{"id":19520,"date":"2025-07-09T09:28:18","date_gmt":"2025-07-09T09:28:18","guid":{"rendered":"https:\/\/blog.prepbytes.com\/?p=19520"},"modified":"2025-07-09T09:28:18","modified_gmt":"2025-07-09T09:28:18","slug":"understanding-aes-the-core-of-modern-encryption-explained","status":"publish","type":"post","link":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/","title":{"rendered":"Understanding AES: The Core of Modern Encryption Explained"},"content":{"rendered":"<p>Whenever you send a message, pay online, or backup files to the cloud, encryption is operating behind the scenes to keep your information safe using AES cryptography. In the centre of this secure digital experience is the Advanced Encryption Standard (AES).<\/p>\n<p>AES was officially approved by NIST (National Institute of Standards and Technology) in 2001 to replace the ageing DES algorithm, a new standard for the entire world&#8217;s encryption. This article details the explanation of AES in a simple format suitable for interview preparation.<br \/>\nBefore learning about Advanced Encryption Standard (AES), its classification must be understood first symmetric encryption.<\/p>\n<h2>Symmetric vs. Asymmetric Encryption<\/h2>\n<p><strong>Symmetric Encryption<\/strong><br \/>\nSymmetric encryption depends on a single shared secret key for both encrypting and decrypting data. AES is one of the most commonly used examples of this method.<\/p>\n<p><strong>Asymmetric Encryption<\/strong><br \/>\nIn Asymmetric encryption, there is a pair of keys, a public and a private, with one key encrypting the data, and another key decrypting the data. RSA is an example of this method.<\/p>\n<h2>Block Cipher Basics<\/h2>\n<p>AES is an algorithm type of Block Cipher which encrypts the data in a fixed-size block (128 bits). Unlike stream ciphers that handle data bit by bit, block ciphers like AES process chunks of information, offering stronger and more structured security.<\/p>\n<h2>Key Size in AES<\/h2>\n<p>Advanced Encryption Standard (AES) is supported with three key lengths<\/p>\n<ul>\n<li>AES-128: 128-bit key<\/li>\n<li>AES-192: 192-bit key<\/li>\n<li>AES-256: 256-bit key<\/li>\n<\/ul>\n<p>Most generally, the longer the encryption key, the harder it is to crack. Take AES-128, for example, cracking it by brute force with today\u2019s computing power would take billions of years, making it practically unbreakable.<\/p>\n<h3>Importance of Key Management<\/h3>\n<p>Although AES is very good in itself, the issue of how to handle encryption keys is something that remains a major challenge. Ensuring how keys are stored, shared and handled during their entire lifecycle forms a major factor in the security of any encrypted system.<\/p>\n<h2>Creation of Round Keys<\/h2>\n<p>AES uses a process called key expansion, or key scheduling, to generate a series of round keys from the original key. This makes sure that each round of encryption or decryption uses a different key derived from the main one.<\/p>\n<h2>The AES Encryption: A Step-by-Step Guide<\/h2>\n<p>Advanced Encryption Standard (AES Cryptography) encryption transforms plaintext into ciphertext through a series of mathematical operations known as rounds. The number of rounds in AES encryption changes based on the length of the key used in the process.<\/p>\n<ul>\n<li>10 rounds for AES-128<\/li>\n<li>12 rounds for AES-192<\/li>\n<li>14 rounds for AES-256<\/li>\n<\/ul>\n<h2>High-Level Overview<\/h2>\n<p>Each round of AES involves four main steps<\/p>\n<ul>\n<li>SubBytes<\/li>\n<li>ShiftRows<\/li>\n<li>MixColumns<\/li>\n<li>AddRoundKey<\/li>\n<\/ul>\n<h3>SubBytes<\/h3>\n<p>This is a substitution step.<\/p>\n<ul>\n<li>Every byte in the 4&#215;4 matrix is substituted using an S-box, which acts like a lookup table.<\/li>\n<li>No byte is replaced by itself or its complement.<\/li>\n<li>This introduces non-linearity and confusion.<\/li>\n<\/ul>\n<h3>ShiftRows<\/h3>\n<p>This is a permutation step.<\/p>\n<p>Each row of the matrix is moved to the left.