O'Reilly logo

Next Generation SSH2 Implementation by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Solutions in this chapter:

  • Understanding Network Encryption
  • Using OpenSSH to Encrypt Network Traffic Between Two Hosts
  • Installing OpenSSH
  • Configuring SSH
  • Implementing SSH to Secure Data
  • Distributing the Public Key
  • The SSH Client
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In this chapter, you will learn about solutions to deploy strong encryption to enhance network security. Encryption ensures data confidentiality by using algorithms to encrypt data before it is sent over a network. The receiving host then decrypts the data to a readable format. The solutions in this chapter combine both authentication and encryption, and they include a step-by-step guide to implementing encryption over an insecure network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required