{"id":55473,"date":"2024-08-19T14:33:08","date_gmt":"2024-08-19T18:33:08","guid":{"rendered":"https:\/\/sdtimes.com\/?p=55473"},"modified":"2024-08-19T14:46:28","modified_gmt":"2024-08-19T18:46:28","slug":"what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/","title":{"rendered":"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Quantum computing has the potential to one day break today\u2019s encryption algorithms, requiring a proactive approach to finding new and innovative ways to protect data that can withstand those upcoming capabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last week, NIST <\/span><a href=\"https:\/\/sdtimes.com\/security\/nist-approves-first-three-cryptographic-algorithms-capable-of-withstanding-quantum-computers\/\"><span style=\"font-weight: 400;\">announced<\/span><\/a><span style=\"font-weight: 400;\"> the approval of three post-quantum cryptographic algorithms that cannot be broken by a quantum computer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s what leaders in the industry have been saying about this announcement and what it means for the future:\u00a0<\/span><\/p>\n<h5><b>Tim Hollebeek, industry and standards technical strategist at <\/b><a href=\"https:\/\/www.digicert.com\/\"><b>DigiCert<\/b><\/a>:<\/h5>\n<blockquote><p><span style=\"font-weight: 400;\">\u201cToday\u2019s quantum computers are small and experimental, but they are rapidly becoming more capable, and it is only a matter of time before cryptographically-relevant quantum computers (CRQCs) arrive. These are quantum computers that are powerful enough to break the asymmetric cryptography used to protect communications and devices on the internet, and they could arrive in as little as 5-10 years. The good news is that the problem can be solved by switching to new hard math problems that are not vulnerable to quantum computers, and the new NIST standards describe in precise detail exactly how to use these new hard math problems to protect internet traffic in the future.\u201d<\/span><\/p><\/blockquote>\n<h5><b>Kristin Milchanowski Gilkes, global innovation quantum leader at <\/b><a href=\"https:\/\/www.ey.com\/en_us\"><b>Ernst &amp; Young<\/b><\/a>:<b>\u00a0<\/b><\/h5>\n<blockquote><p><span style=\"font-weight: 400;\">\u201cSince these requirements will be mandatory for federal agencies, and likely contracted partners, it is expected to be only a matter of time before mass adoption from commercial organizations. As quantum computers rapidly improve, the timelines by which they will be able to decode public-key cryptographic algorithms and in which organizations can upgrade to quantum-secure infrastructure are quickly overlapping. Business leaders should consider a risk-based approach as they evaluate their next steps and investments for quantum over the upcoming year.\u201d<\/span><\/p><\/blockquote>\n<h5><b>David Hook, VP of software engineering for Crypto Workshop<\/b> <b>at <\/b><a href=\"https:\/\/www.keyfactor.com\/\"><b>Keyfactor<\/b><\/a>:<\/h5>\n<blockquote><p><span style=\"font-weight: 400;\">\u201cNow that we finally have these published standards, organizations that are serious about safeguarding systems that involve the use of public key technology will need to start moving to deployment. Coupled with the application of crypto-agility, use of the new algorithms will be a necessary part of future-proofing public key infrastructure (PKI) systems to ensure long-term resiliency. PKI represents the cornerstone of systems that rely on secure digital identities and the exchange of encrypted data and these algorithms represent a major advance for supporting both areas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, considering both the resource requirements, and the nature, of these algorithms, it does not mean the new arrivals are simply a case of \u2018same-old, same-old.\u2019 There will be a lot of work to do to make sure these algorithms can be used efficiently and effectively. Even without considering the government incentives to make use of post-quantum cryptography (PQC) algorithms now, organizations should be beginning their transition journeys. While the PQ does stand for post-quantum, anyone believing they can wait till after the arrival of a cryptographically relevant quantum computer, before worrying about PQC algorithm deployment, is making a terrible mistake.\u201d<\/span><\/p><\/blockquote>\n<h5><b>Tom Patterson, emerging technology security lead at <\/b><a href=\"https:\/\/www.accenture.com\/us-en\"><b>Accenture<\/b><\/a>:<\/h5>\n<blockquote><p><span style=\"font-weight: 400;\">&#8220;The NIST announcement on new global encryption standards for quantum marks a pivotal moment in our cybersecurity landscape. As quantum computers emerge, they present a significant risk to our current encryption methods. Organizations must assess their quantum risk, discover vulnerable encryption within their systems, and develop a resilient cryptographic architecture now.\u201d<\/span><\/p><\/blockquote>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Quantum computing has the potential to one day break today\u2019s encryption algorithms, requiring a proactive approach to finding new and innovative ways to protect data that can withstand those upcoming capabilities. Last week, NIST announced the approval of three post-quantum cryptographic algorithms that cannot be broken by a quantum computer.