SSH Encryption Analysis
Eric Ilmberger
CNT52 Network Fundamentals
I did a little more research on symmetrical and asymmetrical encryption because it wasn't described well in testout. Symmetrical encryption uses a shared key that when entered allows the user to read the data. Symmetrical keys are used in SSH to secure the entire connection to prevent password snooping. Asymmetrical encryption uses two different keys, a private key and a public key. Either key can be used to encrypt data but the opposite one must be used to decrypt the data. Using this system anyone with the public key can send messages but only the private key can decrypt those messages. Only with a combination of the private and public key does a message become readable. There are also a number of signatures to determine if the message has been tampered with.
References