Home » Blog » Find out what SSH (Secure Shell)

Find out what SSH (Secure Shell)

Deployment is a longer job and often involves transferring a high level of files, which also requires a secure method.

Therefore, using SSH is the best way to conduct uruguay phone number data  this work. The protocol is usually a recurring choice for professionals responsible for taking care of these tasks.

Secure Shell ensures that new applications and changes are transferred in a timely manner, without errors or loss of information.

What are the main cryptographies used by SSH?

Cryptography is what guarantees, in addition to the security of the site , the protection of the connection between the client and the remote server.

However, there are different cryptography frameworks that can be applied when using the SSH protocol for such a request.

There are basically three alternatives:

  • symmetrical,
  • asymmetric,
  • and hashing.

Find out more about them.

Symmetric cryptography

This is a form of cryptography that is performed mary hartje president  through a secret key, which is is no transfer of that information between the two parties, leaving it to the algorithm to send it to each one separately.

Thus, when transferring the file, the user already has the password used to encrypt the content and then send it to the server.

Asymmetric cryptography

This model is the opposite of the previous one: uk cell number  two keys are used, one for the client and one for the server, to encrypt the transferred data.

However, it is not possible to discover the private key from it.

Scroll to Top