SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
        SSH2 Functionality >>
            Host Keys
            Security Properties
        Public-Key Infrastructure (PKI) >>
        Using Certificate Authentication>>
    Troubleshooting >>
    Appendices >>

Security Properties

The primary goal of the SSH protocols is improved security on the Internet.

  • All encryption, integrity, and public key algorithms used are well-known, well-established algorithms.
  • All algorithms are used with cryptographically sound key sizes that are believed to provide protection against even the strongest cryptanalytic attacks for decades.
  • All algorithms are negotiated, and in case some algorithm is broken, it is easy to switch to some other algorithm without modifying the base protocol.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice