Advertisement

SSH Keys & Asymmetric encryption

SSH Keys & Asymmetric encryption Tutorial and explanation

FOR CLARIFICATION:
X) SSH PUB KEY generated & copied from client to remote server’s .ssh/authorizedkeys file
XX) client uses ssh userid@ip to remote into server
XXX) remote server checks the authorized Key file for pub key match
IV) generates string + encrypts public key sends it back to decrypt private key on host machine
V) authorized access

You can use PUTTY to SSH from a windows machine to a Linux machine. SSH is not only used on Linux !

linux,asymmetric encryption,ssh,ssh keys,

Post a Comment

0 Comments