Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Principle Analysis of SSH Protocol

2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

In the daily operation and maintenance work, now we generally use remote connection tools to remotely operate the server, after all, we usually use the Windows system! Some people may say: alas, isn't it dangerous to connect to the Linux operating system through windows's remote tools? will it be leaked when passing data?

The answer is yes. But smart humans have developed such a tool called Xshell, which is still free! This tool uses SSH asymmetric encryption protocol, which is much more secure than telnet symmetric encryption.

Let's explain what asymmetric encryption is:

The above picture transmits data through asymmetric encryption.

Suppose that the small head wants to send a file to the big head, as shown in the figure above:

First of all, the small head has its own password, and the big head has its own password, and they generate the public key and the private key respectively. Here we can use the public key as the lock and the private key as the key. For the sake of security, the small head must not disclose its password to the big head, so the big head needs to open the file by itself.

The small head said to the big head: if you want me to pass you the file, bring your lock (public key). Then the small head hangs its own lock and the big head's lock on the file at the same time, and then passes the file to the big head, which uses its own private key (key) to open its own public key to extract data. If the small head wants to see the data himself, he will open his own public key with his own private key, which is asymmetric encryption.

Haha, isn't it very simple?

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

  • Html form

    Table sij

    © 2024 shulou.com SLNews company. All rights reserved.

    12
    Report