SSL (Secure Shell Login)

March 16, 2018 | Views: 2602

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

There is two type of encryption symmetric key cryptography and public key cryptography.

In the symmetric key cryptography, the same key is used to get the cypher text and the same key is used to revert it back

in the public key cryptography, we have two keys one is public other is the private key.Something which is encrypted by the public key is only can be revert back to the private key of the same person.

Since the public key cryptography is slow and safer and the symmetric key cryptography is fast but not safer.

 

So if we want to connect to a network using SSL

step1:- the client will send the SSL hello and the server will send its public key.

step2:-client will send its key for encryption that is symmetric key using encryption by a public key of the server this can only be decoded by the private key of the server.

step3:-Now the connection is made

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
11 Comments
  1. There are two types of encryption: Symmetric and Asymmetric.

    In symmetric encryption, the same key is used to decrypt and encrypt the message. WiFi encryption uses symmetric keys.

    Public key cryptography, or asymmetric cryptography uses different keys to encrypt and decrypt the message.
    In asymmetric:
    1. The server use the user’s public key to encrypt a message, and send the message back to the user.
    2. The user will use their private key to decrypt the message, and then send it back to the server.
    3. Server will verify the message, and accept the connection if the message is correct.

  2. Being constructive. Some use of commas would be useful, as would proof reading.

    As a suggestion, rewrite this and ask Cybrary support to update.

    If you do your research and republish, kudos to you.

  3. Agreed. Who wrote this?

  4. Please remove this. Painful to read.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel