{"id":6986,"date":"2015-08-19T09:12:38","date_gmt":"2015-08-19T07:12:38","guid":{"rendered":"https:\/\/anexia.com\/stagingblog\/?p=6986"},"modified":"2022-04-22T09:51:13","modified_gmt":"2022-04-22T07:51:13","slug":"cryptology-methods-and-their-properties","status":"publish","type":"post","link":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/","title":{"rendered":"Cryptology &#8211; methods and their properties"},"content":{"rendered":"<p>The word &#8218;cryptology&#8216; comes from the Greeak and means something like &#8218;hidden, secret&#8216; and represents a science which deals with the security of information.<!--more--><\/p>\n<p>Cyptology is divided into two main categories &#8211; cryptography and cryptanalysis.<\/p>\n<p>Cryptography is the science of algorithms and methods of encryption, whereas cryptanalysis deals with the security of these methods.<\/p>\n<p>A distinction is made between symmetrical and asymmetrical systems.<\/p>\n<p>At the symmetric system the sender and receiver are using the same key. For establishing a communication the key must be exchanged between sender and the receiver firstly. Thereby, this method is very easy to attack (e.g. by sniffing of the traffic).<\/p>\n<p>In the asymmetrical system, however, different keys are used &#8211; there&#8217;s a public and a private key. Thus, the problem of the symmetrical procedure is resolved.<\/p>\n<p>&nbsp;<\/p>\n<h1>Classification of ciphers<\/h1>\n<p>A basic distinction is made between monoalphabetic and polyalbhabetic ciphers.<\/p>\n<p>&nbsp;<\/p>\n<h2>Monoalphabetic ciphers<\/h2>\n<p>The procedure for this purpose is called &#8222;monoalphabetic substitution&#8220; and describes an encryption method in which only a single fixed alphabet is used for the encryption. That means a symbol is always be shown on the same location.<\/p>\n<p>The most famous example is the Caesar cipher. In this method, the letters and characters are chosen from fix predefined letters or groups of characters in plaintext.<\/p>\n<p>By specifying the alphabet to use, these characters are simply replaced by others from this. In simple terms, the starting point character is just replaced by another. Is one of these known, the original letter within the entire text is known!<\/p>\n<p><a href=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/monoalphabetic-table.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-999\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/monoalphabetic-table.png\" alt=\"Monoalphabetische Tabelle\" width=\"590\" height=\"46\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/monoalphabetic-table.png 726w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/monoalphabetic-table-325x25.png 325w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/monoalphabetic-table-300x23.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/a><\/p>\n<p>A monoalphabetic encryption could the look like this:<\/p>\n<pre class=\"\">THIS IS A TEST<\/pre>\n<pre class=\"\">XASQ SQ U XWQX<\/pre>\n<h2>Polyalphabetic ciphers<\/h2>\n<p>As polyalphabetic ciphers are called methods in which starting letters or characters are assigned to another letter or character.<\/p>\n<p>Unlike monoalphabetic substitution several different alphabets are used for the characters or the plaintext.<\/p>\n<p>According to this principle works, inter alis, the Vigen\u00e8re or the Advanced Caesar cipher. The emergence of the Vigen\u00e8re encryption can be incidentally attributes to the 16th century.<\/p>\n<p>&nbsp;<\/p>\n<p>Both cyphering types belong to the exchange and substitution ciphers. Depending on the complexity, these are divided into separate types.<\/p>\n<p>&nbsp;<\/p>\n<h2>Additive cipher<\/h2>\n<p>In order to obtain ciphertext, simply add the code words in the additive cipher.<\/p>\n<p>y<sub>i<\/sub> = a<sub>i<\/sub> + ( z<sub>j<\/sub> * mod(g) )<\/p>\n<p>&nbsp;<\/p>\n<h2>Multiplikative Chiffre<\/h2>\n<p>In contrast to the additive cipher the code words aren&#8217;t added at the multiplicative cipher, but as the name suggests, they&#8217;re multiplied together.<\/p>\n<p>y<sub>i<\/sub> = a<sub>i<\/sub> * ( z<sub>j<\/sub> * mod(g) )<\/p>\n<p>&nbsp;<\/p>\n<h2>Product- and chained cipher<\/h2>\n<p>In the product cipher the information will be encrypted serveral times with the same key. The chained cipher, however, is encrypted with different keys.<\/p>\n<p>&nbsp;<\/p>\n<h1>Methods of encryption<\/h1>\n<h2>Polybius cipher<\/h2>\n<p>The Polybius ciphery was applied approximately in the years 200 BC to 120 BC in castles.<\/p>\n<p>In this process the word \u201e<strong>HELLO<\/strong>\u201c could e.g. be received as \u201e<strong>23 15 31 31 34<\/strong>\u201c.<\/p>\n<p>The principle behind is relative simple: in those days torches were in the castles successively placed in certain pinnacles of two adjacent towers.<\/p>\n<p>For example, there was a torch at position 2 at the left tower, and at the right one another at position 3.<\/p>\n<p>The recipient of the message was from afar this torch observe positions and decrypt this using the Polybius square as coding of the letter &#8218;H&#8216;.<\/p>\n<p>The Polybius cipher is a monoalphabetic method.<\/p>\n<p><a href=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/polybios-table.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-995 size-full\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/polybios-table.png\" alt=\"Polybius table\" width=\"170\" height=\"160\" \/><\/a><\/p>\n<p>Since there&#8217;s only place for 25 characters, was abandoned deliberately to the letter &#8218;J&#8216;.<\/p>\n<p>&nbsp;<\/p>\n<h2>Beaufort cipher<\/h2>\n<p>The Beaufort cipher is named after Sir Francis Beaufort.