What is SSH? How it works?

What is SSH? How SSH works? SSH handshaking, encryption and Security.

What is SSH?

Secure Shell (SSH) was developed in 1995 by "Tatu Ylönen". It is a cryptographic network protocol used for operating network services securely over an unsecured network.  Applications include remote command-line authentication using the secure tunnel, any network service can be secured with SSH.


The standard "TCP port 22" has been assigned for contacting SSH servers.

SSH uses public-key cryptography(AES, DES, or RSA) to authenticate the remote computer and allow it to authenticate the user, if necessary.  AES is the strongest among all and is recommended to use. 

Ways to use SSH:

Tools like PuTTy, MobaXterm, SecureCRT, etc are used to establish connections. It is used to manage sessions, keys, data, etc. This tool automatically generates the public-private key pairs so you can easily use them for a network connection. Using it we can also create our own keys.

It is based on the function of encryption. It was designed to replacement of telnet. Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. In this scenario, anyone can produce a matching pair of different keys (public and private). 

The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is based on the private key, the key itself is never transferred through the network during authentication. SSH only verifies whether the same person offering the public key owns the matching private key.

Usage

SSH uses the client-server model. SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports, and X11 connections; it can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols. 

'''For more information about security, connection establishment, and data transfer security. (Coming soon)'''

Post a Comment