{"id":14698,"date":"2018-12-20T02:36:39","date_gmt":"2018-12-20T02:36:39","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=14698"},"modified":"2018-12-21T02:38:09","modified_gmt":"2018-12-21T02:38:09","slug":"is-quantum-computing-a-cybersecurity-threat","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/is-quantum-computing-a-cybersecurity-threat\/","title":{"rendered":"Is quantum computing a cybersecurity threat?"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/dorothy-denning-308774\">Dorothy Denning<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/naval-postgraduate-school-2795\">Naval Postgraduate School<\/a><\/em><\/span><\/p>\n<p>Cybersecurity researchers and analysts <a href=\"https:\/\/www.csoonline.com\/article\/3287979\/encryption\/the-quantum-computing-cyber-storm-is-coming.html\">are<\/a> <a href=\"https:\/\/www.wired.com\/story\/quantum-computing-is-the-next-big-security-risk\/\">rightly<\/a> <a href=\"https:\/\/www.zdnet.com\/article\/ibm-warns-of-instant-breaking-of-encryption-by-quantum-computers-move-your-data-today\/\">worried<\/a> that a new type of computer, <a href=\"https:\/\/theconversation.com\/how-quantum-mechanics-can-change-computing-80995\">based on quantum physics<\/a> rather than more standard electronics, could <a href=\"https:\/\/techcrunch.com\/2018\/12\/13\/us-intelligence-quantum-computing-artificial-intelligence-national-security-threat\/\">break most modern cryptography<\/a>. The effect would be to render communications as insecure as if they weren\u2019t encoded at all. <\/p>\n<p>Fortunately, the threat so far is hypothetical. The quantum computers that exist today are <a href=\"https:\/\/theconversation.com\/quantum-speed-limit-may-put-brakes-on-quantum-computers-89353\">not capable<\/a> of breaking any commonly used encryption methods. Significant technical advances are required before they will be able to break the strong codes in widespread use around the internet, according to a <a href=\"https:\/\/www.nap.edu\/catalog\/25196\/quantum-computing-progress-and-prospects\">new report<\/a> from the National Academy of Sciences. <\/p>\n<p>Still, there is <a href=\"https:\/\/www.technologyreview.com\/s\/612509\/quantum-computers-encryption-threat\/\">cause for concern<\/a>. The cryptography underpinning modern internet communications and e-commerce <a href=\"https:\/\/theconversation.com\/quantum-computers-could-crack-existing-codes-but-create-others-much-harder-to-break-21807\">could someday succumb to a quantum attack<\/a>. To understand the risk and what can be done about it, it\u2019s important to look more closely at digital cryptography and how it\u2019s used \u2013 and broken.<\/p>\n<h2>Cryptography basics<\/h2>\n<figure class=\"align-right zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" srcset=\"https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=765&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=765&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=765&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=962&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=962&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/251026\/original\/file-20181217-185246-l0ttdt.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=962&amp;fit=crop&amp;dpr=3 2262w\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\"><\/a><figcaption>\n              <span class=\"caption\">Codes can be simple \u2013 or advanced.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.flickr.com\/photos\/derek7272\/152858796\">Derek Rose\/flickr.com<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>At its most basic, encryption is the act of taking an original piece of information \u2013 a message, for instance \u2013 and following a series of steps to transform it into something that looks like gibberish.<\/p>\n<p>Today\u2019s digital ciphers use <a href=\"https:\/\/csrc.nist.gov\/news\/2001\/announcing-approval-of-fips-197-aes\">complex mathematical formulas<\/a> to transform clear data into \u2013 and out of \u2013 securely encrypted messages to be stored or transmitted. The calculations vary according to a digital key.<\/p>\n<p>There are two main types of encryption \u2013 symmetric, in which the same key is used to encrypt and decrypt the data; and asymmetric, or public-key, which involves a pair of mathematically linked keys, one shared publicly to let people encrypt messages for the key pair\u2019s owner, and the other stored privately by the owner to decrypt messages.<\/p>\n<p>Symmetric cryptography is substantially faster than public-key cryptography. For this reason, it is used to encrypt all communications and stored data.<\/p>\n<p>Public-key cryptography is used for securely exchanging symmetric keys, and for digitally authenticating \u2013 or signing \u2013 messages, documents and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_certificate\">certificates<\/a> that pair public keys with their owners\u2019 identities. When you visit a secure website \u2013 one that uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTTPS\">HTTPS<\/a> \u2013 your browser uses public-key cryptography to authenticate the site\u2019s certificate and to set up a symmetric key for encrypting communications to and from the site.