{"id":55,"date":"2022-06-04T13:39:00","date_gmt":"2022-06-04T13:39:00","guid":{"rendered":"https:\/\/netleon.com\/blog-new\/?p=55"},"modified":"2025-05-12T05:33:04","modified_gmt":"2025-05-12T05:33:04","slug":"cryptography-real-world-application","status":"publish","type":"post","link":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/","title":{"rendered":"Cryptography &#8211; Real World Application"},"content":{"rendered":"\r\n<h2><span class=\"ez-toc-section\" id=\"What_is_Cryptography\"><\/span><strong>What is Cryptography?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p>Cryptography, an <strong>Application of Cryptography<\/strong> study, involves encrypted communication techniques, ensuring only sender and recipient access. Derived from &#8220;cryptos,&#8221; Greek for secret, it encodes plaintext into ciphertext, decoded upon arrival. It also encompasses hiding photographs via microdata or fusion techniques.<\/p>\r\n\r\n\r\n\r\n<p>The most popular use of encrypting and decrypting email and other plain-text messages is when electronic data are transmitted. The most straightforward approach is the scheme symmetric or \u201chidden key.\u201d The data is secured by a hidden key, and both the encoded message and secret key are forwarded for decryption to the receiver. The issue? When the packet is intercepted, it\u2019s all a third person needs to decode and decipher the message. The asymmetric or \u201cpublic key\u201d Scheme has been invented by cryptologists to tackle this issue. Each consumer has two keys in this case: one public and one private. Senders request their destination\u2019s public key, encrypt and send the message.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n<h3><span class=\"ez-toc-section\" id=\"Applications_of_Cryptography\"><\/span><strong>Applications of Cryptography<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<h4><strong>Digital Signatures\/Authentication<\/strong><\/h4>\r\n<p>Authentication is any method by which such evidence is confirmed and checked. One will wish to check the origin of a document, the sender\u2019s identification, the time, dates and signatures of a document, the device or user\u2019s identity etc. A digital signature is an encryption tool that allows all of these to be verified. A document\u2019s digital signature is a detail dependent on the document and the private key of the signer. It is generally generated using a Hash function and a private signing feature (algorithms that create encrypted characters containing specific information about a document and its private keys).<\/p>\r\n<h4><strong>Email encryption\/decoding<\/strong><\/h4>\r\n<p>E-mail encryption is a way to secure email material to someone else who wants to get information from a participant outside the email conversation. A person in its encrypted form can no longer read an e-mail. Your emails can only be unlocked and decrypted into the original message by means of your private email address.<\/p>\r\n<h4><strong>Stamping hour: Time<\/strong><\/h4>\r\n<p>Time stamping is a procedure that can confirm the existence or the delivery at a certain time of certain electronic documents or correspondence. Time stamping uses a model of encryption called a blind signature system. Blind signature systems enable the sender to receive a response from other parties without revealing the other party\u2019s message.<\/p>\r\n<h4><strong>WhatsApp Encryption<\/strong><\/h4>\r\n<p>WhatsApp uses an encryption \u201csignal\u201d protocol, using a mixture of cryptographic algorithms for asymmetric and symmetrical keys. The symmetric key algorithms ensure anonymity and integrity, while the asymmetrical key algorithms contribute to the achievement of other safety objectives, such as authentication and repudiation. A single key for encryption of the data and decryption is used in symmetric key cryptography.<\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"Statistics_on_cryptography\"><\/span><strong>Statistics on cryptography<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<ul>\r\n<li>The global cryptography market is expected to reach $29.7 billion by 2027.<\/li>\r\n<li>The most common use of cryptography is to protect data in transit and at rest.<\/li>\r\n<li>Cryptography is used by a wide range of industries, including finance, healthcare, and government.<\/li>\r\n<li>The most common threats to cryptography are brute force attacks and side-channel attacks.<\/li>\r\n<li>Cryptography is a constantly evolving field, with new algorithms and techniques being developed all the time.<\/li>\r\n<li>\r\n<p>Cryptography is a critical tool for protecting data in the digital age. By understanding the statistics on cryptography, you can better understand the importance of this technology and how it can be used to protect your data.<\/p>\r\n<p>Here are some additional details about the statistics I mentioned above:<\/p>\r\n<ul>\r\n<li>The global cryptography market is expected to reach $29.7 billion by 2027, growing at a CAGR of 10.2% from 2022 to 2027. This growth is being driven by the increasing use of cryptography in a variety of industries, including finance, healthcare, and government.<\/li>\r\n<li>The most common use of cryptography is to protect data in transit and at rest. Data in transit refers to data being transmitted across a network, like the Internet. Data at rest pertains to data stored on a physical device, such as a hard drive or USB drive.<\/li>\r\n<li>Cryptography is used by a wide range of industries, including finance, healthcare, and government. Finance uses cryptography to protect customer data, such as credit card numbers and bank account information. Healthcare uses cryptography to protect patient data, such as medical records and test results. The government uses cryptography to protect classified information, such as national security secrets.<\/li>\r\n<li>The most common threats to cryptography, as observed by <a href=\"https:\/\/netleon.com\"><strong>Netleon IT Solution<\/strong><\/a>, are brute force attacks and side-channel attacks. Brute force attacks entail trying every key combination to break the system. Side-channel attacks involve extracting information by observing side effects like power consumption or timing.<\/li>\r\n<li>Cryptography is a constantly evolving field, with new algorithms and techniques being developed all the time. This is necessary to keep up with the ever-changing threat landscape.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\r\n\r\n<\/ul>\r\n<p><strong>Image by <a href=\"https:\/\/www.freepik.com\/author\/freepik\" target=\"_blank\" rel=\"noopener\"><u>freepik<\/u><\/a> on <a href=\"https:\/\/img.freepik.com\/free-photo\/close-up-hand-holding-smartphone_23-2149153407.jpg\" target=\"_blank\" rel=\"noopener\"><u>Freepik<\/u><\/a><\/strong><\/p>\r\n<p>&nbsp;<\/p>\r\n<!-- \/wp:post-content -->","protected":false},"excerpt":{"rendered":"<p>What is Cryptography? Cryptography, an Application of Cryptography study, involves encrypted communication techniques, ensuring only sender and recipient access. Derived from &#8220;cryptos,&#8221; Greek for secret, it encodes plaintext into ciphertext, decoded upon arrival. It also encompasses hiding photographs via microdata or fusion techniques. The most popular use of encrypting and decrypting email and other plain-text&hellip; <a class=\"more-link\" href=\"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/\">Continue reading <span class=\"screen-reader-text\">Cryptography &#8211; Real World Application<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":3661,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[254],"tags":[],"class_list":["post-55","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-others","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptography: Securing Digital Communication<\/title>\n<meta name=\"description\" content=\"Cryptography ensures secure communication by encrypting data, protecting emails, digital signatures, and more across various industries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptography: Securing Digital Communication\" \/>\n<meta property=\"og:description\" content=\"Cryptography ensures secure communication by encrypting data, protecting emails, digital signatures, and more across various industries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/\" \/>\n<meta property=\"og:site_name\" content=\"Latest Insights &amp; Updates With Our Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-04T13:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-12T05:33:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netleon.com\/blog\/wp-content\/uploads\/2022\/06\/close-up-hand-holding-smartphone_23-2149153407.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1252\" \/>\n\t<meta property=\"og:image:height\" content=\"501\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Vikas Choudhary\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vikas Choudhary\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/\"},\"author\":{\"name\":\"Vikas Choudhary\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/#\\\/schema\\\/person\\\/120f2c9e289a82dd19ad506f967b0073\"},\"headline\":\"Cryptography &#8211; Real World Application\",\"datePublished\":\"2022-06-04T13:39:00+00:00\",\"dateModified\":\"2025-05-12T05:33:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/\"},\"wordCount\":787,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netleon.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/close-up-hand-holding-smartphone_23-2149153407.webp\",\"articleSection\":[\"Others\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/\",\"url\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/\",\"name\":\"Cryptography: Securing Digital Communication\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netleon.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/close-up-hand-holding-smartphone_23-2149153407.webp\",\"datePublished\":\"2022-06-04T13:39:00+00:00\",\"dateModified\":\"2025-05-12T05:33:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/#\\\/schema\\\/person\\\/120f2c9e289a82dd19ad506f967b0073\"},\"description\":\"Cryptography ensures secure communication by encrypting data, protecting emails, digital signatures, and more across various industries.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netleon.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/close-up-hand-holding-smartphone_23-2149153407.webp\",\"contentUrl\":\"https:\\\/\\\/netleon.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/close-up-hand-holding-smartphone_23-2149153407.webp\",\"width\":1252,\"height\":501,\"caption\":\"Image by freepik on Freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/cryptography-real-world-application\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netleon.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptography &#8211; Real World Application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/netleon.com\\\/blog\\\/\",\"name\":\"Latest Insights &amp; Updates With Our Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netleon.