{"id":90857,"date":"2024-06-24T22:36:32","date_gmt":"2024-06-24T22:36:32","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/"},"modified":"2024-11-07T06:44:05","modified_gmt":"2024-11-07T06:44:05","slug":"fips-encryption-algorithms","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/","title":{"rendered":"Fips Encryption Algorithms"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>The world of digital security\u200d is ever-increasing and complex. As the use\u200d of online platforms\u2064 for\u200c a range of activities from commerce to communication\u200d expand, \u2062the need for \u200bappropriate\u2063 safeguards and encryption protocols becomes increasingly vital. One such protocol which is widely used is the FIPS Encryption Algorithms. FIPS stands\u200c for Federal \u200cInformation Processing Standard and defines the standards for\u200b encryption \u2062technology that \u200bcan be used by US Federal agencies and their contractors. The FIPS Encryption Algorithms\u200d provide\u200c for\u200c a unique set of requirements to ensure a secure and trusted communication environment is established. The \u200bFIPS cryptography\u2064 algorithms provide a strong foundation for security and privacy in your day-to-day online activities. FIPS encryption\u200b algorithms can be\u200b used to protect sensitive data such as credit card numbers, passwords, and medical records. FIPS-certified\u200c encryption algorithms\u200d are also used to <a href=\"https:\/\/logmeonce.com\/enterprise-password-management\/\">secure\u200b online banking transactions<\/a>, voice, and video communication.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#1_What_are_FIPS_Encryption_Algorithms\" >1. What are FIPS Encryption Algorithms?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#2_How_FIPS%E2%80%8B_Algorithms_Secure_Your_Data\" >2. How FIPS\u200b Algorithms Secure Your Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#3_What_are_the_Different_Types_of_FIPS_Encryption_Algorithms\" >3. What are the Different Types of FIPS Encryption Algorithms?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#4_How_to_Choose_the%E2%80%8C_Right_FIPS_Encryption_Algorithm_for_You\" >4. How to Choose the\u200c Right FIPS Encryption Algorithm for You<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#Cryptographic_Security_Measures_Comparison_Table\" >Cryptographic Security Measures Comparison Table<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-are-fips-encryption-algorithms\"><span class=\"ez-toc-section\" id=\"1_What_are_FIPS_Encryption_Algorithms\"><\/span>1. What are FIPS Encryption Algorithms?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>FIPS Encryption Algorithms are cryptographic standards issued by the U.S. government.<\/b> These algorithms are designed\u200d to protect sensitive\u200b information, \u200csuch as financial or confidential data, and \u2064are widely used within\u200d the private sector.<\/p>\n<p>The Federal Information Processing Standard (FIPS) is a set\u200d of security requirements\u2064 and algorithms \u200bthat \u2063protect against unauthorized access to data. FIPS\u2062 algorithms use a combination of technologies \u200dsuch as data encryption, authentication, key \u2064exchange, and\u2063 hashing to secure communication. With FIPS approved encryption algorithms, encrypted data is converted into a \u200cunique code that cannot\u200d be accessed, \u2063copied or counterfeited\u2064 by \u2064a \u200bthird party.<\/p>\n<ul>\n<li>AES \u200c\u2013 the\u200c Advanced Encryption \u200bStandard (AES) is \u2063a symmetric-key algorithm based on the Rijndael encryption technique.<\/li>\n<li>Triple DES \u2013 Triple Data\u2064 Encryption Standard \u200d(3DES) is a symmetric-key algorithm that uses three different ciphers to encrypt data.<\/li>\n<li>SHA \u2013 Secure Hash Algorithm is a type of cryptographic hash function used to secure data.<\/li>\n<\/ul>\n<p>FIPS algorithms are also used to secure data \u2063over the Internet and in\u200d cloud-based\u2063 applications. In order to use FIPS encryption algorithms, organizations must utilize certified hardware and software\u2062 that meets FIPS standards. This ensures that data is securely \u2063transmitted and stored, regardless\u200c of\u2064 the network\u2064 or media it is sent \u200dover.<\/p>\n<h2 id=\"2-how-fips-algorithms-secure-your-data\"><span class=\"ez-toc-section\" id=\"2_How_FIPS%E2%80%8B_Algorithms_Secure_Your_Data\"><\/span>2. How FIPS\u200b Algorithms Secure Your Data<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>FIPS (Federal Information Processing\u200b Standard) algorithms have become increasingly important in\u2064 modern informatics for the secure\u2063 storage and\u200b transmission of sensitive data. Compliant solutions must adhere to rigorous\u2063 security protocols and guidelines to ensure \u200bthat your\u2063 company\u2019s data is encrypted and safeguarded.<\/p>\n<p>The most <a title=\"Fips Encryption Algorithms\" href=\"https:\/\/logmeonce.com\/resources\/fips-encryption-algorithms\/\">secure\u2062 data security algorithms today rely<\/a> on FIPS-certified encryption \u2062standards. These standards contain detailed\u2062 cryptographic guidelines and recommendations that must\u200d be followed \u200din order to receive the FIPS\u200b seal \u2064of approval. They guard against malicious actors that may try to decrypt or\u2064 modify your sensitive data. Here\u200d are some of the most common \u200dalgorithms used \u2064to ensure strong digital security:<\/p>\n<ul>\n<li><strong>Advanced Encryption Standard (AES)<\/strong> \u2013 This cryptographic algorithm is used by the U.S.\u200c government to\u200c protect classified documents.\u2064 It has a key \u200csize\u200c of 256 bits and \u200bis extremely reliable in keeping data secure.<\/li>\n<li><strong>Secure Hash Algorithm (SHA-2)<\/strong> \u200b \u2013 This algorithm is used widely in digital signature infrastructure. It offers \u2064a message integrity check, making sure \u200bthe data \u200dbeing transmitted is correct. It also has a key size of 256-bits.<\/li>\n<li><strong>Rivest-Shamir-Adleman (RSA)<\/strong> \u2013 This algorithm \u2064is used \u200cfor digital signing and \u200dauthentication. It has two parts \u2013 the \u200dencryption key and the decryption \u2063key.<\/li>\n<\/ul>\n<p>These FIPS-compliant algorithms guarantee quick and secure communication and safeguarding\u200d of your valuable data from hack attempts. They are\u2064 designed to prevent unauthorized access and make your confidential information safe.<\/p>\n<h2 id=\"3-what-are-the-different-types-of-fips-encryption-algorithms\"><span class=\"ez-toc-section\" id=\"3_What_are_the_Different_Types_of_FIPS_Encryption_Algorithms\"><\/span>3. What are the Different Types of FIPS Encryption Algorithms?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>FIPS Approved Encryption Algorithms<\/b><\/p>\n<p>The Federal Information Processing\u2064 Standard\u2062 (FIPS) is a set \u2063of standards for encryption that ensures a\u2062 secure system. FIPS-approved algorithms are used\u2063 to provide cryptographic solutions for public and private networks in the US.<\/p>\n<p>Here are the three\u2062 primary types of FIPS-approved encryption\u200c algorithms:<\/p>\n<ul>\n<li>Symmetric Algorithms: Also\u200d known as secret-key algorithms, symmetric algorithms \u2063use the same key to both encrypt and decrypt data. With symmetric algorithms, encryption is fast and data can easily be passed in between users without any \u2062extra delays. Examples of symmetric algorithms approved by \u200bFIPS include AES and 3DES.<\/li>\n<li>Asymmetric Algorithms: Also known as\u2063 public-key algorithms, asymmetric\u200d algorithms use a pair of keys \u200c(public and\u200b private) to encrypt and decrypt data. With asymmetric algorithms, the exchange of data is more \u2062secure and the encryption is stronger. Examples of asymmetric algorithms approved by FIPS include RSA\u200c and ECC.<\/li>\n<li>Hash Algorithms: Hash algorithms are non-reversible encryption algorithms that use mathematical functions to convert inputs into an encrypted output. They are commonly used \u2063for \u200cdata integrity checks, ensuring that data has not been modified while it is being sent over a network.\u2064 Examples of \u200bhash\u200c algorithms approved by FIPS\u2063 are SHA and MD5.<\/li>\n<\/ul>\n<p>FIPS-approved encryption algorithms are used to provide strong encryption for data\u200c in transit and at \u2063rest, helping to ensure the privacy and\u200c protection of sensitive \u2062data.<\/p>\n<h2 id=\"4-how-to-choose-the-right-fips-encryption-algorithm-for-you\"><span class=\"ez-toc-section\" id=\"4_How_to_Choose_the%E2%80%8C_Right_FIPS_Encryption_Algorithm_for_You\"><\/span>4. How to Choose the\u200c Right FIPS Encryption Algorithm for You<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Choosing the\u200d right FIPS encryption algorithm for your data needs is no small task. It can affect\u200c how secure your information\u2063 is \u200dand help keep\u200b it out of the wrong \u200bhands. Here\u2019s what you need to consider:<\/p>\n<p><b>Type of Algorithm:<b><\/b><\/b><\/p>\n<ul>\n<li><b><b>Symmetric: This type of algorithm \u2064uses the same key for both encryption and decryption. It\u2019s quicker and easier to use but also less secure.<\/b><\/b><\/li>\n<li><b><b>Asymmetric: This algorithm uses two different keys, one for encryption and one for decryption. It offers better security but requires \u200dmore computing power.