2. Architecture and basic operation
2.1 SSH subprotocols
SSH uses a client-server architecture to ensure authentication of communicating entities, and encryption and integrity of their data transmitted over a network. As already mentioned, version 2 of this protocol specifies an architecture separated into three sub-protocols (or layers) working together, as shown in figure 1 :
-
SSH transport layer (SSH-TRANS)
The other two SSH layers are based on this layer. SSH-TRANS provides server authentication, confidentiality and data integrity using symmetrical encryption (see...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Architecture and basic operation
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Books
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!