Differences
This shows you the differences between the selected revisions of the page.
2017-04-10 | 2017-12-23 | ||
gender (martin) | no summary (213.87.133.213) (hidden) (untrusted) | ||
Line 4: | Line 4: | ||
The %%SSH%% employs a public key cryptography. A [[wp>Public-key_cryptography|public-key cryptography]], also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public.((&wikipedia_ref(Public-key_cryptography|Public-key cryptography))) Together they are known as a key-pair. In %%SSH%%, the public key cryptography is used in both directions (client to server and server to client), so two key pairs are used. One key pair is known as a host (server) key, the other as a user (client) key. | The %%SSH%% employs a public key cryptography. A [[wp>Public-key_cryptography|public-key cryptography]], also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public.((&wikipedia_ref(Public-key_cryptography|Public-key cryptography))) Together they are known as a key-pair. In %%SSH%%, the public key cryptography is used in both directions (client to server and server to client), so two key pairs are used. One key pair is known as a host (server) key, the other as a user (client) key. | ||
- | ===== User Private Key ===== | + | [[other_page|External Link]]===== User Private Key ===== |
A //user private key// is key that is kept secret by the SSH user on his/hers client machine. The user must never reveal the private key to anyone, including the server (server administrator), not to compromise his/hers identity. | A //user private key// is key that is kept secret by the SSH user on his/hers client machine. The user must never reveal the private key to anyone, including the server (server administrator), not to compromise his/hers identity. | ||