<\/p>\n<p>The math for these two types of cryptography is quite different, which affects their security. Because virtually all internet applications use both symmetric and public-key cryptography, both forms need to be secure.<\/p>\n<h2>Breaking codes<\/h2>\n<figure class=\"align-right zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" srcset=\"https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=495&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=495&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=495&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=622&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=622&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/251020\/original\/file-20181217-185261-1da9v5j.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=622&amp;fit=crop&amp;dpr=3 2262w\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\"><\/a><figcaption>\n              <span class=\"caption\">The insides of an IBM quantum computer.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.flickr.com\/photos\/ibm_research_zurich\/32390815144\">IBM Research<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/\">CC BY-ND<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>The most straightforward way to break a code is to try all the possible keys until you get the one that works. Conventional computers can do this, but it\u2019s very difficult. In July 2002, for instance, a group announced that it had found a 64-bit key \u2013 but the effort took <a href=\"https:\/\/www.computerworld.com.au\/article\/27164\/rc5-64_bit_key_strength_questioned\/\">more than 300,000 people over four and a half years<\/a> of work. A key twice the length, or 128 bits, would have 2\u00b9\u00b2\u2078 possible solutions \u2013 more than 300 undecillion, or a 3 followed by 38 zeroes. Even the world\u2019s fastest supercomputer would need <a href=\"https:\/\/bugcharmer.blogspot.com\/2012\/06\/how-big-is-2128.html\">trillions of years<\/a> to find the right key.<\/p>\n<p>A quantum computing method called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Grover%27s_algorithm\">Grover\u2019s algorithm<\/a>, however, speeds up the process, turning that 128-bit key into the quantum-computational equivalent of a 64-bit key. The defense is straightforward, though: make keys longer. A 256-bit key, for example, has the same security against a quantum attack as a 128-bit key has against a conventional attack.<\/p>\n<h2>Handling public-key systems<\/h2>\n<figure class=\"align-right zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\" srcset=\"https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=586&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=586&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=586&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=737&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=737&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/251027\/original\/file-20181217-185258-rqiazw.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=737&amp;fit=crop&amp;dpr=3 2262w\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\"><\/a><figcaption>\n              <span class=\"caption\">A pair of keys can help strangers exchange secure messages.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Public_key_encryption.svg\">David G\u00f6thberg\/Wikimedia Commons<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>Public-key cryptography, however, poses a much bigger problem, because of how the math works. The algorithms that are popular today, <a href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem)\">RSA<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\">Diffie-Hellman<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic-curve_cryptography\">elliptic curve<\/a>, all make it possible to start with a public key and mathematically compute the private key without trying all the possibilities.<\/p>\n<p>For RSA, for instance, the private key can be computed by factoring a number that is the product of two prime numbers \u2013 as 3 and 5 are for 15.<\/p>\n<p>So far, public-key encryption has been uncrackable by using very long key pairs \u2013 like 2,048 bits, which corresponds to a number that is 617 decimal digits long. But sufficiently advanced quantum computers could crack even 4,096-bit key pairs <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor%27s_algorithm\">in just a few hours<\/a> using a method called Shor\u2019s algorithm.<\/p>\n<p>That\u2019s for ideal quantum computers of the future. The <a href=\"https:\/\/arxiv.org\/abs\/quant-ph\/0112176\">biggest number factored so far<\/a> on a quantum computer is 15 \u2013 just 4 bits long. <\/p>\n<p>The National Academies study notes that the quantum computers now operating have too little processing power and are too error-prone to crack today\u2019s strong codes. The future code-breaking quantum computers would need <a href=\"https:\/\/www.nap.edu\/catalog\/25196\/quantum-computing-progress-and-prospects\">100,000 times more processing power<\/a> and an error rate 100 times better than today\u2019s best quantum computers have achieved. The study does not predict how long these advances might take \u2013 but it did not expect them to happen within a decade.