{"id":6833,"date":"2021-05-23T19:37:00","date_gmt":"2021-05-23T19:37:00","guid":{"rendered":"https:\/\/museoupdating.webs.upv.es\/?p=6833"},"modified":"2024-10-02T10:14:12","modified_gmt":"2024-10-02T10:14:12","slug":"el-origen-de-la-criptografia-de-clave-publica","status":"publish","type":"post","link":"https:\/\/museo.inf.upv.es\/en\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/","title":{"rendered":"The origin of Public-key Cryptography"},"content":{"rendered":"<p style=\"text-align: justify;\">This workshop shows the mathematic foundation of the asymmetric cyphering systems used in nowadays computers. Through some practical activities we will explain differences between public and private key, Kerckhoffs\u2019 principle, Diffie-Hellman algorithm and we will try to break them. This workshop requires the visitors to have some mathematical concepts clear (factorisation, prime numbers), so it is recommended for undergraduate students.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-1 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-1 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-1' class='gallery galleryid-6833 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/Asymmetric_cryptography_-_step_2.svg-300x201-1.png'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"201\" src=\"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/Asymmetric_cryptography_-_step_2.svg-300x201-1.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/Asymmetric_cryptography_-_step_2.svg-300x201-1.png 300w, https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/Asymmetric_cryptography_-_step_2.svg-300x201-1-272x182.png 272w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/diffie_hellman.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"199\" src=\"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/diffie_hellman-300x199.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/diffie_hellman-300x199.jpg 300w, https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/diffie_hellman.jpg 442w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg\" class=\"attachment-medium size-medium\" alt=\"\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>This workshop shows the mathematic foundation of the asymmetric cyphering systems used in nowadays computers. Through some practical activities we will explain differences between public and private key, Kerckhoffs\u2019 principle, Diffie-Hellman algorithm and we will try to break them. This workshop requires the visitors to have some mathematical concepts clear (factorisation, prime numbers), so it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[32,36],"tags":[],"class_list":{"0":"post-6833","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-actividades","8":"category-talleres-de-criptografia-y-criptoanalisis","10":"post-with-thumbnail","11":"post-with-thumbnail-large"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0\" \/>\n<meta property=\"og:description\" content=\"This workshop shows the mathematic foundation of the asymmetric cyphering systems used in nowadays computers. Through some practical activities we will explain differences between public and private key, Kerckhoffs\u2019 principle, Diffie-Hellman algorithm and we will try to break them. This workshop requires the visitors to have some mathematical concepts clear (factorisation, prime numbers), so it [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/\" \/>\n<meta property=\"og:site_name\" content=\"Web del Museo de Inform\u00e1tica 2.0\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-23T19:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-02T10:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/#\\\/schema\\\/person\\\/9f82a696f97371a0f9e6f23e0da65816\"},\"headline\":\"The origin of Public-key Cryptography\",\"datePublished\":\"2021-05-23T19:37:00+00:00\",\"dateModified\":\"2024-10-02T10:14:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/\"},\"wordCount\":268,\"image\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/museo.inf.upv.es\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg\",\"articleSection\":[\"Activities\",\"\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/\",\"url\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/\",\"name\":\"The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/museo.inf.upv.es\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg\",\"datePublished\":\"2021-05-23T19:37:00+00:00\",\"dateModified\":\"2024-10-02T10:14:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/#\\\/schema\\\/person\\\/9f82a696f97371a0f9e6f23e0da65816\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#primaryimage\",\"url\":\"https:\\\/\\\/museo.inf.upv.es\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg\",\"contentUrl\":\"https:\\\/\\\/museo.inf.upv.es\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg\",\"width\":300,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/blog\\\/2021\\\/05\\\/23\\\/el-origen-de-la-criptografia-de-clave-publica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/museo.inf.upv.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[:es] El Origen de la Criptograf\u00eda de Clave P\u00fablica[:va]L\u2019origen de la Criptografia de Clau p\u00fablica[:en]The origin of Public-key Cryptography[:]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/#website\",\"url\":\"https:\\\/\\\/museo.inf.upv.es\\\/\",\"name\":\"Web del Museo de Inform\u00e1tica 2.0\",\"description\":\"Web del Museo de Inform\u00e1tica 2.0\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/museo.inf.upv.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/museo.inf.upv.es\\\/#\\\/schema\\\/person\\\/9f82a696f97371a0f9e6f23e0da65816\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9f352161874544fa6990d31156f55c0e75298eef9ef7234da7b2596dcdf3e80f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9f352161874544fa6990d31156f55c0e75298eef9ef7234da7b2596dcdf3e80f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9f352161874544fa6990d31156f55c0e75298eef9ef7234da7b2596dcdf3e80f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/museoinf.webs.upv.es\"],\"url\":\"https:\\\/\\\/museo.inf.upv.es\\\/en\\\/blog\\\/author\\\/museoinfnueva\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/","og_locale":"en_US","og_type":"article","og_title":"The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0","og_description":"This workshop shows the mathematic foundation of the asymmetric cyphering systems used in nowadays computers. Through some practical activities we will explain differences between public and private key, Kerckhoffs\u2019 principle, Diffie-Hellman algorithm and we will try to break them. This workshop requires the visitors to have some mathematical concepts clear (factorisation, prime numbers), so it [&hellip;]","og_url":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/","og_site_name":"Web del Museo de Inform\u00e1tica 2.0","article_published_time":"2021-05-23T19:37:00+00:00","article_modified_time":"2024-10-02T10:14:12+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#article","isPartOf":{"@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/"},"author":{"name":"admin","@id":"https:\/\/museo.inf.upv.es\/#\/schema\/person\/9f82a696f97371a0f9e6f23e0da65816"},"headline":"The origin of Public-key Cryptography","datePublished":"2021-05-23T19:37:00+00:00","dateModified":"2024-10-02T10:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/"},"wordCount":268,"image":{"@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#primaryimage"},"thumbnailUrl":"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg","articleSection":["Activities",""],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/","url":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/","name":"The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0","isPartOf":{"@id":"https:\/\/museo.inf.upv.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#primaryimage"},"image":{"@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#primaryimage"},"thumbnailUrl":"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg","datePublished":"2021-05-23T19:37:00+00:00","dateModified":"2024-10-02T10:14:12+00:00","author":{"@id":"https:\/\/museo.inf.upv.es\/#\/schema\/person\/9f82a696f97371a0f9e6f23e0da65816"},"breadcrumb":{"@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#primaryimage","url":"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg","contentUrl":"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg","width":300,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/museo.inf.upv.es\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/museo.inf.upv.es\/"},{"@type":"ListItem","position":2,"name":"[:es] El Origen de la Criptograf\u00eda de Clave P\u00fablica[:va]L\u2019origen de la Criptografia de Clau p\u00fablica[:en]The origin of Public-key Cryptography[:]"}]},{"@type":"WebSite","@id":"https:\/\/museo.inf.upv.es\/#website","url":"https:\/\/museo.inf.upv.es\/","name":"Web del Museo de Inform\u00e1tica 2.0","description":"Web del Museo de Inform\u00e1tica 2.0","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/museo.inf.upv.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/museo.inf.upv.es\/#\/schema\/person\/9f82a696f97371a0f9e6f23e0da65816","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9f352161874544fa6990d31156f55c0e75298eef9ef7234da7b2596dcdf3e80f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9f352161874544fa6990d31156f55c0e75298eef9ef7234da7b2596dcdf3e80f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f352161874544fa6990d31156f55c0e75298eef9ef7234da7b2596dcdf3e80f?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/museoinf.webs.upv.es"],"url":"https:\/\/museo.inf.upv.es\/en\/blog\/author\/museoinfnueva\/"}]}},"_links":{"self":[{"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/posts\/6833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/comments?post=6833"}],"version-history":[{"count":3,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/posts\/6833\/revisions"}],"predecessor-version":[{"id":6836,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/posts\/6833\/revisions\/6836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/media\/6591"}],"wp:attachment":[{"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/media?parent=6833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/categories?post=6833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/museo.inf.upv.es\/en\/wp-json\/wp\/v2\/tags?post=6833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}