<\/p>\n<p>If we use<\/p>\n<p>y<sub>i<\/sub> = a<sub>i<\/sub> + ( z<sub>j<\/sub> * mod(g) )   =&gt;   a<sub>i<\/sub> = y<sub>i<\/sub> &#8211; ( z<sub>j<\/sub> * mod(g) )<\/p>\n<p>so the sender must add the key and the recipient subtract this.<\/p>\n<p>Beaufort realized that you can add the key in the encryption and decryption when you use the following presentation:<\/p>\n<p>y<sub>i<\/sub> = -a<sub>i<\/sub> + ( z<sub>j<\/sub> * mod(g) )   =&gt;   a<sub>i<\/sub> = -y<sub>i<\/sub> &#8211; ( z<sub>j<\/sub> * mod(g) )<\/p>\n<p>&nbsp;<\/p>\n<p>In the Beaufort cipher the text to be encrypted is diveded into blocks of five characters. Adequte from the encryption table is then used for each of the five characters.<\/p>\n<p>Above are the letters to be encrypted, on the left side there&#8217;s the position within the five blocks.<\/p>\n<p><a href=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/beaufort-table.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-988\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/beaufort-table.png\" alt=\"Beaufort encryption table\" width=\"590\" height=\"125\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/beaufort-table.png 755w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/beaufort-table-325x69.png 325w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/beaufort-table-300x64.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/a><\/p>\n<p>In order to demonstrate this practically, the following example will be encrypted by Beaufort.<\/p>\n<p><em>This is a test to demonstrate the cryptographic method.<\/em><\/p>\n<pre class=\"\">THISI SATES TTODE MONST RATET HECRY PTOGR APHIC METHO D<\/pre>\n<p>This then results in the encrypted text:<\/p>\n<pre class=\"\">LWQWT KPBID LIWHP MDVWE JPBIE ZTKVJ HIWKC SEPMN ETBLZ V<\/pre>\n<h2>Vernam cipher<\/h2>\n<p>The Vernam cipher refers to various methods of enryption, which are dating back to Gilbert Vernam.<\/p>\n<p>In 1918 Vernam already reported to a patend, wherin a key bit stream is added to a message.<\/p>\n<p>The security of this process is influenced by several factors.<\/p>\n<ul>\n<li>When a (long) natural language word is used as key, the Vernam cipher is merely an extension of the Vigen\u00e8re cipher, in which the secret key has the same length as the plaintext.By today&#8217;s standards such a method is consideres as unsafe!<\/li>\n<li>If the key is generated by a cryptographic-secure random  generator, so it security is dependent on that of the random generator.<\/li>\n<li>If the generation of the key, however, is based on pure chance, so we also speak of the &#8222;One-Time-Pad&#8220;. Since Vernam was also involved in the development of the One-Time-Pad, it&#8217;s often also referred to as &#8218;Vernam cipher&#8216;.This procedure is considered as perfectly secure.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1>Notice<\/h1>\n<p>Although cryptography as well as he steganography have the aim to ensure the confidentiality of information, the differ in their starting points.<\/p>\n<p>In the cryptography, the message itself is encrypted to protect the information. The steganography, however, deals with the concealment of the channel, which is used to communicate.<\/p>\n<p>Both methods can be combined together.<\/p>\n<p>&nbsp;<\/p>\n<h1>Conclusion<\/h1>\n<p>Without cryptology with their knowledge and practices secure comunication and data storage in today&#8217;s world would be unthinkable.<\/p>\n<p>Be it starting with the simple password storage up to highly secure transmission of banking data &#8211; cryptology makes it possible to protect data against third parties.<\/p>\n<p>However, the subject matter is sometimes in the twilight os the law. Governments would like, if necessary, have the option to decrypt the data, but this would be in contradiction with the basic principles. The most famous example of this would be the NSA.<\/p>\n<p>During my tuition I was able to, inter alia, collect a lot of experience in the field of data transmission and security. Therefore I can say, that this is a very complex topic that is beyond the scope, if I had explained each of the details.<\/p>\n<p>For easier understanding, some of the examples were greatly simplified.<\/p>\n<p>How the cryptographic process itself will continue to be developed in the future is difficult to say, but as it looks like at the moment, probably the most important methods (e.g. RSA&#8230;) someday could be decrypted by supercomputers within the polynomial time and thus lose their security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The word &#8218;cryptology&#8216; comes from the Greeak and means something like &#8218;hidden, secret&#8216; and represents a science which deals with the security of information.<\/p>\n","protected":false},"author":15,"featured_media":1012,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1135],"tags":[2015,2017,2019,2023,2025,2027,2021,1329,2029,1379,2031,2033],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cryptology - methods and their properties - ANEXIA Blog<\/title>\n<meta name=\"description\" content=\"The word &#039;cryptology&#039; comes from the Greeak and means something like &#039;hidden, secret&#039; and represents a science which deals with the security of information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptology - methods and their properties - ANEXIA Blog\" \/>\n<meta property=\"og:description\" content=\"The word &#039;cryptology&#039; comes from the Greeak and means something like &#039;hidden, secret&#039; and represents a science which deals with the security of information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/\" \/>\n<meta property=\"og:site_name\" content=\"ANEXIA Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anexiagmbh\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-19T07:12:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-22T07:51:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel Wutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:site\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel Wutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/\",\"url\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/\",\"name\":\"Cryptology - methods and their properties - ANEXIA Blog\",\"isPartOf\":{\"@id\":\"https:\/\/anexia.