

{"id":163454,"date":"2022-09-28T14:38:58","date_gmt":"2022-09-28T09:08:58","guid":{"rendered":"https:\/\/www.jigsawacademy.com\/?p=163454"},"modified":"2022-09-30T14:34:01","modified_gmt":"2022-09-30T09:04:01","slug":"overview-hill-cipher-encryption-and-decryption-with-examples","status":"publish","type":"post","link":"https:\/\/www.jigsawacademy.com\/blogs\/cyber-security\/overview-hill-cipher-encryption-and-decryption-with-examples\/","title":{"rendered":"Overview: Hill Cipher (Encryption and Decryption) With Examples | UNext Jigsaw"},"content":{"rendered":"<h2><strong>Introduction<\/strong><\/h2>\n<p>Cryptography is the science of securely studying and practicing communication using unique methods, thus preventing any third person or organization from accessing any kind of sensitive information. Various aspects, such as authentication, data integrity, confidentiality, etc., play a crucial role in modern cryptography concepts. Cyphers was a common concept to deliver secret messages in the early days. Several methods have emerged in the history of cryptography that built the fundamentals of modern algorithms.<\/p>\n<p>Hill Cipher has figured out several primary methods in classical cryptography, using multiple methods of mathematics. Despite modern advancements, Hill Cipher provides a simple and unique way of hiding messages in plain sight.<br \/>\nHill Cipher in cryptography was invented and developed in 1929 by Lester S. Hill, a renowned American mathematician. Hill Cipher is Digraphic in nature but can expand to multiply any size of letters, adding more complexity and reliability for better use.<\/p>\n<ol>\n<li><a class=\"rank-math-link\" href=\"#What-is-Hill-Cipher?\"><strong>What is Hill Cipher?<\/strong><\/a><\/li>\n<li><a class=\"rank-math-link\" href=\"#Hill-Cipher-Encryption\"><strong>Hill Cipher Encryption<\/strong><\/a><\/li>\n<li><a class=\"rank-math-link\" href=\"#Hill-Cipher-Decryption\"><strong>Hill Cipher Decryption<\/strong><\/a><\/li>\n<li><strong><a class=\"rank-math-link\" href=\"#Security-Aspects-for-Hill-Cipher\">Security Aspects for Hill Cipher<\/a><\/strong><\/li>\n<li><a href=\"#Advantages-Of-Hill-Cipher\"><strong>Advantages Of Hill Cipher\u00a0<\/strong><\/a><\/li>\n<\/ol>\n<h2 id=\"What-is-Hill-Cipher?\" class=\"has-vivid-cyan-blue-color has-text-color\">1) <strong>What is Hill Cipher?<\/strong><\/h2>\n<p>In the pretext of classical cryptography, Hill Cipher represents a polygraphic substitution cipher that follows a uniform substitution across multiple levels of blocks.<br \/>\n<!-- New Code Start --><\/p>\n<p><a class=\"all-link\"><img decoding=\"async\" class=\"blog-desk-banner\" src=\"https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-03.webp\" alt=\"Desktop Banner\" title=\"\"> <img decoding=\"async\" class=\"blog-mob-banner\" src=\"https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-01.webp\" alt=\"Mobile Banner\" title=\"\"><\/a><\/p>\n<p><!-- New Code Ends --><br \/>\nHere, polygraphic substitution cipher defines that Hill Cipher can work seamlessly with digraphs (two-letter blocks), trigraphs (three-letter blocks), or any multiple-sized blocks for building a uniform cipher.<br \/>\nHill Cipher is based on a particular mathematical topic of linear Algebra and the sophisticated use of matrices in general, as well as rules for modulo arithmetic. As a prerequisite, it would be better for learners and professionals to have a sound understanding of both linear Algebra and Matrices. Thus, most of the problems and solutions for Hill Ciphers are mathematical, making it easy to withhold or hide letters precisely.<br \/>\nWe will study Hill Cipher encryption and decryption procedures in solving 2&#215;2 and 3&#215;3 matrices. Although it can be used for higher matrices (4&#215;4, 5&#215;5, or 6&#215;6), it also requires a higher and advanced level of mathematics, adding more complexity. Here, we have used simple examples that provide in-depth knowledge on this topic.<\/p>\n<h2 id=\"Hill-Cipher-Encryption\" class=\"has-vivid-cyan-blue-color has-text-color\">2) <strong>Hill Cipher Encryption<\/strong><\/h2>\n<p>Generally, the below-mentioned structure of numbers and letters are used in the Hill Cipher Encryption, but this can be modified as per requirement.<\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Letter<\/strong><\/td>\n<td>A<\/td>\n<td>B<\/td>\n<td>C<\/td>\n<td>D<\/td>\n<td>E<\/td>\n<td>F<\/td>\n<td>G<\/td>\n<td>H<\/td>\n<td>I<\/td>\n<td>J<\/td>\n<td>K<\/td>\n<td>L<\/td>\n<td>M<\/td>\n<td>N<\/td>\n<td>O<\/td>\n<td>P<\/td>\n<td>Q<\/td>\n<td>R<\/td>\n<td>S<\/td>\n<td>T<\/td>\n<td>U<\/td>\n<td>V<\/td>\n<td>W<\/td>\n<td>X<\/td>\n<td>Y<\/td>\n<td>Z<\/td>\n<\/tr>\n<tr>\n<td><strong>Number<\/strong><\/td>\n<td>0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td>3<\/td>\n<td>4<\/td>\n<td>5<\/td>\n<td>6<\/td>\n<td>7<\/td>\n<td>8<\/td>\n<td>9<\/td>\n<td>10<\/td>\n<td>11<\/td>\n<td>12<\/td>\n<td>13<\/td>\n<td>14<\/td>\n<td>15<\/td>\n<td>16<\/td>\n<td>17<\/td>\n<td>18<\/td>\n<td>19<\/td>\n<td>20<\/td>\n<td>21<\/td>\n<td>22<\/td>\n<td>23<\/td>\n<td>24<\/td>\n<td>25<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>For encrypting a message, one starts with each block having n letters and then multiplied with an n x n matrix, in parallel with modulus 26. Subsequently, each block needs to be multiplied by the inverse matrix for decryption.<\/p>\n<h3><strong>Hill Cipher 2&#215;2 example<\/strong><\/h3>\n<p><!-- New Code Start --><\/p>\n<p><a class=\"all-link\"><img decoding=\"async\" class=\"blog-desk-banner\" src=\" https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-02.webp\" alt=\"Desktop Banner\" title=\"\"> <img decoding=\"async\" class=\"blog-mob-banner\" src=\"https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-01.webp\" alt=\"Mobile Banner\" title=\"\"><\/a><\/p>\n<p><!-- New Code Ends --><br \/>\nIn this Hill Cipher, 2&#215;2 matrix process, the primary step starts with a keyword that we must convert into a matrix. Depending on the length of the keyword, if it is shorter than three words, then fill it up in alphabetical order. And for longer than 4 words, the first four letters are used in the matrix.<\/p>\n<p>Following the above, in the letter and number table, each letter is converted into a specific number in parallel with its position. Here, the input message is SHORTER EXAMPLE with key as HILL and from the table, we can take:<\/p>\n<p>H = 7, L = 11<\/p>\n<p>I = 8, L = 11<br \/>\n<!-- New Code Start --><\/p>\n<p><a class=\"all-link\"><img decoding=\"async\" class=\"blog-desk-banner\" src=\"https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-03.webp\" alt=\"Desktop Banner\" title=\"\"> <img decoding=\"async\" class=\"blog-mob-banner\" src=\"https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-01.webp\" alt=\"Mobile Banner\" title=\"\"><\/a><\/p>\n<p><!-- New Code Ends --><br \/>\nThey are represented in the vector or key matrix form as below.<br \/>\nThese digraphs follow a simple pattern for transforming into a matrix. The first letter goes to the top of the matrix, and the second at the bottom of the first column only, and so on.<br \/>\nSo for the input message \u2018shorter example\u2019, it can be represented as the following<br \/>\nSimilarly, these vector forms are subsequently taken in the number form, as each letter takes the appropriate parallel number.<br \/>\nNow for the next step, we take the key matrix and multiply it with the first column, using the standard algebraic rules in the case of matrix multiplication.<br \/>\nSo in this Hill Cipher example, we can write this as:<br \/>\nAnd then following the rules, it becomes:<br \/>\nOr in the matrix form as,<br \/>\nAnd then we will be performing the modulo 26 (i.e., dividing the number by 26, and then using the remainder)<br \/>\nSubsequently, then we can change these two letters into ciphertext represented as \u2018AP\u2019.<br \/>\nHere the whole calculation for this Hill Cipher encryption can be taken in the following form:<\/p>\n<h3><strong>Hill Cipher 3&#215;3 example<\/strong><\/h3>\n<p>Now we will take an example for a 3&#215;3 matrix for encryption, using the input message \u2018retreat now\u2019. Here the key phrase is given as BACK UP, and we have to convert this key phrase into a matrix.<br \/>\nAs we can see, there are only 6 letters, and we need at least 9 letters for a 3&#215;3 matrix. So we are going to fill the rest of the matrix as the flow of the alphabets.<br \/>\nChanging these letters with parallel numbers for a key matrix:<br \/>\nNow take the input message of \u2018retreat now\u2019 into trigraphs (in the form of a 3&#215;3 matrix as a group of 3 letters) and write them as column vectors.<br \/>\nAlso, we can see there are 10 letters, and it will not fit perfectly into column vectors. So we will add some null characters to fill them accordingly.<br \/>\nAnd replacing them with the numbers as:<br \/>\nNow we will perform multiplication with each column with the key matrix. Here all the standard rules are followed for matrix multiplication.<br \/>\nHere the process for multiplication involves using the first or top row (a,b,c) to multiply with each element of the column vector (x,y,z), and then adding them respectively for one large number as (ax + by + cz), and then following the same rule for each of the three vectors.<br \/>\nSo for our example, we place the key matrix with our first column of the message as:<br \/>\nAnd now performing multiplication for these two as:<br \/>\nNow the result comes as:<br \/>\nAnd then performing the modulo 26 as per the encryption process.<br \/>\nThen changing them into letters as;<br \/>\nThe complete calculation can be represented as the following:<br \/>\nThe second part of the calculation is:<br \/>\nAnd the third part of the calculation is:<br \/>\nAnd the last part of the matrix calculation is:<br \/>\nThe rest of the three multiplication performances give us a complete final ciphertext represented as \u2018DPQ,\u2019 \u2018RQE,&#8217; \u2018VKP,\u2019 and \u2018QLR.\u2019<\/p>\n<h2 id=\"Hill-Cipher-Decryption\" class=\"has-vivid-cyan-blue-color has-text-color\">3) <strong>Hill Cipher Decryption<\/strong><\/h2>\n<p>Starting the Decryption process in Hill Cipher cryptography, the first step is to get the inverse matrix. Here, it is a crucial aspect to calculate and find the key matrix represented as the general method:<br \/>\nHere,<br \/>\nK = key matrix of the message,<br \/>\nd = determinant for the key matrix,<br \/>\nadj(K) = adjugate matrix for the K.<br \/>\nOnce we obtain the inverse matrix, then it is multiplied with column text of the ciphertext, then modulo to get the remainder, and then transformed into letters for the desired result.<br \/>\nSo the process for decryption is the same, with the inverse matrix being the main difference.<\/p>\n<h3><strong>Hill Cipher example 2&#215;2 decryption<\/strong><\/h3>\n<p>And now, following the same 2&#215;2 matrix from the above encryption example, with keyword \u2018hill\u2019 and ciphertext as \u2018APADJ TFTWLFJ\u2019.<br \/>\nStarting the keyword in the matrix form and then the subsequent numerical form as:<br \/>\nNow we will find the inverse matrix as follows:<br \/>\n<strong>Step 1: Calculate the multiplicative inverse for the determinant.<\/strong><br \/>\nThe determinant is essential and directly related to the matrix values. We can find the determinant value by multiplying the top left number and the right bottom number and then subsequently subtracting this from the product of the other two (i.e., top right corner and bottom left number).<br \/>\nSo the formula for a 2&#215;2 matrix is given as:<br \/>\nDeterminant = (top left number x right bottom number) \u2013 (top right number x left bottom number)<br \/>\nNote: The determinant value is a direct value, not any bracket or matrix around that.<br \/>\nOnce we have the value, the numerical values are passed through modulo 26 for a reminder, and it can be represented as:<br \/>\nAnd now for the multiplicative inverse of this determinant value:<br \/>\nCalculate a number between 1 and 25 respectively that gives the remainder 1 when multiplied by the determinant. For our example, we have to find a number that multiplied by 15 gives a remainder of 1 for the modulo 26.<br \/>\nNow, with huge advancements, there are algorithms to find this value. But you can also use the trial and error method to find the exact value.<br \/>\nOn simple calculations, we can find the number 7 that satisfies the above equation and also lies between 1 and 25, respectively.<br \/>\n<strong>Step 2: Value for Adjugate Matrix<\/strong><br \/>\nAdjugate matrix is defined as the transpose of its original cofactor matrix. A general method for adjugate matrix is given by:<br \/>\nHere, you can just swap the inner elements of the matrix and its sign for the inner elements.<br \/>\nAnd for negative values, we have to add them with 26 to get the desired values between 0 and 25 for use in the decryption formula.<br \/>\nSo for your example, we have the following procedure:<br \/>\nNow taking the values from step 1 and step 2 for the Multiplicative inverse and Adjugate matrix, respectively, we come to the following calculations:<br \/>\nIn our example, we can do this by following:<br \/>\nAnd we can stand with the inverse key matrix as:<br \/>\nNow use the first two letters from the ciphertext as AP and then multiply with the inverse matrix for modulo 26. Here, the whole equation can be represented as follows:<br \/>\nNow we get the first two letters as &#8216;sh.\u2019 Similarly, we solve for the rest of the ciphertext as APADJ TFTWLFJ. In conclusion, you will find the original message for a \u2018short example.\u2019<\/p>\n<h3><strong>Hill Cipher 3&#215;3 example<\/strong><\/h3>\n<p>Now let us take an example for a 3&#215;3 matrix, with ciphertext SYICHOLER and keyword as an alphabet. Starting with the first step to transform this key phrase into a matrix:<br \/>\nYou might have observed an extra A in the end. This is done to complete the matrix in case there are fewer elements in the keyword by following the alphabet&#8217;s order.<br \/>\nThe key matrix is then changed for each letter with a number:<br \/>\nNow we will follow the steps for finding the inverse matrix for this message:<br \/>\n<strong>Step 1: Calculate the multiplicative inverse for the Determinant.<\/strong><br \/>\nThere are some changes to the 3&#215;3 matrix in finding the determinant method. Here the 3&#215;3 matrix is multiplied with a 2&#215;2 matrix. This 2&#215;2 matrix is made of the same matrix elements by removing both the top row and the left column. And then, the middle value of the multiplication is subtracted from the other two. Here the formula looks like this:<br \/>\nAnd for our example, we have the following values:<br \/>\nWith the multiplicative inverse process, we have to find a number between 1 and 25 that gives the value of 1 on multiplication with the determinant value.<br \/>\nFor our case, we have to find the number of multiplication by 11 that satisfies 1 modulo 26.<br \/>\nWith modern algorithms, these values can be seamlessly obtained, but they can also be found using the trial and error method.<br \/>\nFor our example, the value that satisfies the above equation is 19. And we will use this number to find the inverse key matrix for the decryption process.<br \/>\n<strong>Step 2: Calculate the Adjugate Matrix.<\/strong><br \/>\nFor the 3&#215;3 matrix, the formula to obtain the Adjugate matrix is represented as<br \/>\nAt first look, we can see it is quite complex. Now there are 9 2&#215;2 matrices and different sign arrangements to obtain 9 determinant values. Then you have to pass the value with modulo 26 to obtain the Adjugate matrix, respectively<br \/>\n<strong>Step 3: Finalising the inverse matrix value.<\/strong><br \/>\nThe inverse matrix value can be obtained by multiplying the multiplicate values inverse from step 1, and the Adjugate matrix from step 2, respectively, and then using module 26 to get the exact values for the inverse matrix for use in the decryption process.<br \/>\nThis inverse matrix can be found in the following way:<br \/>\nTo better understand the example, here is a key and inverse key matrix representation.<br \/>\nAnd then using this inverse matrix with our key phrase first column as,<br \/>\nAnd the second column as<br \/>\nFinally, the third column as<br \/>\nWe can then assemble the three values as &#8216;WEA\u2019, &#8216;RES,\u2019 and \u2018AFE\u2019 to get the hidden message as \u2018We are safe\u2019 with the Hill Cipher decryption method.<\/p>\n<h3><strong>Hill Cipher 3&#215;3 example<\/strong><\/h3>\n<p>Let&#8217;s take another example of the input message &#8216;ACT&#8217; with key GYBNQKURP and the output value for ciphertext as &#8216;POH.\u2019 We will follow Hill Cipher Encryption and Decryption methods in this example.<br \/>\nStarting with ACT as represented in the matrix as A = 0, C = 2, and T as 19, respectively, given in the form of the following matrix.<br \/>\nAnd the key matrix here comes with GYBNQKURP. Taking the clues from the top table of alphabets and numbers values now:<br \/>\nGYB = 6 24 1<br \/>\nNQK = 13 16 10<br \/>\nURP = 20 17 15<br \/>\nNow, here the complete matrix is enciphered as the following vector form of a matrix:<br \/>\nAnd if you look closely, the last column in the above image represents the ciphertext as \u2018POH\u2019.<br \/>\nSimilarly, if we have an input message as CAT, then the values in the matrix are:<br \/>\nCAT = ( 2 0 19) or<br \/>\nNow this time, the enciphered values in the vector will be:<br \/>\nThe desired values now can be represented as \u2018FIN\u2019 from (F = 5, I = 8, N = 13) respectively.<br \/>\nAnd for the Hill Cipher Decryption process, we use the ciphertext to find the inverse matrix.<br \/>\nAnd then using the last ciphertext again as \u2018POH&#8217;; to get the original message of ACT.<br \/>\nNote: You can use any programming method to implement Hill Cipher cryptography, such as C++, C#, Java, Python, etc.<\/p>\n<h2 id=\"Security-Aspects-for-Hill-Cipher\" class=\"has-vivid-cyan-blue-color has-text-color\">4) <strong>Security Aspects for Hill Cipher<\/strong><\/h2>\n<p>Hill Cipher, when dealing with 2&#215;2 matrices, is easily solvable. And with modern cryptography solutions taking on as high as 256 combinations of numbers, Hill Ciphers are fairly weak, even when compared with similar Bifid or Playfair cypher systems.<br \/>\nHill Cipher has a proven vulnerability to the known-plaintext attack, as it has a linear dependency. Systems with linear ciphertext pairs can easily break the Hill Cipher matrices that follow only the standard algebraic algorithms for solutions.<br \/>\nUsing a higher level of matrix multiplications doesn&#8217;t add more security to the system but can complement diffusion on mixing with non-linear operations. Several Modern advanced encryption methods (AES) use different diffusion to further secure their system.<\/p>\n<h2 id=\"Advantages-Of-Hill-Cipher\" class=\"has-vivid-cyan-blue-color has-text-color\"><span data-contrast=\"auto\">5) Advantages Of Hill Cipher<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<ul>\n<li><span data-contrast=\"auto\">It is extremely effective in concealing single-letter frequencies<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">For hiding both single-letter and two-letter frequency information, 3&#215;3 hill ciphers are extremely efficient. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Cipher provides great security against any kind of attack made through cipher text.<\/span><\/li>\n<\/ul>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>Hill Cipher in cryptography was among the first polygraphic cypher systems that were built on the practical system using more than three symbols or letters in one.<br \/>\nEncryption and Decryption both play a crucial aspect in understanding the use of Hill Cipher in general. Here, the learners should know that any possible matrix in the system does not represent a key matrix. But to decrypt a cypher, you must have an inverse key matrix.