<\/p>\n<ul>\n<li>Row 1: No shift<\/li>\n<li>Row 2: Shift left by 1<\/li>\n<li>Row 3: Shift left by 2<\/li>\n<li>Row 4: Shift left by 3<\/li>\n<\/ul>\n<p>Before<\/p>\n<p>[ b0  | b1  | b2  | b3  ]<br \/>\n[ b4  | b5  | b6  | b7  ]<br \/>\n[ b8  | b9  | b10 | b11 ]<br \/>\n[ b12 | b13 | b14 | b15 ]<\/p>\n<p>After<\/p>\n<p>[ b0  | b1  | b2  | b3  ]<br \/>\n[ b5  | b6  | b7  | b4  ]<br \/>\n[ b10 | b11 | b8  | b9  ]<br \/>\n[ b15 | b12 | b13 | b14 ]<\/p>\n<h3>Mix Columns<\/h3>\n<p>Another permutation step.<\/p>\n<ul>\n<li>Each column is multiplied by a fixed matrix.<\/li>\n<li>This spreads byte influence across the matrix.<\/li>\n<\/ul>\n<p>Example transformation<\/p>\n<p>[ c0 ]       [ 2  3  1  1 ]   [ b0 ]<br \/>\n[ c1 ]   =   [ 1  2  3  1 ] x [ b1 ]<br \/>\n[ c2 ]       [ 1  1  2  3 ]   [ b2 ]<br \/>\n[ c3 ]       [ 3  1  1  2 ]   [ b3 ]<\/p>\n<p>(Note: This step is not performed in the final round.)<\/p>\n<h3>Add Round Key<\/h3>\n<ul>\n<li>The matrix is then combined with the round key through an XOR operation.<\/li>\n<li>This is where the actual encryption happens by mixing in the key.<\/li>\n<\/ul>\n<p>The AES process proceeds for all the rounds. The final round of AES skips the MixColumns step.<\/p>\n<h2>AES Decryption<\/h2>\n<p>AES decryption works by reversing the steps of the encryption process. Each block (128 bits) passes through 10, 12, or 14 rounds depending on the key size.<\/p>\n<p>Each round of decryption goes through these steps<\/p>\n<ul>\n<li>Add round key<\/li>\n<li>Inverse MixColumns<\/li>\n<li>ShiftRows<\/li>\n<li>Inverse SubByte<\/li>\n<\/ul>\n<h3>AddRoundKey<\/h3>\n<p>XORs the state with the round key.<\/p>\n<h3>Inverse MixColumns<\/h3>\n<p>Matrix multiplication is performed using a constant matrix that differs from the one used in encryption.<\/p>\n<p>Example<\/p>\n<p>[ b0 ]   [ 14 11 13 9 ]   [ c0 ]<br \/>\n[ b1 ] = [ 9  14 11 13 ] x [ c1 ]<br \/>\n[ b2 ]   [ 13 9  14 11 ]   [ c2 ]<br \/>\n[ b3 ]   [ 11 13 9  14 ]   [ c3 ]<\/p>\n<h3>Inverse ShiftRows<\/h3>\n<p>The row shifts are reversed by moving them to the right.<\/p>\n<h3>Inverse SubBytes<\/h3>\n<p>The bytes are replaced using the inverse S-box, which undoes the SubBytes transformation.<\/p>\n<p>These reversed steps collectively restore the original plaintext from the ciphertext.<\/p>\n<h2>AES Key Expansion (Key Schedule)<\/h2>\n<p>AES generates a different round key for each stage using a key scheduling algorithm.<\/p>\n<h3>Key Expansion Process<\/h3>\n<p>Start with the initial cipher key.<\/p>\n<p>For each new round key<\/p>\n<ul>\n<li>Apply byte rotation (RotWord).<\/li>\n<li>Substitute bytes using the S-box (SubWord).<\/li>\n<li>Add a constant using Rcon.<\/li>\n<li>XOR with previous key data.<\/li>\n<\/ul>\n<p>This ensures cryptographic uniqueness for every round.<\/p>\n<h2>Why AES cryptography is Highly Trusted<\/h2>\n<ul>\n<li>Resistant to cryptographic attacks<\/li>\n<li>Supports strong key lengths<\/li>\n<li>Efficient in both hardware and software<\/li>\n<\/ul>\n<h2>Real-World Applications<\/h2>\n<ul>\n<li>HTTPS &amp; TLS<\/li>\n<li>VPNs &amp; Network Encryption<\/li>\n<li>Disk and File Encryption<\/li>\n<li>Wi-Fi Security (WPA2\/WPA3)<\/li>\n<\/ul>\n<h2>AES in Interview Preparation<\/h2>\n<p>Frequently Asked Questions in the interview<\/p>\n<ol>\n<li>What is AES, and how does it work?<\/li>\n<li>How does symmetric encryption differ from asymmetric encryption?<\/li>\n<li>What are AES key lengths and their associated rounds?<\/li>\n<li>Explain each AES step in simple terms.<\/li>\n<li>Where is AES used in practice?<\/li>\n<\/ol>\n<p><strong>Conclusion<\/strong><\/p>\n<p>AES is a basic element in current data protection. From its initial design of having symmetric constructs to its transformational processes, this building block has become a permanent structure in securing communication in different platforms and industries. Its popularity and strong architecture demonstrate its efficiency and resistance to modern risks.