SSH Encryption: Difference between revisions
Created page with "Secure Shell (SSH) is a cryptographic network protocol meant to secure communications over an insecure connection between network devices. One of the ways SSH does this is by..." |
No edit summary |
||
Line 2: | Line 2: | ||
This article will discuss and explore, among other things, the possible ways of creating SSH-keys, the underlying methods of encryption and some general best practices. | This article will discuss and explore, among other things, the possible ways of creating SSH-keys, the underlying methods of encryption and some general best practices. | ||
==Introduction== | ==Introduction== |
Revision as of 14:29, 21 February 2017
Secure Shell (SSH) is a cryptographic network protocol meant to secure communications over an insecure connection between network devices. One of the ways SSH does this is by using public-key cryptography. SSH is most commonly used as a means for secure remote login and command execution, often in the context of a client-server interaction. SSH by default utilizes the standard TCP port 22, was originally designed to replace protocols like Telnet which sent data in plain-text form and file transfer protocols like SCP and SFTP are based on it.
This article will discuss and explore, among other things, the possible ways of creating SSH-keys, the underlying methods of encryption and some general best practices.
Introduction
RSA vs EdDSA
See Also
References
External Links
Other Details
Author: Frank Korving
Last Modified: 21.02.2017