Principle Analysis of SSH protocol

Source: Internet
Author: User
Tags asymmetric encryption

Daily operation and maintenance work, now we are generally using remote connection tools to operate the server remotely, after all, we usually use the Windows system! Someone would say, "Hey, isn't it dangerous to connect to the Linux operating system through Windows Remote Tools and not leak when the data is passed?"

The answer is yes. But smart humans have developed such a tool called Xshell, or free of charge Oh! This tool uses an SSH asymmetric encryption protocol, which is a lot more secure than the symmetric encryption method of Telnet.

Here's what to explain about asymmetric encryption:


650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M00/89/B5/wKioL1gasLHyMZqWAABkj2E3rY0133.png-wh_500x0-wm_3 -wmp_4-s_1223854125.png "title=" Qq20161103113642.png "alt=" Wkiol1gaslhymzqwaabkj2e3ry0133.png-wh_50 "/>

The above image is a method of transmitting data through asymmetric encryption.

Suppose that the small head wants to send a file to the big one, as shown in:

First of all, small heads have their own passwords, the big head also has its own password, and they generate the public and private keys. Here we can treat the public key as a lock and the private key as the key. In order to be safe, the small head must not be able to disclose their passwords to the big head, then need to open their own files.

The small head to the big big said: If you want me to pass the file to you, take your lock (public key) to bring. Then the small head of the lock and the lock at the same time hanging on the file, then the file to the big head, the big head through their private key (key) to open their own public key to extract data. If the small head wants to see the data, open its own public key with its own private key, which is asymmetric encryption.


Haha, is not very simple ah!

This article is from the "Brother Hong Linux World" blog, so be sure to keep this source http://zhengkangkang.blog.51cto.com/12015643/1868846

Principle Analysis of SSH protocol

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.