top of page
  • Eric Ilmberger

SSH Encryption Analysis

Eric Ilmberger

CNT52 Network Fundamentals

I did a little more research on symmetrical and asymmetrical encryption because it wasn't described well in testout. Symmetrical encryption uses a shared key that when entered allows the user to read the data. Symmetrical keys are used in SSH to secure the entire connection to prevent password snooping. Asymmetrical encryption uses two different keys, a private key and a public key. Either key can be used to encrypt data but the opposite one must be used to decrypt the data. Using this system anyone with the public key can send messages but only the private key can decrypt those messages. Only with a combination of the private and public key does a message become readable. There are also a number of signatures to determine if the message has been tampered with.


Related Posts

See All
Featured Posts
Recent Posts
Posts By Category
Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare
bottom of page