<\/b><\/b><\/li>\n<\/ul>\n<p><b>Level\u2063 of Cryptography:<b><\/b><\/b><\/p>\n<ul>\n<li>Low security: \u200dThis \u2063type of cryptography\u200d offers basic security but won\u2019t protect against the most sophisticated hackers.<\/li>\n<li>High \u2064security: \u200bThis option is more complex and costly but is suitable for safeguarding sensitive or restricted information.<\/li>\n<li>Ultra-high security: This level is the most secure and reliable but also comes at the\u2064 greatest cost. \u200c<\/li>\n<\/ul>\n<p>Familiarize yourself with the range of encryption algorithms available and\u200b the type of threats each one can \u2062protect against. This will help you \u2062choose the right algorithm for your security needs. Ultimately, you\u2064 want to protect your data and keep it safe from\u2064 unauthorized access.<\/p>\n<p>FIPS encryption algorithms play a crucial role in ensuring the security of sensitive information in various systems and networks. These algorithms are designed to meet stringent security requirements, with FIPS 140-2 compliance being a key factor in ensuring that encryption algorithms meet the highest standards for security. With key lengths ranging from 256-bit to 2048-bit, FIPS encryption algorithms provide a high level of security against unauthorized users and attacks. The algorithms for encryption are tested for validation requirements through FIPS 140-2 validation process.<\/p>\n<p>Which includes environmental failure testing and security testing to ensure the algorithms are secure and resistant to attacks. The use of FIPS-validated cryptography and modules in government systems, corporate networks, and cloud services provides a layer of security that is essential in protecting data from potential threats. FIPS encryption algorithms also incorporate key lifecycle management mechanisms, secure generation of digital signatures, and protection against tampering to enhance the overall security of the encryption process. Additionally, FIPS encryption algorithms are designed to mitigate attacks and provide protection in diverse environments, ensuring the confidentiality, integrity, and availability of sensitive information. Sources: NIST FIPS 140-2 and FIPS 140-3 standards, Trenton Systems, Bruce Schneier.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cryptographic_Security_Measures_Comparison_Table\"><\/span>Cryptographic Security Measures Comparison Table<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Security Measure<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Transport Layer Security<\/td>\n<td>Protocol providing communication security over a network<\/td>\n<\/tr>\n<tr>\n<td>Physical Security Mechanisms<\/td>\n<td>Measures to protect physical access to system components<\/td>\n<\/tr>\n<tr>\n<td>MD5 Algorithm<\/td>\n<td>Hash function providing 128-bit hash values for data integrity<\/td>\n<\/tr>\n<tr>\n<td>Role-Based Authentication<\/td>\n<td>Authentication based on predefined user roles and permissions<\/td>\n<\/tr>\n<tr>\n<td>Logical Security Features<\/td>\n<td>Security measures implemented at the software\/application level<\/td>\n<\/tr>\n<tr>\n<td>Symmetric Block Cipher<\/td>\n<td>Encryption method using the same key for encryption and decryption<\/td>\n<\/tr>\n<tr>\n<td>Environmental Controls<\/td>\n<td>Measures to protect hardware and software against environmental hazards<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What are\u200d Fips Encryption Algorithms?<br \/>\nA: FIPS Encryption Algorithms are types of \u2063encryption algorithms that are set \u2064out by \u200bthe U.S. National Institute of Standards and Technology (NIST). These algorithms use a \u2064mathematical code to encrypt data, making\u200d it difficult to read without the right\u2062 key.<\/p>\n<p>Q: What is the purpose of FIPS \u200cEncryption Algorithms?<br \/>\nA: The purpose \u2064of using FIPS Encryption Algorithms \u2063is to keep data secure and provide reliable protection against unauthorized access.\u200c These algorithms ensure that only authorized users can access and view data, helping businesses and \u2062individuals protect their\u200b confidential information. \u2064<\/p>\n<p>Q: \u2063What are the \u200cadvantages of \u200busing FIPS Encryption Algorithms?<br \/>\nA: Using FIPS Encryption Algorithms has several advantages, including\u200c strong encryption that is difficult to crack and that is regularly updated to meet the latest security standards. \u2064It also provides high \u2064levels of data confidentiality, integrity, and\u2064 authentication as well as robust authentication \u200band key-exchange methods.<\/p>\n<p>Q: Are there any downsides of using \u2062FIPS\u2062 Encryption Algorithms?<br \/>\nA: Often the use of FIPS Encryption \u2062Algorithms requires additional hardware or software, which might add to \u2063the cost and complexity of using the algorithm.<\/p>\n<p>Q: What are FIPS Encryption Algorithms?