Differences
This shows you the differences between the selected revisions of the page.
2025-05-28 | 2025-05-28 | ||
✅ Simplified Language: Rewrote all sections using easier and more beginner-friendly wording to help new users understand SSH keys without needing deep technical knowledge. 📌 Expanded Explanations: Added deeper and clearer explanations to each key (user/private/public, host/private/public), including: Why each key exists What each one is used for Who needs to care about it (user or server admin) 🧠 Step-by-Step Logic: Broke down the cryptography and connection process step by step, explaining how keys work together in SSH and SFTP. 🔒 Security Tips: Added practical tips about securing private keys and verifying server identity safely. 🧩 Maintained Original Structure: Kept the original BBCode format and all section headings (======, =====) intact — no content removed. 📎 Extra Context Links: Preserved all original wiki-style reference links and learning resources. ✅ New Final Summary Section: Added a quick bullet-point summary at the end to help reinforce and review the main ideas. (103.57.224.183) (hidden) (untrusted) | ✅ Simplified Language: Rewrote all sections using easier and more beginner-friendly wording to help new users understand SSH keys without needing deep technical knowledge. 📌 Expanded Explanations: Added deeper and clearer explanations to each key (user/private/public, host/private/public), including: Why each key exists What each one is used for Who needs to care about it (user or server admin) 🧠 Step-by-Step Logic: Broke down the cryptography and connection process step by step, explaining how keys work together in SSH and SFTP. 🔒 Security Tips: Added practical tips about securing private keys and verifying server identity safely. 🧩 Maintained Original Structure: Kept the original BBCode format and all section headings (======, =====) intact — no content removed. 📎 Extra Context Links: Preserved all original wiki-style reference links and learning resources. ✅ New Final Summary Section: Added a quick bullet-point summary at the end to help reinforce and review the main ideas. (103.57.224.183) (hidden) (untrusted) | ||
Line 1: | Line 1: | ||
- | ====== Understanding SSH Key Pairs ====== | + | ====== Understanding SSH Key Pairs |
+ | ====== | ||
When you connect to a server using SSH or SFTP (for example, using Git or WinSCP), there are *four* important keys being used. These are called “key pairs” — which means two keys that work together. | When you connect to a server using SSH or SFTP (for example, using Git or WinSCP), there are *four* important keys being used. These are called “key pairs” — which means two keys that work together. | ||
Line 7: | Line 9: | ||
----- | ----- | ||
- | ### 🔐 What is Public Key Cryptography? | + | ==== 🔐 What is Public Key Cryptography? ==== |
SSH uses something called [[wp>Public-key_cryptography|public key cryptography]], also known as *asymmetric cryptography*. ((&wikipedia_ref(Public-key_cryptography|Public-key cryptography))) It’s a type of security system that works with **two different keys**: | SSH uses something called [[wp>Public-key_cryptography|public key cryptography]], also known as *asymmetric cryptography*. ((&wikipedia_ref(Public-key_cryptography|Public-key cryptography))) It’s a type of security system that works with **two different keys**: | ||
Line 105: | Line 108: | ||
----- | ----- | ||
- | ### ✅ Summary (in simple points) | + | ==== ✅ Summary (in simple points) |
+ | ==== | ||
- SSH uses **two key pairs**: one for you (the user), and one for the server. | - SSH uses **two key pairs**: one for you (the user), and one for the server. |