How does SSH work
Keypoints Public key and Private key are generated simultaneously. Private key can descrypt the messages which can be enscrypted by Public key. We can generated random nuaambers to test the consistency of the two keys. 1. symmetric encryption data encryption method whereby the same key is used to encode and decode information. 2. asymmetric encryption (public-key cryptography) Asymmetric cryptography, which can also be called public-key cryptography, uses private and public key to encrypt and decrypt the data. Public key is the one of the keys in the pair that can be shared with everyone, whereas Private key is the other key in the pair that is kept secret. Any key can be used to encrypt a message then the other key, which is not used for encryption, is used fo decryption. When the public key has been sent to the Client, the communication will be built secured. Question? How to certify the public key of the server? certifyed by the third party(CA)(http -> https). self identify. Certifyed after the first request by validating the hosts,…