<\/p>\n<p>However, the potential for harm is enormous. If these encryption methods are broken, people will not be able to trust the data they transmit or receive over the internet, even if it is encrypted. Adversaries will be able to create bogus certificates, calling into question the validity of any digital identity online. <\/p>\n<h2>Quantum-resistant cryptography<\/h2>\n<p>Fortunately, researchers have been working to develop public-key algorithms that could resist code-breaking efforts from quantum computers, preserving or restoring trust in certificate authorities, digital signatures and encrypted messages.<\/p>\n<p>Notably, the U.S. National Institute of Standards and Technology is already evaluating 69 potential new methods for what it calls \u201c<a href=\"https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\">post-quantum cryptography<\/a>.\u201d The organization expects to have a draft standard by 2024, if not before, which would then be added to web browsers and other internet apps and systems.<\/p>\n<p>In principle, symmetric cryptography can be used for key exchange. But this approach depends on the security of trusted third parties to protect secret keys, cannot implement digital signatures, and would be difficult to apply across the internet. Still, it is used throughout the <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2018\/09\/quantum_computi_2.html\">GSM cellular standard<\/a> for encryption and authentication. <\/p>\n<p>Another alternative to public-key cryptography for key exchange is quantum key-distribution. Here, quantum methods are used by the sender and receiver to establish a symmetric key. But these methods require <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_key_distribution\">special hardware<\/a>.<\/p>\n<figure class=\"align-center zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" srcset=\"https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/251028\/original\/file-20181217-185237-c9nb41.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=3 2262w\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\"><\/a><figcaption>\n              <span class=\"caption\">A look inside a prototype of the hardware that exchanges quantum cryptography keys.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:New_Quantum_Key_System_Combines_Speed,_Distance_(5884514248).jpg\">National Institute of Standards and Technology\/Wikimedia Commons<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<h2>Unbreakable cryptography doesn\u2019t mean security<\/h2>\n<p>Strong cryptography is vital to overall individual and societal cybersecurity. It provides the foundation for secure transmission and data storage, and for authenticating trusted connections between people and systems. <\/p>\n<p>But cryptography is just one piece of a much larger pie. Using the best encryption won\u2019t stop a person from clicking on a misleading link or opening a malicious file attached to an email. Encryption also can\u2019t defend against <a href=\"https:\/\/theconversation.com\/what-are-software-vulnerabilities-and-why-are-there-so-many-of-them-77930\">the inevitable software flaws<\/a>, or <a href=\"https:\/\/theconversation.com\/how-governments-and-companies-can-prevent-the-next-insider-attack-72235\">insiders who misuse their access<\/a> to data.<\/p>\n<p>And even if the math were unbreakable, there can be weaknesses in how cryptography is used. Microsoft, for example, recently identified two apps that <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-warns-about-two-apps-that-installed-root-certificates-then-leaked-the-private-keys\/\">unintentionally revealed their private encryption keys<\/a> to the public, rendering their communications insecure. <\/p>\n<p>If or when powerful quantum computing arrives, it poses a large security threat. Because the process of adopting new standards can take years, it is wise to be planning for quantum-resistant cryptography now.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/107411\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/dorothy-denning-308774\">Dorothy Denning<\/a>, Emeritus Distinguished Professor of Defense Analysis, <em><a href=\"http:\/\/theconversation.com\/institutions\/naval-postgraduate-school-2795\">Naval Postgraduate School<\/a><\/em><\/span><\/p>\n<p>This article is republished from <a href=\"http:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/is-quantum-computing-a-cybersecurity-threat-107411\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dorothy Denning, Naval Postgraduate School Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. The effect would be to render communications as insecure as if they weren\u2019t encoded at all. Fortunately, the threat so far is hypothetical. [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":14695,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/14698"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=14698"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/14698\/revisions"}],"predecessor-version":[{"id":14699,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/14698\/revisions\/14699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/14695"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=14698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=14698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=14698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}