{"id":1408,"date":"2020-04-25T17:16:03","date_gmt":"2020-04-25T11:46:03","guid":{"rendered":"https:\/\/binaryterms.com\/?p=1408"},"modified":"2021-01-18T11:44:50","modified_gmt":"2021-01-18T06:14:50","slug":"feistel-block-cipher","status":"publish","type":"post","link":"https:\/\/binaryterms.com\/feistel-block-cipher.html","title":{"rendered":"Feistel Block Cipher"},"content":{"rendered":"<p><strong>Feistel block cipher<\/strong> is a structure used to derive many symmetric block ciphers such as <a href=\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\" target=\"_blank\" rel=\"noopener noreferrer\">DES<\/a> which we have discussed in our previous content. Feistel cipher proposed a structure which implements <strong>substitution<\/strong> and <strong>permutation<\/strong> alternately to obtain cipher text from the pain text and vice-versa.<\/p>\n<p>In the Feistel block cipher, each block has to undergo many rounds where each round has the same function. In this context, we will discuss the structure proposed by Feistel for developing the block ciphers.<\/p>\n<h2>Content: Feistel Block Cipher<\/h2>\n<ol>\n<li><a href=\"#WhatisFeistelBlockCipher?\">What is Feistel Block Cipher?<\/a><\/li>\n<li><a href=\"#FeistelCipherStructure\">Feistel Cipher Structure<\/a><\/li>\n<li><a href=\"#FeistelDecryptionAlgorithm\">Feistel Decryption Algorithm<\/a><\/li>\n<li><a href=\"#KeyTakeaways\">Key Takeaways<\/a><\/li>\n<\/ol>\n<p><a name=\"WhatisFeistelBlockCipher?\"><\/a><\/p>\n<h3>What is Feistel Cipher?<\/h3>\n<p>Feistel cipher is a structure proposed by a <strong>Horst Feistel<\/strong> which was considered while developing many symmetric block ciphers. Actually, the structure proposed by Feistel is based on the <strong>Shannon structure<\/strong> which was proposed in 1945. The Shannon structure shows the implementation of confusion and diffusion alternately.<\/p>\n<p><strong>Confusion<\/strong> fabricates a complex relation between the <strong>cipher text<\/strong> and <strong>encryption key<\/strong>\u00a0by implementing a complex <strong>substitution<\/strong> algorithm. Whereas, the <strong>diffusion<\/strong> fabricates a complex relation between <strong>plain text<\/strong> and <strong>cipher text<\/strong>\u00a0by implementing more complex <strong>permutation<\/strong> algorithm.<\/p>\n<p>The Shannon structure was successful in achieving a more complex block cipher and thus confusion and diffusion were adopted by the Feistel structure.<\/p>\n<p>Feistel cipher proposed the structure that alternately implements substitution and permutation. <strong>Substitution<\/strong> is implemented by replacing the elements of plain text or the set of elements of plain text by the element of cipher text or set of elements of cipher text.<\/p>\n<p>A<b> permutation<\/b> is implemented by changing the order of elements of the plain text. No element here is replaced by any other element, only the order of elements is changed. Now, let us proceed towards the structure of Feistel cipher.<br \/>\n<a name=\"FeistelCipherStructure\"><\/a><\/p>\n<h3>Feistel Cipher Structure<\/h3>\n<p>To understand the Feistel cipher in a better way observe the figure below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1410\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg\" alt=\"Feistel Cipher Encryption\" width=\"317\" height=\"692\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg 317w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption-137x300.jpg 137w\" sizes=\"auto, (max-width: 317px) 100vw, 317px\" \/><\/p>\n<p><strong>Step 1:<\/strong> The plain text is divided into the blocks of a fixed size and only one block is processed at a time. So, the input to encryption algorithm is a plain text block and a key K.<\/p>\n<p><strong>Step 2:<\/strong> The plain text block is divided into two equal halves which we will denote as a <strong>LE<sub>0<\/sub><\/strong> as the left half of the plain text block and <strong>RE<sub>0<\/sub><\/strong> as the right half of the plain text block. Now, both these halves of the plain text block (LE<sub>0<\/sub> &amp; RE<sub>0<\/sub>) undergoes multiple rounds to produce ciphertext block.<\/p>\n<p>In each round, the <strong>encryption function<\/strong> is applied on the right half <strong>RE<sub>i<\/sub><\/strong> of the plaintext block along with the key K<sub>i<\/sub>. The result of this encryption function is then <strong>XORed<\/strong> with the left half <strong>LE<\/strong><sub><strong>i<\/strong>. <\/sub>The result of XOR function becomes the new right half for next round <strong>RE<sub>i+1<\/sub><\/strong>. Whereas, the old right half RE<sub>i <\/sub>becomes the new left half <strong>LE<sub>i+1 <\/sub><\/strong>for the next round as you can see in the figure above.<\/p>\n<p>Each round executes the same function. In each round initially, a <strong>substitution<\/strong> function is implemented by applying the round function or the encryption function on the right half of the plain text block. The result of this round function is XORed by the with the left half of the block. After this substitution function, a <strong>permutation<\/strong> function is implemented by swapping the two halves and the result of this permutation is provided to the next round.<\/p>\n<p>This is how Feistel cipher structure presents the application of substitution and permutation alternately which is similar to the Shannon structure.<\/p>\n<p>The design features of Feistel cipher that are considered while implementing any block cipher are as follow:<\/p>\n<ul>\n<li><strong>Block Size<br \/>\n<\/strong>The block cipher is considered more secure if the block size is larger. But the larger block size can reduce the execution speed of encryption and decryption. Generally, the block size of a block cipher is of 64-bit. But, the modern-day block cipher such as AES has 128-bit block size.