SSH Encryption Analysis

Eric Ilmberger

CNT52 Network Fundamentals

I did a little more research on symmetrical and asymmetrical encryption because it wasn't described well in testout. Symmetrical encryption uses a shared key that when entered allows the user to read the data. Symmetrical keys are used in SSH to secure the entire connection to prevent password snooping. Asymmetrical encryption uses two different keys, a private key and a public key. Either key can be used to encrypt data but the opposite one must be used to decrypt the data. Using this system anyone with the public key can send messages but only the private key can decrypt those messages. Only with a combination of the private and public key does a message become readable. There are also a number of signatures to determine if the message has been tampered with.

References

https://support.microsoft.com/en-us/help/246071/description-of-symmetric-and-asymmetric-encryption

https://en.wikipedia.org/wiki/Public-key_cryptography

#Network #Network #CNT52 #Encryption #Cryptography

Featured Posts
Recent Posts
Archive
Search By Tags
No tags yet.
Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2021 by Donald E. Hester

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare