ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2011-10-13 2012-05-07
Restored revision 1317851607. Undoing revision 1318540081. (martin) (hidden) 5.0.7 blowfish is default (martin)
Line 41: Line 41:
SSH clients and servers can use a number of encryption methods. In the older SSH-1 protocol, 3DES and DES are typically used. SSH clients and servers can use a number of encryption methods. In the older SSH-1 protocol, 3DES and DES are typically used.
SSH-2 adds support for additional encryption methods including AES and SSH-2 adds support for additional encryption methods including AES and
-Blowfish. By default, AES is used if supported by the server. While AES is+Blowfish. By default, Blowfish is used if supported by the server. While AES is
considered to be highly secure, AES encryption requires substantial processor overhead. Blowfish is also considered considered to be highly secure, AES encryption requires substantial processor overhead. Blowfish is also considered
secure, but with less computational overhead, it's also theoretically secure, but with less computational overhead, it's also theoretically
easier to perform a brute-force attack. Depending on your security and easier to perform a brute-force attack. Depending on your security and
performance requirements, you may wish to configure WinSCP to prefer performance requirements, you may wish to configure WinSCP to prefer
-the Blowfish algorithm. 3DES and DES are used with SSH-1 servers. DES+the AES algorithm. 3DES and DES are used with SSH-1 servers. DES
is widely regarded as insecure, as the resources to perform an is widely regarded as insecure, as the resources to perform an
exhaustive brute-force attack have been well within the realm of exhaustive brute-force attack have been well within the realm of

Last modified: by martin