The Mathematics behind Public Key Cryptography & SSH Connections | Prasanjit Singh
The SSH protocol works in the client-server model, which means that the connection is established by the SSH client connecting to the SSH server. The SSH cli...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
The SSH protocol works in the client-server model, which means that the connection is established by the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the identity of the SSH server. After the setup phase the SSH protocol uses strong symmetric encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server.
Strong authentication with SSH keys
There are several options that can be used for user authentication. The most common ones are passwords and public key authentication.
The public key authentication method is primarily used for automation and sometimes by system administrators for single sign-on. It has turned out to be much more widely used than we ever anticipated. The idea is to have a cryptographic key pair - public key and private key - and configure the public key on a server to authorize access and grant anyone who has a copy of the private key access to the server. The keys used for authentication are called SSH keys. Public key authentication is also used with smartcards, such as the CAC and PIV cards used by US government.
The main use of key-based authentication is to enable secure automation. Automated secure shell file transfers are used to seamlessly integrate applications and also for automated systems & configuration management.
SSH provides strong encryption and integrity protection
Once a connection has been established between the SSH client and server, the data that is transmitted is encrypted according to the parameters negotiated in the setup. During the negotiation the client and server agree on the symmetric encryption algorithm to be used and generate the encryption key that will be used. The traffic between the communicating parties is protected with industry standard strong encryption algorithms (such as AES (Advanced Encryption Standard)), and the SSH protocol also includes a mechanism that ensures the integrity of the transmitted data by using standard hash algoritms (such as SHA-2 (Standard Hashing Algorithm)).
BINPIPE strives to simplify learning Cloud, DevOps, SRE, Machine Learning, Computer Science & Mathematics by creating easy to understand videos on fundamentals. This video is meant for beginners, freshers in the industry and those who are looking to make a career in IT/CS but don’t know where to begin! This will be a first step towards being a successful professional. Learning DevOps practices opens up great career opportunities and also leads to better delivery for software products. Further, professionals who practice DevOps are more sought after & paid highly than those who don’t. So let's get started with DevOps!
......
The BINPIPE channel on Youtube will be FREE FOREVER and provide complete courses for DevOps, SRE, Machine Learning, Engineering Management & Mathematics. We methodically despise education being commercial and will provide FREE courses unlike popular learning portals.
Finally, we strive to help a large number of freshers who need mentorship, internship positions and CERTIFICATIONS to make way into the industry and land with Job opportunities. Check the pinned comment for details.
Like & Share the videos to spread the word and SUBSCRIBE to get notified on new content.
Comment with your questions & requests for future topics that you would want to learn.
Keep Learning!
The pain you feel today will be the strength you feel tomorrow!
Yours Truly,
Prasanjit Singh
⭐️PLAYLISTS for DevOps, SRE, Cloud, ML & Linux ⭐️
🎥 Linux Essentials: https://www.youtube.com/playlist?list=PLSo0pjml8Hm8aC4hXS5bdsDKIRJibDj5E
🎥 DevOps Essentials: https://www.youtube.com/playlist?list=PLSo0pjml8Hm-_wolCCFxJ4tkT10uBtSjy
🎥 Advanced DevOps: https://www.youtube.com/playlist?list=PLSo0pjml8Hm9TnuJyttYuEgRzK1RtvYbM
⭐Learning References ⭐
✔ Binpipe Learning Resources: https://github.com/BINPIPE/learning-resources
✔ DevOps Lesson Plans: https://github.com/BINPIPE/learning-resources/blob/master/devops-lesson-plans.md
✔ DevOps Learning Notes: https://github.com/BINPIPE/learning-resources/tree/master/learning-notes
⭐Internship & Certification⭐
. Get certified for FREE after completing certain self learning tasks and mandatory assignments.
. Further, if you are starting out in this field and need to gain hands-on experience by working on real project tasks on live systems, we have a Internship Program for you with a dedicated mentor.
For any/all of the above requirements, fill up this form here - https://forms.gle/nxcKUi2cuMo1rBMP6 and we will get back to you!
⭐Brownie points! ⭐
Check the pinned comment for more on free DevOps, SRE, Cloud & Machine Learning content.
⭐Important Links ⭐
🔗 Teacher: https://www.linkedin.com/in/prasanjit-singh
🐙 Github: https://github.com/BINPIPE
🔗 LinkedIn: https://www.linkedin.com/company/binpipe
#BINPIPE #PrasanjitSingh #Linux #Cloud
Video Information
Views
383
Total views since publication
Duration
27:24
Video length
Published
May 13, 2021
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#DevOps #Machine Learning #SRE #Linux #Automation #Tutorials #Learning #Binpipe #Cloud #AWS #Azure #Google Cloud #Mathematics #Statistics #Engineering Management #Ansible #Terraform #Kubernetes #Mesos Marathon #Microservices
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.