1. Secure Shell (SSH) :
It is a cryptographic network protocol used to access the network devices and servers over the internet. SSH protocol was developed by SSH Communications Security Ltd. SSH allows us to log in securely into another computer over a network, to execute commands in a remote machine, and to transfer files from one machine to another through the network.
2. Secure Socket Layer (SSL) :
It is a networking protocol which gives secure transmission in a non-secure network. SSL requires a certificate and works on the Public Key Encryption. SSL is implemented in various operations of networked environment such as web browsing, messaging, emails and other protocols like FTP.
Difference between SSH and SSL :
|1.||It is cryptographic tunneling protocol and has a username/password authentication system.||It does not have a username/password authentication system like SSH.|
|2.||It works on the port number 22.||It works on the port number 443.|
|3.||It completely depends on the network tunneling.||It is asynchronous as it depends on the certificates.|
|4.||It works on three-stage process for server and client authentication processes.||While SSL usually works on X.509 digital certificates for server and client authentication.|
|5.||It encrypts the communication between two computers over the internet.||It encrypts the communication between browser and server.|
|6.||It is appropriate and effective for securely executing commands across the internet.||It is best suited for securely transferring critical data like in credit cards and banking.|
|7.||It provides data confidentiality by using symmetric key algorithms.||It adopts a combination of both symmetric and asymmetric encryption algorithms to provide data privacy.|
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between SSH and Telnet
- Difference between Secure Socket Layer (SSL) and Transport Layer Security (TLS)
- Difference between IPSec and SSL
- Difference between Secure Socket Layer (SSL) and Secure Electronic Transaction (SET)
- Difference between Kerberos and SSL
- TELNET and SSH in Cisco devices
- TELNET and SSH on Adaptive Security Appliance (ASA)
- SSH Port Forwarding
- Introduction to SSH(Secure Shell) Keys
- Secure Socket Layer (SSL)
- Is SSL enough for Cloud Security?
- SSL Full Form
- Difference and Similarities between PHP and C
- Difference between Stop and Wait, GoBackN and Selective Repeat
- Difference between Stop and Wait protocol and Sliding Window protocol
- Similarities and Difference between Java and C++
- Difference between Yaacomo and and XAP
- Difference between VoIP and and POTS
- Difference between ++*p, *p++ and *++p
- Difference Between DOS and Windows
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.