{"id":9846,"date":"2023-10-09T10:02:28","date_gmt":"2023-10-09T10:02:28","guid":{"rendered":"https:\/\/cloudkul.com\/blog\/?p=9846"},"modified":"2024-11-13T13:25:10","modified_gmt":"2024-11-13T13:25:10","slug":"understanding-cryptographic-methods-for-data-transfer","status":"publish","type":"post","link":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/","title":{"rendered":"Understanding Cryptographic Methods for Data Transfer"},"content":{"rendered":"\n<p>Transfer of messages in a secret way to protect data to the authenticated person has always been a subject of concern for decades. <\/p>\n\n\n\n<p>From the use of pigeons to deliver messages on one click instant transfer, humans have solved the problem of communication. <\/p>\n\n\n\n<p>But concerns like privacy and integrity of messages are always present in this zero-trust digital era.<\/p>\n\n\n\n<p>Let&#8217;s explore key cryptographic concepts\u2014encoding, hashing, encryption, obfuscation, and tokenization\u2014for <a href=\"https:\/\/cloudkul.com\/blog\/secure-the-cloud-infrastructure-with-cloud-security\/\">secure internet<\/a> communication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Cryptography?<\/strong><\/h2>\n\n\n\n<p>Cryptography is a vital tool for safeguarding data sent over the internet. <\/p>\n\n\n\n<p>It is the creative transformation of data into an unreadable format, only the intended recipient will be able to understand and use it.<\/p>\n\n\n\n<p>As a result, cryptography is primarily concerned with securing and protecting data from cyber thieves or anybody other than the intended recipient. <\/p>\n\n\n\n<p>Therefore, Cryptography allows people to communicate safely over the Internet.<\/p>\n\n\n\n<p>However, to learn about the <a href=\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\">Role of Cryptography <\/a>in Information Security, you can refer to the Blog.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The different cryptographic methods are &#8211; <\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">What is hashing?<\/h2>\n\n\n\n<p>It\u2019s a cryptographic method that converts text into a fixed-length, irreversible string called a hash value or digest.<\/p>\n\n\n\n<p>A single bit of change in the original text can bring an avalanche effect to the hashed string and will result in a different hash. <\/p>\n\n\n\n<p>A good hash function should be complex and should not reproduce the same hash value for two different inputs.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/hash.png\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"171\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/hash.png\" alt=\"hashing\" class=\"wp-image-9847\" style=\"width:742px;height:174px\"\/><\/a><\/figure><\/div>\n\n\n<p>We use hashing to ensure the integrity of the message. <\/p>\n\n\n\n<p><strong>For example: <\/strong>many stores provide software along with their hash value so that users can ensure the integrity by calculating the hash value of downloaded\/purchased software on their own.<\/p>\n\n\n\n<p><a href=\"https:\/\/cloudkul.com\/blog\/comparison-between-hashing-encryption-encoding\/\">Hash functions<\/a> are also used to avoid duplicity of data, to avoid storing clear text passwords database administrators use functions to store passwords in hashed value.<\/p>\n\n\n\n<p><strong>Some widely used Hash <strong>cryptographic<\/strong><\/strong> <strong>algorithms are &#8211; <\/strong> MD5(Message digest) and SHA-2( Secure Hash Algorithm).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Encoding?<\/h2>\n\n\n\n<p>Mapping a character with another to make it understandable by that application or machine. <\/p>\n\n\n\n<p>Here encoding is used to ensure that the application can understand the delivered string and be able to process it, rather than keeping the information secure.<\/p>\n\n\n\n<p><a href=\"https:\/\/cloudkul.com\/blog\/comparison-between-hashing-encryption-encoding\/\">Encoded strings<\/a> can be decoded using the same scheme that is used to encode, a key is not required for both the processes.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/encode.png\"><img loading=\"lazy\" decoding=\"async\" width=\"989\" height=\"193\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/encode.png\" alt=\"encoding\" class=\"wp-image-9848\"\/><\/a><\/figure><\/div>\n\n\n<p>The above snippet shows an example where a text(&#8220;&amp;#9824&#8221;) is converted into a spade and another text(&#8220;&amp;#x1F534&#8221;) into a big red circle using utf-8 encoding scheme.<\/p>\n\n\n\n<p><strong>Other encoding schemes: <\/strong>Base64, ASCII, URL Encoding, etc<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Encryption?<\/h2>\n\n\n\n<p>Encryption is the process of taking a message and scrambling its content so that only authorized people can access it.<\/p>\n\n\n\n<p><a href=\"https:\/\/cloudkul.com\/blog\/comparison-between-hashing-encryption-encoding\/\">Encryption service<\/a> protects sensitive data, both online (bank details, emails, social networks) and offline (stored on hard drives), ensuring only authorized access.<\/p>\n\n\n\n<p>By using encryption techniques we can enhance our security by preventing attacks like identity theft, and eavesdropping and can maintain confidentiality throughout the communication. <\/p>\n\n\n\n<p>Although there are many encryption systems, the most common ones are the use of public and private keys.