Asymmetric Key Algorithm; Ssh Operating Process - H3C S3610-28P Operation Manual

S3610 & s5510 series
Table of Contents

Advertisement

Operation Manual – SSH
H3C S3610&S5510 Series Ethernet Switches
Key-based algorithm is usually classified into symmetric key algorithm and asymmetric
key algorithm.

1.1.2 Asymmetric Key Algorithm

Asymmetric key algorithm means that a key pair exists at both ends. The key pair
consists of a private key and a public key. The public key is effective for both ends,
while the private key is effective only for the local end.
Asymmetric key algorithm encrypts data using the public key and decrypts the data
using the private key, thus ensuring data security.
You can also use the asymmetric key algorithm for digital signature. For example, user
1 adds his signature to the data using the private key, and then sends the data to user 2.
User 2 verifies the signature using the public key of user 1. If the signature is correct,
this means that the data originates from user 1.
The Revest-Shamir-Adleman Algorithm (RSA) is an asymmetric key algorithm. It can
be used for data encryption and signature.

1.1.3 SSH Operating Process

The session establishment between an SSH client and the SSH server involves the
following five stages:
Table 1-1 Stages in establishing a session between the SSH client and the server
Version negotiation
Key and algorithm negotiation
Authentication
Session request
Interactive session
I. Version negotiation
The server opens port 22 to listen to connection requests from clients.
The client sends a TCP connection request to the server. After the TCP
connection is established, the server sends the first packet to the client, which
includes a version identification string in the format of "SSH-<primary protocol
version number>.<secondary protocol version number>-<software version
number>". The primary and secondary protocol version numbers constitute the
Stages
SSH1 and SSH2 are supported. The two parties
negotiate a version to use.
SSH supports multiple algorithms. The two parties
negotiate an algorithm for communication.
The SSH server authenticates the client in
response to the client's authentication request.
This client sends a session request to the server.
The client and the server start to communicate with
each other.
Description
1-2
Chapter 1 SSH Configuration

Advertisement

Table of Contents
loading

Table of Contents