<br \/>\nNow, you can use the determinant method to know whether the inverse exists or not. So, if the value of the determinant comes out to be 0, or shares a factor other than 1, it represents that the matrix does not have an inverse. In that case, you have to find or choose a different key matrix to decrypt a cypher.<br \/>\n<!-- New Code Start --><\/p>\n<p><a class=\"all-link\"><img decoding=\"async\" class=\"blog-desk-banner\" src=\" https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-02.webp\" alt=\"Desktop Banner\" title=\"\"> <img decoding=\"async\" class=\"blog-mob-banner\" src=\"https:\/\/www.jigsawacademy.com\/wp-content\/uploads\/2022\/06\/CS-01.webp\" alt=\"Mobile Banner\" title=\"\"><\/a><\/p>\n<p><!-- New Code Ends --><br \/>\nOn the other hand, a usable or key Matrix with non-zero determinants must have a coprime component directly to the alphabet&#8217;s overall length for getting results from a cypher.<br \/>\nThe use of Hill Cipher in the modern era is quite less or non-existent. Still, in the learning curve of cryptography, it played a crucial role. Security of the Hill Cipher, when compared with Playfair or Bifid cyphers, are the same, or slightly less.<br \/>\nHill Cipher 2&#215;2 matrices are quite simple, and messages are solvable, but as you proceed further, these calculations become complex, requiring an in-depth understanding of the higher mathematics. Lester S. Hill designed a unique machine for a 6&#215;6 matrix cypher that had proven a higher level of security, though its key settings were still not configurable, which limited its practical applications. Learn more about Ciphers and navigate your way with them via our <a href=\"https:\/\/www.jigsawacademy.com\/program\/postgraduate-certificate-program-in-cybersecurity\/\">Postgraduate Certificate Program in Cybersecurity<\/a>. Master the nuances of Cybersecurity in just 8-month with this robust program.<\/p>\n<h2>Also Read<\/h2>\n<ul>\n<li><strong><a class=\"rank-math-link rank-math-link\" href=\"https:\/\/www.jigsawacademy.com\/blogs\/cyber-security\/playfair-cipher\/\">Playfair Cipher: A Beginner&#8217;s Guide In 5 Important Points<\/a><\/strong><\/li>\n<li><a href=\"https:\/\/www.jigsawacademy.com\/blogs\/cyber-security\/ethical-hacking\/\"><strong>Ethical Hacking: A Comprehensive Guide In 2<\/strong><\/a><strong><a href=\"https:\/\/www.jigsawacademy.com\/blogs\/cyber-security\/ethical-hacking\/\">020<\/a><\/strong><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Cryptography is the science of securely studying and practicing communication using unique methods, thus preventing any third person or organization from accessing any kind of sensitive information. Various aspects, such as authentication, data integrity, confidentiality, etc., play a crucial role in modern cryptography concepts. Cyphers was a common concept to deliver secret messages in [&hellip;]<\/p>\n","protected":false},"author":2640,"featured_media":170931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[673],"tags":[3931,7354,3934,3933,7352,7355,3932,7356,7353,3935,7357],"form":[10312],"acf":[],"_links":{"self":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts\/163454"}],"collection":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/users\/2640"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/comments?post=163454"}],"version-history":[{"count":12,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts\/163454\/revisions"}],"predecessor-version":[{"id":253895,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts\/163454\/revisions\/253895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/media\/170931"}],"wp:attachment":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/media?parent=163454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/categories?post=163454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/tags?post=163454"},{"taxonomy":"form","embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/form?post=163454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}