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Let&#8217;s talk about the types of encryption:<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">1. Symmetric key encryption:<\/h4>\n\n\n\n<p>This technique of encryption involves only one secret key to encrypt and decrypt the information. <\/p>\n\n\n\n<p>Both sender and recipient must know the secret key, making symmetric encryption faster, but it requires secure key storage and a safe channel for key transfer.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/encryption.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1018\" height=\"300\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/encryption.png\" alt=\"encryption\" class=\"wp-image-9850\"\/><\/a><\/figure>\n\n\n\n<p><strong>Some widely used<\/strong> <strong>Symmetric<\/strong> <strong><strong>cryptographic<\/strong><\/strong> <strong>algorithms are &#8211; <\/strong>AES-128, AES-256, DES-3, and BLOWFISH.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. Asymmetric key encryption:<\/h4>\n\n\n\n<p>This technique uses two keys: a private key and a public key, where the private key will be a secret key and the public key will be a public key.<\/p>\n\n\n\n<p>For instance: you share your public key with the public so that anyone who wants to send you a message can encrypt the message using your public key and send it to you. <\/p>\n\n\n\n<p>Now as only you have access to your private key, only you can decrypt the message.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/assysmtric.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"371\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/assysmtric-1024x371.png\" alt=\"asymmetric\" class=\"wp-image-9851\" style=\"width:702px;height:254px\"\/><\/a><\/figure><\/div>\n\n\n<p><strong>Some widely used <strong>Asymmetric<\/strong><\/strong> <strong><strong>cryptographic<\/strong><\/strong> <strong>algorithms are &#8211;<\/strong> RSA, DSA, Elliptic curve techniques, and PKCS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Obfuscation?<\/h2>\n\n\n\n<p>Obfuscation is the practice of making something difficult to read and understand. <\/p>\n\n\n\n<p>Generally, software\u2019s code is obfuscated to protect developers\/company intellectual property from being copied, to avoid tempering, and to defend code from attackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How it works:<\/strong><\/h3>\n\n\n\n<p>It may involve the encryption of code, stripping out potentially revealing metadata, renaming important class names, and variables, and adding null bytes, and meaningless code. <\/p>\n\n\n\n<p>Some other techniques like the use of Packers, crypters, or Exclusive or Operation are common practices.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/obfuscation.png\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"247\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/obfuscation.png\" alt=\"works\" class=\"wp-image-9852\" style=\"width:522px;height:234px\"\/><\/a><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">What is Tokenization?<\/h2>\n\n\n\n<p>Tokenization is a way of protecting sensitive information by replacing it with an algorithmically generated secure random token.<\/p>\n\n\n\n<p>Tokenization replaces sensitive cardholder details with a token to avoid leaking banking sensitive information over the internet during transactions.<\/p>\n\n\n\n<p>Tokenized data is irreversible and can not be predictable, as there is no relationship between the token and the original data. <\/p>\n\n\n\n<p>Therefore, even if information is leaked, attackers will not be able to use it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/tokenization.png\"><img loading=\"lazy\" decoding=\"async\" width=\"971\" height=\"265\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/tokenization.png\" alt=\"Tokenization\" class=\"wp-image-9853\"\/><\/a><\/figure>\n\n\n\n<p>We can achieve Detokenization through the original tokenization system. There is no way to obtain original data from just a token.<\/p>\n\n\n\n<p>So far we have discussed different techniques and where to use them to achieve our goal of secure communication over the Internet.<\/p>\n\n\n\n<p>To improve the security of your e-commerce store check out the Webkul <a href=\"https:\/\/store.webkul.com\/Ecommerce-Security-Audit-Basic-Plan.html\">basic security module<\/a> which is customizable and Magento 2 based eCommerce <a href=\"https:\/\/store.webkul.com\/magento2-security-extension.html\">store security extension<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Need Support?<\/h2>\n\n\n\n<p>Thank You for reading this Blog!<\/p>\n\n\n\n<p>For further more interesting blogs, keep in touch with us. If you need any kind of support, simply raise a ticket at&nbsp;<strong><a href=\"https:\/\/webkul.uvdesk.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/webkul.uvdesk.com\/en\/<\/a>.<\/strong><\/p>\n\n\n\n<p>You may also visit our Odoo development services and quality&nbsp;<strong><a href=\"https:\/\/store.webkul.com\/index.php\/Odoo.html\">Odoo Extensions<\/a><\/strong>.