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg\",\"datePublished\":\"2015-08-19T07:12:38+00:00\",\"dateModified\":\"2022-04-22T07:51:13+00:00\",\"author\":{\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de\"},\"description\":\"The word 'cryptology' comes from the Greeak and means something like 'hidden, secret' and represents a science which deals with the security of information.\",\"breadcrumb\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#primaryimage\",\"url\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg\",\"contentUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg\",\"width\":800,\"height\":534,\"caption\":\"ANEXIA_Blogbild_Krypto\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anexia.com\/blog\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptology &#8211; methods and their properties\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anexia.com\/blog\/#website\",\"url\":\"https:\/\/anexia.com\/blog\/\",\"name\":\"ANEXIA Blog\",\"description\":\"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anexia.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de\",\"name\":\"Manuel Wutte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g\",\"caption\":\"Manuel Wutte\"},\"url\":\"https:\/\/anexia.com\/blog\/author\/mwu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptology - methods and their properties - ANEXIA Blog","description":"The word 'cryptology' comes from the Greeak and means something like 'hidden, secret' and represents a science which deals with the security of information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/","og_locale":"de_DE","og_type":"article","og_title":"Cryptology - methods and their properties - ANEXIA Blog","og_description":"The word 'cryptology' comes from the Greeak and means something like 'hidden, secret' and represents a science which deals with the security of information.","og_url":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/","og_site_name":"ANEXIA Blog","article_publisher":"https:\/\/www.facebook.com\/anexiagmbh\/","article_published_time":"2015-08-19T07:12:38+00:00","article_modified_time":"2022-04-22T07:51:13+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg","type":"image\/jpeg"}],"author":"Manuel Wutte","twitter_card":"summary_large_image","twitter_creator":"@_ANEXIA","twitter_site":"@_ANEXIA","twitter_misc":{"Verfasst von":"Manuel Wutte","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/","url":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/","name":"Cryptology - methods and their properties - ANEXIA Blog","isPartOf":{"@id":"https:\/\/anexia.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#primaryimage"},"image":{"@id":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#primaryimage"},"thumbnailUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg","datePublished":"2015-08-19T07:12:38+00:00","dateModified":"2022-04-22T07:51:13+00:00","author":{"@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de"},"description":"The word 'cryptology' comes from the Greeak and means something like 'hidden, secret' and represents a science which deals with the security of information.","breadcrumb":{"@id":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#primaryimage","url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg","contentUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/08\/ANEXIA_Blogbild_Krypto.jpg","width":800,"height":534,"caption":"ANEXIA_Blogbild_Krypto"},{"@type":"BreadcrumbList","@id":"https:\/\/anexia.com\/blog\/en\/cryptology-methods-and-their-properties\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anexia.com\/blog\/de\/"},{"@type":"ListItem","position":2,"name":"Cryptology &#8211; methods and their properties"}]},{"@type":"WebSite","@id":"https:\/\/anexia.com\/blog\/#website","url":"https:\/\/anexia.com\/blog\/","name":"ANEXIA Blog","description":"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anexia.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de","name":"Manuel Wutte","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g","caption":"Manuel Wutte"},"url":"https:\/\/anexia.com\/blog\/author\/mwu\/"}]}},"lang":"en","translations":{"en":6986,"de":984},"amp_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/6986"}],"collection":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/comments?post=6986"}],"version-history":[{"count":1,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/6986\/revisions"}],"predecessor-version":[{"id":6989,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/6986\/revisions\/6989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media\/1012"}],"wp:attachment":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media?parent=6986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/categories?post=6986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/tags?post=6986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}