<\/li>\n<li><strong>Key Size<br \/>\n<\/strong>The security of block cipher increases with the increasing key size. But the large key size may decrease the speed of encryption and decryption. Earlier the key of 64-bit was considered to adequate. But the modern cipher uses a key of size 128-bit.<\/li>\n<li><strong>Number of rounds<br \/>\n<\/strong>The number of rounds also increases the security of the block cipher. More are the number of rounds more complex is the cipher.<\/li>\n<li><strong>Subkey generation function<br \/>\n<\/strong>More the subkey generation function is complex, difficult it is for a cryptanalyst to crack it.<\/li>\n<li><strong>Round Function<br \/>\n<\/strong>Complex round function enhances the security of the block cipher.<\/li>\n<li><strong>Fast Software Encryption\/Decryption<br \/>\n<\/strong>The block cipher is implemented in a software application to achieve better execution speed.<\/li>\n<li><strong>Easy Analysis<br \/>\n<\/strong>The block cipher algorithm should be easy to analyze because it would ease in analyzing the cryptanalytic weakness and develop more strength in the algorithm.<br \/>\n<a name=\"FeistelDecryptionAlgorithm\"><\/a><\/li>\n<\/ul>\n<h3>Feistel Decryption Algorithm<\/h3>\n<p>Feistel Cipher structure does not have a different algorithm for decryption. The encryption and decryption function proposed by Feistel cipher are same with some rules which are as follows:<\/p>\n<ol>\n<li>The input to the decryption algorithm is a cipher text block produced by the encryption algorithm.<\/li>\n<li>The sequence of subkeys used in encryption are reversed. The key K<sub>n<\/sub> is used in the first round of decryption, key K<sub>n-1 <\/sub>in the second round of decryption and so on, until the last round occurs where key K<sub>1 <\/sub>is used.<\/li>\n<\/ol>\n<p>To understand the structure of decryption, look at the figure below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1411\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Decryption.jpg\" alt=\"Feistel Cipher Decryption\" width=\"308\" height=\"689\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Decryption.jpg 308w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Decryption-134x300.jpg 134w\" sizes=\"auto, (max-width: 308px) 100vw, 308px\" \/><\/p>\n<p>As you can observe in the figure above the cipher text block has two halves left half (LD<sub>0<\/sub>) and the right half (RD<sub>0<\/sub>). Where LD<sub>0 <\/sub>= RE<sub>16 <\/sub>and RD<sub>0 <\/sub>= LE<sub>16.<\/sub><\/p>\n<p>Now as in encryption algorithm, the round function is performed on the right half of cipher block with the key K<sub>16<\/sub> and the result of the round function is XORed with the left half of the cipher text block.<\/p>\n<p>The output of the XOR function is now considered as new right half i.e.RD<sub>1<\/sub> and the RD<sub>0<\/sub> swaps with LD<sub>0 <\/sub>and becomes the new left half LD<sub>1 <\/sub>for the next round.<\/p>\n<p>Each round has the same function and after the fixed number of rounds, the plain text block is obtained.<br \/>\n<a name=\"KeyTakeaways\"><\/a><\/p>\n<h3>Key Takeaways<\/h3>\n<div id=\"keytake\">\n<ul>\n<li>Feistel cipher was based on the structure proposed by <strong>Shannon<\/strong>.<\/li>\n<li>Shannon structure has an alternate implementation of <strong>diffusion<\/strong> and <strong>confusion<\/strong> to obtain cipher text block.<\/li>\n<li>Feistel cipher structure has alternate application <strong>substitution<\/strong> and <strong>permutation <\/strong>on plain text block to obtain cipher text block.<\/li>\n<li>Feistel block cipher operates on each block independently.<\/li>\n<li>The encryption and decryption algorithm in Feistel cipher is the same.<\/li>\n<li>The <strong>key<\/strong> used for encryption and decryption is the <strong>same<\/strong> but the sequence of application of subkey is reversed.<\/li>\n<li>During encryption a plain text block undergoes multiple rounds. But the function performed in each round is same.<\/li>\n<li>Generally, 16 rounds are performed in Feistel cipher.<\/li>\n<li>Typical block size of Feistel cipher is 64-bit but modern block cipher uses 128-bit block.<\/li>\n<li>Typical key size of Feistel cipher is 64-bit but modern block cipher has 128-bit key size.<\/li>\n<\/ul>\n<\/div>\n<p>So, this is all about the Feistel block cipher, its structure, design features.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Feistel block cipher is a structure used to derive many symmetric block ciphers such as DES which we have discussed in our previous content. Feistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa. In the Feistel block cipher, each block has to undergo [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9],"tags":[],"class_list":{"0":"post-1408","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-security","7":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Feistel Block Cipher? Definition, Encryption and Decryption Structure - Binary Terms<\/title>\n<meta name=\"description\" content=\"eistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/binaryterms.com\/feistel-block-cipher.html\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Feistel Block Cipher? Definition, Encryption and Decryption Structure - Binary Terms\" \/>\n<meta property=\"og:description\" content=\"eistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/binaryterms.com\/feistel-block-cipher.html\" \/>\n<meta property=\"og:site_name\" content=\"Binary Terms\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-25T11:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-18T06:14:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg\" \/>\n<meta name=\"author\" content=\"Neha T\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neha T\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html\"},\"author\":{\"name\":\"Neha T\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\"},\"headline\":\"Feistel Block Cipher\",\"datePublished\":\"2020-04-25T11:46:03+00:00\",\"dateModified\":\"2021-01-18T06:14:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html\"},\"wordCount\":1162,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/binaryterms.com\/feistel-block-cipher.