SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
        Saving Settings
        Multiple Settings Files
        Loading Settings
        Profile Settings >>
            Connection
            Authentication
            Cipher List
            Colors
            Keyboard
            Keymap Editor
            Tunneling
        Global Settings>>
        Customize
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

Cipher List

With the Cipher List page of the Settings dialog you can control which ciphers can be used for the connection. This selection defines what encryption methods will be available when using the Cipher List encryption algorithm setting.


cipherlist-page-4.gif
Figure : Select your preferred encryption algorithms with the Cipher List page.

The following algorithms can be selected:

  • AES128

  • AES192

  • AES256

  • 3DES

  • Blowfish

  • CAST128

  • Twofish128

  • Twofish192

  • Twofish256

  • Arcfour

  • DES

    Please note that DES is a legacy cipher that is not considered to be cryptographically secure. DES is only included for compatibility with some older protocol versions. It is strongly recommended that DES is not used.

You can add new ciphers to the Cipher List and remove undesired ciphers from the list with the New and Delete buttons, and change their order of preference with the Up and Down buttons.

  • New

    Click the New button (the leftmost button on the top right hand side of Cipher List) to add a new cipher to the list from a dropdown menu. The keyboard shortcut for the New button is the Ins key.

  • Delete

    Select an unwanted cipher entry from the list and then click the Delete button (the second button on the top right hand side of the cipher list) to remove the cipher. The keyboard shortcut for the Delete button is the Delete key.

  • Up

    You can give a cipher a higher priority by clicking it with the mouse, and then clicking the Up button. The marked algorithms that are located on the top of the list are preferred.

    SSH Secure Shell will try to use the first marked algorithm in the connection. If that algorithm is not supported by the remote host computer, the client software will try the next marked algorithm on the list, and so on.

  • Down

    To give a cipher a lower priority rating, select it with the mouse, and then click the Down button.

Click the check box next to each algorithm to include or exclude it in the list of available custom algorithms. An algorithm marked with a check mark is available for use.

To use your customized list of preferred encryption algorithms, select Cipher List as the encryption algorithm on the Connection page of the Settings dialog. For more information, see section Connection.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice