About 50 results
Open links in new tab
  1. How does SSH encryption work? - Super User

    But if I need to encrypt data on the client for sending to the server, how does it happen? The public key encrypts data on the client? But how can the server decrypt it, if it only has the public key? How does …

  2. When is asymmetric and symmetric encryption used in SSH?

    Nov 2, 2018 · In the asymmetric encryption it looks like the shared secret key (symmetric key) is always used to encrypt/decrypt the messages between the client and server. I was confused why it's called …

  3. linux - How to change encryption algorithm for private key file using ...

    4 Using ssh-keygen, I need to generate a SSH private key file where the encryption algorithm used when using a passphrase is AES-128 with CBC mode. I know this is the default for OpenSSH >= 5.4 …

  4. How do I specify the key exchange method in OpenSSH?

    What I don't see is how to specify the method. In addition, I know every ssh server/client is required to support at least two methods: diffie-helleman-group1-sha1 and diffie-helleman-group14-sha1, but its …

  5. How to generate rsa-sha2-256 keys using ssh-keygen utility?

    Feb 17, 2023 · The "ssh-rsa" key type is used by the "ssh-rsa", "rsa-sha2-256" and "rsa-sha2-512" signature types. The ssh-rsa signature type is being deprecated, because of security concerns …

  6. SSH encryption during the session, is it symmetric (a la TLS) or ...

    May 12, 2023 · I states that session communication is implemented with asymmetric encryption, using two keypairs, one for the direction client->server, and an other one to server->client. All other Internet …

  7. How secure is an SSH tunnel or connection? - Super User

    I have often advised people to use an SSH tunnel to secure their browsing on open WIFIs or in other insecure situations. I was recently asked by a friend how secure a SSH tunnel is after I had sugg...

  8. encryption - How to use ssh-rsa public key to encrypt a text ...

    The idea is to generate a single-use symmetric key that is short enough to be encrypted using SSH public key. Then, you use the symmetric key to enrypt your text, and send both the encrypted text …

  9. ssh - How can I find a list of MACs, Ciphers, and KexAlgorithms that my ...

    Jan 24, 2015 · Is there a way to make ssh output what MACs, Ciphers, and KexAlgorithms that it supports? I'd like to find out dynamically instead of having to look at the source.

  10. Why does GitHub recommend ed25519 SSH key encryption ... - Super …

    Nov 18, 2021 · 1 GitHub's guide Generating a new SSH key and adding it to the ssh-agent recommends using ed25519 when configuring SSH keys for connecting to GitHub, but if you SSH to github.com, …