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html\",\"url\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html\",\"name\":\"What is Feistel Block Cipher? Definition, Encryption and Decryption Structure - Binary Terms\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg\",\"datePublished\":\"2020-04-25T11:46:03+00:00\",\"dateModified\":\"2021-01-18T06:14:50+00:00\",\"description\":\"eistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa.\",\"breadcrumb\":{\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/binaryterms.com\/feistel-block-cipher.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg\",\"width\":317,\"height\":692,\"caption\":\"Feistel Cipher Encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/binaryterms.com\/feistel-block-cipher.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/binaryterms.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Feistel Block Cipher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/binaryterms.com\/#website\",\"url\":\"https:\/\/binaryterms.com\/\",\"name\":\"Binary Terms\",\"description\":\"The Computer Science &amp; IT Guide\",\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/binaryterms.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/binaryterms.com\/#organization\",\"name\":\"Binary Terms\",\"url\":\"https:\/\/binaryterms.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"width\":400,\"height\":63,\"caption\":\"Binary Terms\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\",\"name\":\"Neha T\",\"url\":\"https:\/\/binaryterms.com\/author\/author\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Feistel Block Cipher? Definition, Encryption and Decryption Structure - Binary Terms","description":"eistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/binaryterms.com\/feistel-block-cipher.html","og_locale":"en_GB","og_type":"article","og_title":"What is Feistel Block Cipher? Definition, Encryption and Decryption Structure - Binary Terms","og_description":"eistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa.","og_url":"https:\/\/binaryterms.com\/feistel-block-cipher.html","og_site_name":"Binary Terms","article_published_time":"2020-04-25T11:46:03+00:00","article_modified_time":"2021-01-18T06:14:50+00:00","og_image":[{"url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg","type":"","width":"","height":""}],"author":"Neha T","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Neha T","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#article","isPartOf":{"@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html"},"author":{"name":"Neha T","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe"},"headline":"Feistel Block Cipher","datePublished":"2020-04-25T11:46:03+00:00","dateModified":"2021-01-18T06:14:50+00:00","mainEntityOfPage":{"@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html"},"wordCount":1162,"commentCount":1,"publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"image":{"@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg","articleSection":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/binaryterms.com\/feistel-block-cipher.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html","url":"https:\/\/binaryterms.com\/feistel-block-cipher.html","name":"What is Feistel Block Cipher? Definition, Encryption and Decryption Structure - Binary Terms","isPartOf":{"@id":"https:\/\/binaryterms.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage"},"image":{"@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg","datePublished":"2020-04-25T11:46:03+00:00","dateModified":"2021-01-18T06:14:50+00:00","description":"eistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa.","breadcrumb":{"@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/binaryterms.com\/feistel-block-cipher.html"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#primaryimage","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Feistel-Cipher-Encryption.jpg","width":317,"height":692,"caption":"Feistel Cipher Encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/binaryterms.com\/feistel-block-cipher.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/binaryterms.com\/"},{"@type":"ListItem","position":2,"name":"Feistel Block Cipher"}]},{"@type":"WebSite","@id":"https:\/\/binaryterms.com\/#website","url":"https:\/\/binaryterms.com\/","name":"Binary Terms","description":"The Computer Science &amp; IT Guide","publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/binaryterms.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/binaryterms.com\/#organization","name":"Binary Terms","url":"https:\/\/binaryterms.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","width":400,"height":63,"caption":"Binary Terms"},"image":{"@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe","name":"Neha T","url":"https:\/\/binaryterms.com\/author\/author"}]}},"_links":{"self":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/comments?post=1408"}],"version-history":[{"count":3,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1408\/revisions"}],"predecessor-version":[{"id":2214,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1408\/revisions\/2214"}],"wp:attachment":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/media?parent=1408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/categories?post=1408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/tags?post=1408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}