Open In App

Secure Shell and TLS

Last Updated : 05 Jan, 2021
Improve
Improve
Like Article
Like
Save
Share
Report

Secure Shell :
Secure Shell is designed to be very simple and cost-effective for secure network communications. SSH Client and server applications are widely available for most operating systems.

SSH runs on top of TCP and has three protocol stacks as follows.

  1. SSH Transport Layer Protocol –
    This is mainly used for providing server authentication, data integrity, confidentiality. Compression is provided optionally.

  2. SSH User Authentication Protocol –
    This protocol is used for authenticating users to the server.

  3. SSH Connection Protocol –
    It multiplexes multiple logical communications channels over a single SSH connection.

Host Keys :
Authentication occurs at Transport Layer, as the server uses different asymmetric encryption techniques, the server has multiple host keys, it is compulsory that the server must exchange its key to identify the host. To happen this process the client host must also know the server host key.

The client has 2 methods of verifying the server host identity as follows.

  1. Client storing each hostname with name-to-key associations in his own local database, This method requires to maintain huge data.
  2. If each host is certified by a Certificate Authority then the client can be able to verify the host’s identity by using certification Authority.

  3. Like Article
    Suggest improvement
    Previous
    Next
    Share your thoughts in the comments

Similar Reads