementor-widget elementor-widget-image\" data-id=\"1d38f08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"357\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-135624.png\" class=\"attachment-medium_large size-medium_large wp-image-5447\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-135624.png 1292w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-135624-300x140.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-135624-1024x476.png 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-135624-768x357.png 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-135624-18x8.png 18w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">The principle of symmetric cryptography - both parties have the same key. Source: our own image.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc8d240 elementor-widget elementor-widget-spacer\" data-id=\"cc8d240\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6acb74 elementor-widget elementor-widget-heading\" data-id=\"b6acb74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Asymmetric cryptography<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75dc977 elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"75dc977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unlike symmetric cryptography, it uses two keys \u2013 a private and a public one.<\/p><ul><li>The private key is known only to the recipient of the message.<\/li><li>The public key is known to the public and is freely available.<\/li><\/ul><p>To send an encrypted message to the recipient with the certainty that only he and no one else can read it, we use his public key in the encryption process and send him the encrypted text. The recipient then decrypts the encrypted text using his private key, which is known only to him, and receives the original text.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f0d476 elementor-widget elementor-widget-image\" data-id=\"2f0d476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"504\" height=\"254\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Obrazok4.jpg\" class=\"attachment-large size-large wp-image-4128\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Obrazok4.jpg 504w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Obrazok4-300x151.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Obrazok4-18x9.jpg 18w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Principle of asymmetric cryptography. Source: our own image.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba5a0b elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2ba5a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In figure 4, to send a message to Bob with the certainty that only he and no one else will read it, Alice uses his public key to encrypt the message. The recipient (Bob) then decrypts the encrypted text using his private key, and receives the original text. An electronic signature uses this principle as well.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8c0acc e-flex e-con-boxed e-con e-parent\" data-id=\"c8c0acc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ba57a0 elementor-widget elementor-widget-spacer\" data-id=\"8ba57a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0584508 e-flex e-con-boxed e-con e-parent\" data-id=\"0584508\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ad9c78 elementor-widget elementor-widget-heading\" data-id=\"6ad9c78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Certificate<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac040ce elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ac040ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A public key certificate (abbreviated as certificate) is an electronic document issued by a certification authority that <span style=\"color: #0c3a76;\"><strong>links a public key to a specific person<\/strong><\/span>. It is mainly used to verify the correctness of an electronic signature by verifying the public key and the identification data of its holder.\u00a0<\/p><p>An analogy to a certificate can be the verification of signatures on a document by a notary. The notary issues a document that certifies the authenticity of these signatures. In other words, he certifies that the signature on the document belongs to a specific person.<\/p><p>A certificate has a limited validity period. After the validity period has expired or after the certificate has been revoked, the certificate may not be used, not for the purpose for which it was originally intended.\u00a0<\/p><p>An independent authority (3rd party) is required to manage certificates.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e51a0c2 elementor-widget elementor-widget-heading\" data-id=\"e51a0c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Verifying a signed e-mail message in Outlook<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9b39ca elementor-widget elementor-widget-text-editor\" data-id=\"c9b39ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An e-mail message that has been electronically signed is marked in the application with a seal symbol, see. the symbol marked in red in figure 5. Clicking on this symbol will display details such as the time of signing or the identity of the signer.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f9bed7 elementor-widget elementor-widget-image\" data-id=\"2f9bed7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"605\" height=\"232\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/07\/Obrazok1.png\" class=\"attachment-large size-large wp-image-5380\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/07\/Obrazok1.png 605w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/07\/Obrazok1-300x115.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/07\/Obrazok1-18x7.png 18w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Where to verify an electronic signature. Source: our own image.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ecef51f e-flex e-con-boxed e-con e-parent\" data-id=\"ecef51f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d159c elementor-widget elementor-widget-spacer\" data-id=\"48d159c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Elektronick\u00fd podpis a \u0161ifrovanie Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma Elektronick\u00fd podpis z technick\u00e9ho h\u013eadiska vyu\u017e\u00edva princ\u00edpy \u0161ifrovania (kryptografie), teda procesu transform\u00e1cie vstupn\u00fdch \u00fadajov (tzv. plain text) do podoby, ktor\u00e1 je ne\u010ditate\u013en\u00e1 pre neopr\u00e1vnen\u00fa osobu (tzv. za\u0161ifrovan\u00fd text). Neoddelite\u013enou s\u00fa\u010das\u0165ou \u0161ifrovania (a de\u0161ifrovania) s\u00fa k\u013e\u00fa\u010de. K\u013e\u00fa\u010dom mo\u017eno rozumie\u0165 ak\u00fako\u013evek postupnos\u0165 znakov. Pod\u013ea jeho typu rozozn\u00e1vame symetrick\u00fa [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-4120","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=4120"}],"version-history":[{"count":19,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4120\/revisions"}],"predecessor-version":[{"id":5576,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4120\/revisions\/5576"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=4120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}