<\/p>\n<p>Whether you are learning about cybersecurity, getting yourself ready for technical interviews or working with modern AES cryptography technologies, knowledge of AES is beneficial for the long term, professionally. It is not only with technical understanding but also with awareness regarding the importance of data protection in a growing digital environment \u2013 the more one knows about how AES works, the better.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whenever you send a message, pay online, or backup files to the cloud, encryption is operating behind the scenes to keep your information safe using AES cryptography. In the centre of this secure digital experience is the Advanced Encryption Standard (AES). AES was officially approved by NIST (National Institute of Standards and Technology) in 2001 [&hellip;]<\/p>\n","protected":false},"author":52,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-19520","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding AES: The Core of Modern Encryption Explained<\/title>\n<meta name=\"description\" content=\"Learn how AES (Advanced Encryption Standard) powers modern cybersecurity. Explore its key sizes, encryption process, benefits, and real-world use cases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding AES: The Core of Modern Encryption Explained\" \/>\n<meta property=\"og:description\" content=\"Learn how AES (Advanced Encryption Standard) powers modern cybersecurity. Explore its key sizes, encryption process, benefits, and real-world use cases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"PrepBytes Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/prepbytes0211\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-09T09:28:18+00:00\" \/>\n<meta name=\"author\" content=\"Prepbytes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prepbytes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\"},\"author\":{\"name\":\"Prepbytes\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e\"},\"headline\":\"Understanding AES: The Core of Modern Encryption Explained\",\"datePublished\":\"2025-07-09T09:28:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\"},\"wordCount\":998,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/43.205.93.38\/#organization\"},\"articleSection\":[\"Miscellaneous\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\",\"url\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\",\"name\":\"Understanding AES: The Core of Modern Encryption Explained\",\"isPartOf\":{\"@id\":\"http:\/\/43.205.93.38\/#website\"},\"datePublished\":\"2025-07-09T09:28:18+00:00\",\"description\":\"Learn how AES (Advanced Encryption Standard) powers modern cybersecurity. Explore its key sizes, encryption process, benefits, and real-world use cases.\",\"breadcrumb\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/43.205.93.38\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Miscellaneous\",\"item\":\"https:\/\/prepbytes.com\/blog\/category\/miscellaneous\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Understanding AES: The Core of Modern Encryption Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/43.205.93.38\/#website\",\"url\":\"http:\/\/43.205.93.38\/\",\"name\":\"PrepBytes Blog\",\"description\":\"ONE-STOP RESOURCE FOR EVERYTHING RELATED TO CODING\",\"publisher\":{\"@id\":\"http:\/\/43.205.93.38\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/43.205.93.38\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/43.205.93.38\/#organization\",\"name\":\"Prepbytes\",\"url\":\"http:\/\/43.205.93.38\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp\",\"contentUrl\":\"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp\",\"width\":160,\"height\":160,\"caption\":\"Prepbytes\"},\"image\":{\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/prepbytes0211\/\",\"https:\/\/www.instagram.com\/prepbytes\/\",\"https:\/\/www.linkedin.com\/company\/prepbytes\/\",\"https:\/\/www.youtube.com\/channel\/UC0xGnHDrjUM1pDEK2Ka5imA\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e\",\"name\":\"Prepbytes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g\",\"caption\":\"Prepbytes\"},\"url\":\"https:\/\/prepbytes.com\/blog\/author\/gourav-jaincollegedekho-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding AES: The Core of Modern Encryption Explained","description":"Learn how AES (Advanced Encryption Standard) powers modern cybersecurity. Explore its key sizes, encryption process, benefits, and real-world use cases.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/","og_locale":"en_US","og_type":"article","og_title":"Understanding AES: The Core of Modern Encryption Explained","og_description":"Learn how AES (Advanced Encryption Standard) powers modern cybersecurity. Explore its key sizes, encryption process, benefits, and real-world use cases.","og_url":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/","og_site_name":"PrepBytes Blog","article_publisher":"https:\/\/www.facebook.com\/prepbytes0211\/","article_published_time":"2025-07-09T09:28:18+00:00","author":"Prepbytes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prepbytes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#article","isPartOf":{"@id":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/"},"author":{"name":"Prepbytes","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e"},"headline":"Understanding AES: The Core of Modern Encryption Explained","datePublished":"2025-07-09T09:28:18+00:00","mainEntityOfPage":{"@id":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/"},"wordCount":998,"commentCount":0,"publisher":{"@id":"http:\/\/43.205.93.38\/#organization"},"articleSection":["Miscellaneous"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/","url":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/","name":"Understanding AES: The Core of Modern Encryption Explained","isPartOf":{"@id":"http:\/\/43.205.93.38\/#website"},"datePublished":"2025-07-09T09:28:18+00:00","description":"Learn how AES (Advanced Encryption Standard) powers modern cybersecurity. Explore its key sizes, encryption process, benefits, and real-world use cases.","breadcrumb":{"@id":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/prepbytes.com\/blog\/understanding-aes-the-core-of-modern-encryption-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/43.205.93.38\/"},{"@type":"ListItem","position":2,"name":"Miscellaneous","item":"https:\/\/prepbytes.com\/blog\/category\/miscellaneous\/"},{"@type":"ListItem","position":3,"name":"Understanding AES: The Core of Modern Encryption Explained"}]},{"@type":"WebSite","@id":"http:\/\/43.205.93.38\/#website","url":"http:\/\/43.205.93.38\/","name":"PrepBytes Blog","description":"ONE-STOP RESOURCE FOR EVERYTHING RELATED TO CODING","publisher":{"@id":"http:\/\/43.205.93.38\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/43.205.93.38\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/43.205.93.38\/#organization","name":"Prepbytes","url":"http:\/\/43.205.93.38\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/","url":"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp","contentUrl":"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp","width":160,"height":160,"caption":"Prepbytes"},"image":{"@id":"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/prepbytes0211\/","https:\/\/www.instagram.com\/prepbytes\/","https:\/\/www.linkedin.com\/company\/prepbytes\/","https:\/\/www.youtube.com\/channel\/UC0xGnHDrjUM1pDEK2Ka5imA"]},{"@type":"Person","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e","name":"Prepbytes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g","caption":"Prepbytes"},"url":"https:\/\/prepbytes.com\/blog\/author\/gourav-jaincollegedekho-com\/"}]}},"_links":{"self":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/19520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/comments?post=19520"}],"version-history":[{"count":1,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/19520\/revisions"}],"predecessor-version":[{"id":19521,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/19520\/revisions\/19521"}],"wp:attachment":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/media?parent=19520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/categories?post=19520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/tags?post=19520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}