<br \/>\nA: FIPS Encryption Algorithms refer to cryptographic algorithms that have been approved by the Federal Information Processing Standards (FIPS) for use in securing sensitive information in various applications and systems. These algorithms provide a level of security that meets the stringent requirements set forth by the government for protecting data.<\/p>\n<p>Q: What is the FIPS 140-2 standard?<br \/>\nA: The FIPS 140-2 standard is a federal government standard that specifies the security requirements for cryptographic modules used to protect sensitive information. It sets out strict security requirements for cryptographic operations, key management functions, and physical security measures to ensure the confidentiality, integrity, and availability of data.<\/p>\n<p>Q: What are the key components of FIPS-approved cryptographic algorithms?<br \/>\nA: FIPS-approved cryptographic algorithms include a range of security functions such as key generation, algorithm implementations, and security levels for protecting critical security parameters. These algorithms adhere to a set of security levels that define the level of protection offered against various security risks.<\/p>\n<p>Q: How do FIPS Encryption Algorithms mitigate security risks?<br \/>\nA: FIPS Encryption Algorithms mitigate security risks through rigorous testing and validation processes that ensure the algorithms meet the minimum security requirements specified in the FIPS 140-2 standard. These algorithms provide protection against physical attacks, sophisticated attacks, and brute-force attacks by implementing stringent security measures and controls.<\/p>\n<p>Q: What are the benefits of using FIPS Encryption Algorithms?<br \/>\nA: The benefits of using FIPS Encryption Algorithms include compliance with government security standards, protection against unauthorized access and data breaches, and assurance of secure cryptographic operations. These algorithms offer a high level of security and reliability for protecting sensitive information in various applications and systems.<\/p>\n<p>Q: How can organizations ensure FIPS compliance?<br \/>\nA: Organizations can ensure FIPS compliance by using FIPS-validated encryption modules, implementing security controls and policies that meet FIPS 140-2 security requirements, and regularly updating their cryptographic systems to address security vulnerabilities. Compliance testing and ongoing compliance efforts are essential for maintaining FIPS compliance in the long term.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Additionally, the algorithms can be quite complex and difficult to \u2064configure correctly, so it\u200d is \u200cimportant to ensure that you have adequate technical \u2064know-how and resources to help you set\u200b up and maintain \u200bthe algorithm. As you can see, \u2062Fips \u200dEncryption Algorithms can help keep \u2063private data \u2062secure and safe from prying \u2064eyes. To get the best out of your encryption algorithm, consider creating a free LogMeOnce account with\u2062 Cloud Encrypter. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>.com offers Zero Knowledge Security \u200ctechnology, so you can store your\u200c files securely in cloud storage sites. \u2063Click\u200b the link to get <a href=\"https:\/\/logmeonce.com\/free-mobile-security\/\">free cloud storage\u200d encryption<\/a> with LogMeOnce and \u2063get\u2062 ultimate, FIPS-approved encryption \u2063security technology.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>The world of digital security\u200d is ever-increasing and complex. As the use\u200d of online platforms\u2064 for\u200c a range of activities from commerce to communication\u200d expand, \u2062the need for \u200bappropriate\u2063 safeguards and encryption protocols becomes increasingly vital. One such protocol which is widely used is the FIPS Encryption Algorithms. FIPS stands\u200c for Federal \u200cInformation Processing Standard [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24719],"tags":[3765,9913,3282,1738,14493,781],"class_list":["post-90857","post","type-post","status-publish","format-standard","hentry","category-cloud-security","tag-data-protection-2","tag-algorithms","tag-cryptography","tag-encryption","tag-fips","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/90857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=90857"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/90857\/revisions"}],"predecessor-version":[{"id":234742,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/90857\/revisions\/234742"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=90857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=90857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=90857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}