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netleon.com\\\/blog\\\/#\\\/schema\\\/person\\\/120f2c9e289a82dd19ad506f967b0073\",\"name\":\"Vikas Choudhary\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/649705747aa2c03ab8ca6f13632ea0888aea5a4ce813eb0f40f9c891c0dab9fa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/649705747aa2c03ab8ca6f13632ea0888aea5a4ce813eb0f40f9c891c0dab9fa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/649705747aa2c03ab8ca6f13632ea0888aea5a4ce813eb0f40f9c891c0dab9fa?s=96&d=mm&r=g\",\"caption\":\"Vikas Choudhary\"},\"description\":\"Vikas Choudhary is a content writer with 2.5 years of experience crafting clear, engaging content across tech, health, lifestyle, and finance. He creates blogs, articles, and web copy that drive traffic and connect with readers. Passionate about learning, he turns ideas into valuable, SEO-friendly content for clients.\",\"url\":\"https:\\\/\\\/netleon.com\\\/blog\\\/author\\\/vikas-choudhary\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptography: Securing Digital Communication","description":"Cryptography ensures secure communication by encrypting data, protecting emails, digital signatures, and more across various industries.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/","og_locale":"en_US","og_type":"article","og_title":"Cryptography: Securing Digital Communication","og_description":"Cryptography ensures secure communication by encrypting data, protecting emails, digital signatures, and more across various industries.","og_url":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/","og_site_name":"Latest Insights &amp; Updates With Our Blog","article_published_time":"2022-06-04T13:39:00+00:00","article_modified_time":"2025-05-12T05:33:04+00:00","og_image":[{"width":1252,"height":501,"url":"https:\/\/netleon.com\/blog\/wp-content\/uploads\/2022\/06\/close-up-hand-holding-smartphone_23-2149153407.webp","type":"image\/webp"}],"author":"Vikas Choudhary","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vikas Choudhary","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#article","isPartOf":{"@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/"},"author":{"name":"Vikas Choudhary","@id":"https:\/\/netleon.com\/blog\/#\/schema\/person\/120f2c9e289a82dd19ad506f967b0073"},"headline":"Cryptography &#8211; Real World Application","datePublished":"2022-06-04T13:39:00+00:00","dateModified":"2025-05-12T05:33:04+00:00","mainEntityOfPage":{"@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/"},"wordCount":787,"commentCount":0,"image":{"@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#primaryimage"},"thumbnailUrl":"https:\/\/netleon.com\/blog\/wp-content\/uploads\/2022\/06\/close-up-hand-holding-smartphone_23-2149153407.webp","articleSection":["Others"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/","url":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/","name":"Cryptography: Securing Digital Communication","isPartOf":{"@id":"https:\/\/netleon.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#primaryimage"},"image":{"@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#primaryimage"},"thumbnailUrl":"https:\/\/netleon.com\/blog\/wp-content\/uploads\/2022\/06\/close-up-hand-holding-smartphone_23-2149153407.webp","datePublished":"2022-06-04T13:39:00+00:00","dateModified":"2025-05-12T05:33:04+00:00","author":{"@id":"https:\/\/netleon.com\/blog\/#\/schema\/person\/120f2c9e289a82dd19ad506f967b0073"},"description":"Cryptography ensures secure communication by encrypting data, protecting emails, digital signatures, and more across various industries.","breadcrumb":{"@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netleon.com\/blog\/cryptography-real-world-application\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#primaryimage","url":"https:\/\/netleon.com\/blog\/wp-content\/uploads\/2022\/06\/close-up-hand-holding-smartphone_23-2149153407.webp","contentUrl":"https:\/\/netleon.com\/blog\/wp-content\/uploads\/2022\/06\/close-up-hand-holding-smartphone_23-2149153407.webp","width":1252,"height":501,"caption":"Image by freepik on Freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/netleon.com\/blog\/cryptography-real-world-application\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netleon.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cryptography &#8211; Real World Application"}]},{"@type":"WebSite","@id":"https:\/\/netleon.com\/blog\/#website","url":"https:\/\/netleon.com\/blog\/","name":"Latest Insights &amp; Updates With Our Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netleon.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/netleon.com\/blog\/#\/schema\/person\/120f2c9e289a82dd19ad506f967b0073","name":"Vikas Choudhary","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/649705747aa2c03ab8ca6f13632ea0888aea5a4ce813eb0f40f9c891c0dab9fa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/649705747aa2c03ab8ca6f13632ea0888aea5a4ce813eb0f40f9c891c0dab9fa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/649705747aa2c03ab8ca6f13632ea0888aea5a4ce813eb0f40f9c891c0dab9fa?s=96&d=mm&r=g","caption":"Vikas Choudhary"},"description":"Vikas Choudhary is a content writer with 2.5 years of experience crafting clear, engaging content across tech, health, lifestyle, and finance. He creates blogs, articles, and web copy that drive traffic and connect with readers. Passionate about learning, he turns ideas into valuable, SEO-friendly content for clients.","url":"https:\/\/netleon.com\/blog\/author\/vikas-choudhary\/"}]}},"_links":{"self":[{"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/posts\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":21,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"predecessor-version":[{"id":4384,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/posts\/55\/revisions\/4384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/media\/3661"}],"wp:attachment":[{"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netleon.com\/blog\/wp-json\/wp\/v2\/tags?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}