The animated TECHTip Tutorial is available here.
The following series of TECHTips will review the NIST Report on VoIP and its recommendations. The first NIST recommendation is: Develop appropriate network architecture. TECHtionary analysis is to Require IPSec or SSH [Secure SHell] if remote access is allowed and encryption wherever feasible.
This is intended to be an introduction to SSH, not an in-depth analysis of the topic presented. One of the key points of SSH is that the connection is established and encrypted (passwords are not passed between devices in plain text) before a user is possible. SSH keys are asymmetric or symmetric. Symmetric keys are used for the session and same (symmetric) key is used to encrypt and decrypt. That is, symmetric keys are derived (created) from one another. Asymmetric uses pairs of Public and Private keys. Rules are:
- If you encrypt with the private key, it can only be decrypted with the public key.
- If you encrypt with the public key, it can only be decrypted with the private key.
SSH uses common hash values.
For more information, see openssh.org.
TECHtionary is the World’s first and largest animated library/magazine on technology – Web Hosting Magazine’s Editor’s Choice for Technical Help. TECHtionary produces white papers, magazine articles, in-depth product reviews, training tools, and custom animations. Call 303-594-3047 or e-mail [email protected] to let us show you how we can help you with exciting new tutorials on your products and services.
[tags]encryption,nist,ssh,decryption,network architecture,remote access[/tags]