What is SSH?


SSH (Secure Shell) takes its place in Turkish language (Secure Protocol). This protocol service includes a variety of methods with strong authentication options as well as high encryption between two computers. Known as the secure protocol service, SSH enables an existing computer to establish a secure connection with a computer far away from it. As a result of these high-level security measures, it provides a great advantage to file transfer protocols such as Telnet or FTP, which are much less protected.

In the use of SSH, in addition to secure file transfer and connection sharing, various problems that occur for any reason can be solved instantly via remote connection. Data such as the network structure of the system or critical system components can be easily managed with SSH. SSH, which has open-source codes without compromise in the field of security, also has an automation system.

How the SSH Protocol Works?


In the current protocol, a connection is established between the user and the server. Sets a password for authentication when users initiate a connection to the SSH server. After the installation phase is over, the SSH protocol uses hash algorithms with strong and symmetric encryptions to ensure security between the user and the server. In this way, an end-to-end encrypted secure platform is created.

What are SSH Encryption Techniques?


Symmetric Encryption: Before the data sent by the user is transmitted, they are encrypted with AES (Advanced Encryption Standard) keys. The user's data providing access to the server is also decrypted with the AES key. A user who does not know this key cannot see the communication between the issuing and receiving machine. It is impossible to crack the password as this key is reset every time you log in.

Asymmetric Encryption: In this encryption technology, there is a situation that is the opposite of symmetric encryption. The keys that provide data transmission and resolution are independent of each other. One of these two keys is called “Public Key” and the other is called “Private Key”. When these two keys come together, they form the "Public Private" structure. For example, a file encrypted with a public key can only be decrypted with a private key.

Hashing: Data encrypted with this method differs from other encryption techniques. This system is designed so that data is never decrypted. For example, messages are encrypted one-way, and a unique message is formed with a certain length of code. This makes it impossible for the message to return.

« السابق

Powered by WHMCompleteSolution