\u00a0 Here\u2019s what leaders in the  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":752,"featured_media":55477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[2237,17044,11759],"coauthors":[11687],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography - SD Times<\/title>\n<meta name=\"description\" content=\"Quantum computing has the potential to break today\u2019s encryption, requiring a proactive approach to finding new ways to protect data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography - SD Times\" \/>\n<meta property=\"og:description\" content=\"Quantum computing has the potential to break today\u2019s encryption, requiring a proactive approach to finding new ways to protect data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-19T18:33:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-19T18:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Barron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Barron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\"},\"author\":{\"name\":\"Jenna Barron\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\"},\"headline\":\"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography\",\"datePublished\":\"2024-08-19T18:33:08+00:00\",\"dateModified\":\"2024-08-19T18:46:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg\",\"keywords\":[\"NIST\",\"pqc\",\"quantum\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\",\"url\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\",\"name\":\"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg\",\"datePublished\":\"2024-08-19T18:33:08+00:00\",\"dateModified\":\"2024-08-19T18:46:28+00:00\",\"description\":\"Quantum computing has the potential to break today\u2019s encryption, requiring a proactive approach to finding new ways to protect data.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\",\"name\":\"Jenna Barron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"caption\":\"Jenna Barron\"},\"description\":\"Jenna Barron is News Editor of SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/jennifer-sargent\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography - SD Times","description":"Quantum computing has the potential to break today\u2019s encryption, requiring a proactive approach to finding new ways to protect data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography - SD Times","og_description":"Quantum computing has the potential to break today\u2019s encryption, requiring a proactive approach to finding new ways to protect data.","og_url":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-08-19T18:33:08+00:00","article_modified_time":"2024-08-19T18:46:28+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg","type":"image\/jpeg"}],"author":"Jenna Barron","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Jenna Barron","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/"},"author":{"name":"Jenna Barron","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786"},"headline":"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography","datePublished":"2024-08-19T18:33:08+00:00","dateModified":"2024-08-19T18:46:28+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/"},"wordCount":552,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg","keywords":["NIST","pqc","quantum"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/","url":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/","name":"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg","datePublished":"2024-08-19T18:33:08+00:00","dateModified":"2024-08-19T18:46:28+00:00","description":"Quantum computing has the potential to break today\u2019s encryption, requiring a proactive approach to finding new ways to protect data.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/08\/technology-6701509_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/what-nists-newly-approved-post-quantum-algorithms-mean-for-the-future-of-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"What NIST\u2019s newly approved post-quantum algorithms mean for the future of cryptography"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786","name":"Jenna Barron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e","url":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","caption":"Jenna Barron"},"description":"Jenna Barron is News Editor of SD Times.","url":"https:\/\/sdtimes.com\/author\/jennifer-sargent\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55473"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/752"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=55473"}],"version-history":[{"count":5,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55473\/revisions"}],"predecessor-version":[{"id":55479,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55473\/revisions\/55479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/55477"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=55473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=55473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=55473"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=55473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}