SSH Encryption: Difference between revisions

From ICO wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
Secure Shell (SSH) is a cryptographic network protocol meant to secure communications over an insecure connection between network devices. One of the ways SSH does this is by using public-key cryptography. SSH is most commonly used as a means for secure remote login and command execution, often in the context of a client-server interaction. SSH by default utilizes the standard TCP port 22, was originally designed to replace protocols like ''Telnet'' which sent data in plain-text form and file transfer protocols like ''SCP'' and ''SFTP'' are based on it.  
Secure Shell (SSH) is a cryptographic network protocol meant to secure communications over an insecure connection between network devices. One of the ways SSH does this is by using public/private key cryptography. SSH is most commonly used as a means for secure remote login and command execution, often in the context of a client-server interaction.  


This article will discuss and explore, among other things, the possible ways of creating SSH-keys, the underlying methods of encryption and some general best practices.  
This article will discuss and explore, among other things, the possible ways of creating SSH-keys, the underlying methods of encryption and some general best practices concerning interactions with servers and ssh key management. It is therefore complementary to the article: [https://wiki.itcollege.ee/index.php/SSH_for_beginners "SSH for beginners"]





Revision as of 11:40, 22 February 2017

Secure Shell (SSH) is a cryptographic network protocol meant to secure communications over an insecure connection between network devices. One of the ways SSH does this is by using public/private key cryptography. SSH is most commonly used as a means for secure remote login and command execution, often in the context of a client-server interaction.

This article will discuss and explore, among other things, the possible ways of creating SSH-keys, the underlying methods of encryption and some general best practices concerning interactions with servers and ssh key management. It is therefore complementary to the article: "SSH for beginners"


Introduction

RSA vs EdDSA

See Also

References

External Links

Other Details

Author: Frank Korving

Last Modified: 21.02.2017