As a widely used network protocol, Secure Shell (SSH) provides several authentication approaches. However, we’ll focus on public key authentication only in this article.

Public key cryptography which is also named as asymmetric cryptography uses pairs of keys: public keys and private keys.


SilMOON

Student, programmer.