{"id":55419,"date":"2024-08-13T10:55:49","date_gmt":"2024-08-13T14:55:49","guid":{"rendered":"https:\/\/sdtimes.com\/?p=55419"},"modified":"2024-08-20T13:56:46","modified_gmt":"2024-08-20T17:56:46","slug":"nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/","title":{"rendered":"NIST approves three cryptographic algorithms capable of withstanding quantum computers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The National Institute of Standards and Technology (NIST) has announced its first three post-quantum cryptographic algorithms, which will be able to safeguard data even in the event that quantum computing advances to the point that today\u2019s cryptography can be broken.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe official publication of these algorithms marks a crucial milestone to advancing the protection of the world&#8217;s encrypted data from cyberattacks that could be attempted through the unique power of quantum computers, which are rapidly progressing to cryptographic relevancy. This is the point at which quantum computers will harness enough computational power to break the encryption standards underlying most of the world&#8217;s data and infrastructure today,\u201d IBM, who developed two of these new standards, wrote in a <\/span><a href=\"https:\/\/newsroom.ibm.com\/2024-08-13-ibm-developed-algorithms-announced-as-worlds-first-post-quantum-cryptography-standards\"><span style=\"font-weight: 400;\">statement<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><strong>RELATED: <a href=\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\">What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">According to NIST, experts predict that we may reach that point of cryptographic relevancy within the next decade. This set of three new algorithms use different math problems that even a quantum computer would have trouble solving, NIST explained.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These new algorithms are part of NIST\u2019s post-quantum cryptography (PQC) program, and today\u2019s news comes eight years after NIST <\/span><a href=\"https:\/\/www.nist.gov\/news-events\/news\/2016\/12\/nist-asks-public-help-future-proof-electronic-information\"><span style=\"font-weight: 400;\">first announced<\/span><\/a><span style=\"font-weight: 400;\"> a call for proposals asking for standards and strategies for securing information in a quantum world.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cQuantum computing technology could become a force for solving many of society\u2019s most intractable problems, and the new standards represent NIST\u2019s commitment to ensuring it will not simultaneously disrupt our security,\u201d said Laurie E. Locascio Under Secretary of Commerce for Standards and Technology and NIST Director. \u201cThese finalized standards are the capstone of NIST\u2019s efforts to safeguard our confidential electronic information.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NIST is also still evaluating two other sets of algorithms, and plans to select one or two of them by the end of the year. The first set contains algorithms with a different type of math problems than the selected one, and the second set contains algorithms that are designed for digital signatures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, NIST expects to announce 15 algorithms that it received during a <\/span><a href=\"https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig\/standardization\/call-for-proposals\"><span style=\"font-weight: 400;\">second call for proposals<\/span><\/a><span style=\"font-weight: 400;\"> in 2022.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, even though NIST is still approving additional algorithms, it says that they consider them as backups and recommends technologists not postpone using the three that have already been announced.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cWe need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe,\u201d said Dustin Moody, a NIST mathematician who heads the PQC program. \u201cBut for most applications, these new standards are the main event.\u201d\u00a0<\/span><\/p>\n<p>Tom Patterson, emerging technology security lead at <a href=\"https:\/\/www.accenture.com\/us-en\">Accenture<\/a>, believes that this announcement &#8220;marks a pivotal moment in our cybersecurity landscape. As quantum computers emerge, they present a significant risk to our current encryption methods. Organizations must assess their quantum risk, discover vulnerable encryption within their systems, and develop a resilient cryptographic architecture now.&#8221;<\/p>\n<hr \/>\n<p><em>You may also like&#8230;<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.itopstimes.com\/quantum\/q-day-prepping-what-businesses-can-do-now-to-address-quantum-security-risks\/\">Q-Day prepping: What businesses can do now to address quantum security risks<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/sdtimes.com\/ai\/forrester-shares-its-top-10-emerging-technology-trends-for-2024\/\">Forrester shares its top 10 emerging technology trends for 2024<\/a><\/strong><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The National Institute of Standards and Technology (NIST) has announced its first three post-quantum cryptographic algorithms, which will be able to safeguard data even in the event that quantum computing advances to the point that today\u2019s cryptography can be broken.\u00a0 \u201cThe official publication of these algorithms marks a crucial milestone to advancing the protection of  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":752,"featured_media":55420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[4471,74,2237,11759],"coauthors":[11687],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIST approves three cryptographic algorithms capable of withstanding quantum computers - SD Times<\/title>\n<meta name=\"description\" content=\"NIST has announced three cryptographic algorithms capable of protecting information once quantum computers break current encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST approves three cryptographic algorithms capable of withstanding quantum computers - SD Times\" \/>\n<meta property=\"og:description\" content=\"NIST has announced three cryptographic algorithms capable of protecting information once quantum computers break current encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-13T14:55:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T17:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Barron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Barron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\"},\"author\":{\"name\":\"Jenna Barron\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\"},\"headline\":\"NIST approves three cryptographic algorithms capable of withstanding quantum computers\",\"datePublished\":\"2024-08-13T14:55:49+00:00\",\"dateModified\":\"2024-08-20T17:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\"},\"wordCount\":515,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg\",\"keywords\":[\"Cryptography\",\"IBM\",\"NIST\",\"quantum\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\",\"url\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\",\"name\":\"NIST approves three cryptographic algorithms capable of withstanding quantum computers - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg\",\"datePublished\":\"2024-08-13T14:55:49+00:00\",\"dateModified\":\"2024-08-20T17:56:46+00:00\",\"description\":\"NIST has announced three cryptographic algorithms capable of protecting information once quantum computers break current encryption.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST approves three cryptographic algorithms capable of withstanding quantum computers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\",\"name\":\"Jenna Barron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"caption\":\"Jenna Barron\"},\"description\":\"Jenna Barron is News Editor of SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/jennifer-sargent\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIST approves three cryptographic algorithms capable of withstanding quantum computers - SD Times","description":"NIST has announced three cryptographic algorithms capable of protecting information once quantum computers break current encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/","og_locale":"en_US","og_type":"article","og_title":"NIST approves three cryptographic algorithms capable of withstanding quantum computers - SD Times","og_description":"NIST has announced three cryptographic algorithms capable of protecting information once quantum computers break current encryption.","og_url":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-08-13T14:55:49+00:00","article_modified_time":"2024-08-20T17:56:46+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg","type":"image\/jpeg"}],"author":"Jenna Barron","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Jenna Barron","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/"},"author":{"name":"Jenna Barron","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786"},"headline":"NIST approves three cryptographic algorithms capable of withstanding quantum computers","datePublished":"2024-08-13T14:55:49+00:00","dateModified":"2024-08-20T17:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/"},"wordCount":515,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg","keywords":["Cryptography","IBM","NIST","quantum"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/","url":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/","name":"NIST approves three cryptographic algorithms capable of withstanding quantum computers - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg","datePublished":"2024-08-13T14:55:49+00:00","dateModified":"2024-08-20T17:56:46+00:00","description":"NIST has announced three cryptographic algorithms capable of protecting information once quantum computers break current encryption.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/PQC_Algo_Pre-standardization-vid.jpg","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"NIST approves three cryptographic algorithms capable of withstanding quantum computers"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786","name":"Jenna Barron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e","url":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","caption":"Jenna Barron"},"description":"Jenna Barron is News Editor of SD Times.","url":"https:\/\/sdtimes.com\/author\/jennifer-sargent\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55419"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/752"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=55419"}],"version-history":[{"count":5,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55419\/revisions"}],"predecessor-version":[{"id":55494,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55419\/revisions\/55494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/55420"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=55419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=55419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=55419"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=55419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}