Differences

This shows you the differences between the selected revisions of the page.

2024-02-01 2024-02-01 (current)
no summary (94.206.198.59) (hidden) (untrusted) no summary (157.46.174.204)
Line 4: Line 4:
The %%SSH%% employs public key cryptography. A [[wp>Public-key_cryptography|public-key cryptography]], also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public.((&wikipedia_ref(Public-key_cryptography|Public-key cryptography))) Together they are known as a key pair. In %%SSH%%, the public key cryptography is used in both directions (client to server and server to client), so two key pairs are used. One key pair is known as a host (server) key, and the other is a user (client) key. The %%SSH%% employs public key cryptography. A [[wp>Public-key_cryptography|public-key cryptography]], also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public.((&wikipedia_ref(Public-key_cryptography|Public-key cryptography))) Together they are known as a key pair. In %%SSH%%, the public key cryptography is used in both directions (client to server and server to client), so two key pairs are used. One key pair is known as a host (server) key, and the other is a user (client) key.
------BEGIN RSA PRIVATE KEY----- +===== User Private Key ===== 
-MIIEpAIBAAKCAQEAi+D6tOmB0uDx4n9ldVKrCvRHyOKSS0Su2D3hUfFfzCF9j7el +A //user private key// is a key kept secret by the %%SSH%% user on his/her client machine. The user must never reveal the private key to anyone, including the server (server administrator), not to compromise his/her identity. 
-cYV3tKeedy7CWny12JFUSgzCtgkTNDXWPLR5RK9iS1oWPiAfZn+epQ1hxG2VuuIS + 
-ejXvOjCrwz1EYn5djW/XSHuQ03pahUFedP7Bp9sh99zjrF5VQFAhVzXLuKaFEyEK +To protect the private key, it should be generated locally on a user's machine (e.g. using [[ui_puttygen|PuTTYgen]]) and stored encrypted by a passphrase. The passphrase should be long enough (that's why it's called passphrase, not password) to withstand a [[wp>Brute-force_attack|brute-force attack]] for a reasonably long time, in case an attacker obtains the private key file. 
-anx+cP+S+ltUo25HUUVIxW58hFsuOydsZwFs5Y4RoayUu1oCovB8uWtQkd59m2dV + 
-Vzwya2Tg99R28iabZ+XMXtG0ZNNTGCLzlIKbFsiz7ive8hWtwssKafFBb567JhWX +Different file formats are used to store private keys. WinSCP supports PuTTY format, with the ''.ppk'' extension.
-AyFk1mzqE/acafPBr56hE+JLqBBAZQr3G4B87QIDAQABAoIBAEHHS751rLJhS/5q +
-UGjqtjqRg4xpV8iDhQF1oBbrvlP9T9Gc1/VZgWB4DqIXYBgzW0R7mzqzY4E9JUXB +
-J30mlXyCSWQL+je+3WVTEGSntVks+2OF2pCT+mrP5oYKsrTqnc3cUU3ppcJ9YEIX +
-6nZ0MtdfykqIGpy9Q7PZusQLLUEogmRR/Vcv5McvGsd2HTvXjLyeueGR/29KUwlw +
-FDTw7tavDe77rXbhbi+83Cv8QLizG3i9xPgN9arbbyvY7hKURFpcPiItNmIVuQBI +
-80I1NZxwxhl89FbFABGNYwAuB9uB4nfvKl5Pm/CiCHOvgx0qwIa/1oLxpulfygNh +
-5bos2OECgYEA1QFttO2ddasOPSoePf1WBMU8F86cmFh1fwznDBTXYDNXGW7mZNYT +
-OZYDmgt33Rmp51babM9WDckcncyu/hFnVvUFCcARoOXkyDq/qdppE5LjZev/G3+x +
-EjZE/I26l8KKyNG01bmWvh7Sespx1LfQxoLREN/fEVoe34utWj1ZbiUCgYEAqBzl +
-BLA4cCfz7VqLNthtEK5ptZnUM1KENDy4dXpEZlxCYKtwRMHO8AxksRlRbxemvh+5 +
-tUGCf/dS8+NrGTT9T0Z5dKjXA6T5mQcFT7Kz92yVlQcGg19PXFs2TFiFYCATfWyt +
-fRHfBvi+WgIS/5fn10lXYBXGfclqBQbi6mRwpSkCgYEAqfUN2EOQVAc8wUkOAGBX +
-dk759/T/tf8/ITTmVhl7EGNmqAB5DRRTGqu8C/oClgSYMOJ4PkHhY/aIQtDDAC5a +
-ymOOtYzvg/ZraeiWbay8EsYtc3Guh/6HBwUOXoWn0NeFbV8Gb1I6GVD2mMtXsGdK +
-ylou/svibTH/WFdW5p308ZECgYEAoRzP/2ZDMHmZtGeJ884G+G2usXPzghwax1VK +
-EoxS8SaKFss2lS6IfFXkSjXRbX5lNuCAwc0+nBUTUtko0seN3GPWEo+dQMjizF2G +
-IZNKFl3iHSjWfSDilch0iUZszGrxQsrcmXh/HddV1j0WqA2VCyYmrtcvm21kRd0L +
-q0cHDcECgYBJ3UvaBq4ZVWDxEn0tpjp7DrIhdEjA6O8SwQVprgPKQZo2S4oHJAPI +
-j/I+Bq6c0VfZjCVVvNCjzbTrvYjldHCaE4T4nSeRq433JKxe/v45krinAt64NTQN +
-JXK7q98+/SDOn4KFfINbj0emo0Fzw4BnMXeg7Tl/PshpeKJsrng8aQ== +
------END RSA PRIVATE KEY-----+
===== User Public Key ===== ===== User Public Key =====

Last modified: by 157.46.174.204