<\/p>\n\n\n\n<p><strong>For further help or queries, please&nbsp;<a href=\"https:\/\/cloudkul.com\/contact\/\">contact<\/a>&nbsp;us or raise a&nbsp;<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\">ticket<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Transfer of messages in a secret way to protect data to the authenticated person has <a class=\"text-primary\" title=\"read more\" href=\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[594,87,46,341,340],"tags":[592,589,319,320,591,593,590],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Cryptographic Methods for Data Transfer - Cloudkul<\/title>\n<meta name=\"description\" content=\"Cryptographic methods are primarily concerned with securing and protecting customer data from cyber thieves or anybody other than the intended recipients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Cryptographic Methods for Data Transfer - Cloudkul\" \/>\n<meta property=\"og:description\" content=\"Cryptographic methods are primarily concerned with securing and protecting customer data from cyber thieves or anybody other than the intended recipients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudkul\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-09T10:02:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T13:25:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/hash.png\" \/>\n<meta name=\"author\" content=\"Amit Yadav\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\",\"url\":\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\",\"name\":\"Understanding Cryptographic Methods for Data Transfer - Cloudkul\",\"isPartOf\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\"},\"datePublished\":\"2023-10-09T10:02:28+00:00\",\"dateModified\":\"2024-11-13T13:25:10+00:00\",\"author\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/e7fc1ebc6e48c46a938780b19ea8b378\"},\"description\":\"Cryptographic methods are primarily concerned with securing and protecting customer data from cyber thieves or anybody other than the intended recipients.\",\"breadcrumb\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Cryptographic Methods for Data Transfer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\",\"url\":\"https:\/\/cloudkul.com\/blog\/\",\"name\":\"Cloudkul\",\"description\":\"Host your eCommerce Store on AWS with Optimized Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudkul.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/e7fc1ebc6e48c46a938780b19ea8b378\",\"name\":\"Amit Yadav\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/154c2c18758419af8c80f50ed0e8c615?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/154c2c18758419af8c80f50ed0e8c615?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"caption\":\"Amit Yadav\"},\"url\":\"https:\/\/cloudkul.com\/blog\/author\/amit-yadav411\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Cryptographic Methods for Data Transfer - Cloudkul","description":"Cryptographic methods are primarily concerned with securing and protecting customer data from cyber thieves or anybody other than the intended recipients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Cryptographic Methods for Data Transfer - Cloudkul","og_description":"Cryptographic methods are primarily concerned with securing and protecting customer data from cyber thieves or anybody other than the intended recipients.","og_url":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/","og_site_name":"Cloudkul","article_published_time":"2023-10-09T10:02:28+00:00","article_modified_time":"2024-11-13T13:25:10+00:00","og_image":[{"url":"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2021\/07\/hash.png"}],"author":"Amit Yadav","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/","url":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/","name":"Understanding Cryptographic Methods for Data Transfer - Cloudkul","isPartOf":{"@id":"https:\/\/cloudkul.com\/blog\/#website"},"datePublished":"2023-10-09T10:02:28+00:00","dateModified":"2024-11-13T13:25:10+00:00","author":{"@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/e7fc1ebc6e48c46a938780b19ea8b378"},"description":"Cryptographic methods are primarily concerned with securing and protecting customer data from cyber thieves or anybody other than the intended recipients.","breadcrumb":{"@id":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding Cryptographic Methods for Data Transfer"}]},{"@type":"WebSite","@id":"https:\/\/cloudkul.com\/blog\/#website","url":"https:\/\/cloudkul.com\/blog\/","name":"Cloudkul","description":"Host your eCommerce Store on AWS with Optimized Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudkul.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/e7fc1ebc6e48c46a938780b19ea8b378","name":"Amit Yadav","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/154c2c18758419af8c80f50ed0e8c615?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/154c2c18758419af8c80f50ed0e8c615?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","caption":"Amit Yadav"},"url":"https:\/\/cloudkul.com\/blog\/author\/amit-yadav411\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/9846"}],"collection":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/comments?post=9846"}],"version-history":[{"count":39,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/9846\/revisions"}],"predecessor-version":[{"id":18615,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/9846\/revisions\/18615"}],"wp:attachment":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media?parent=9846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/categories?post=9846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/tags?post=9846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}