Last Updated : 02 Aug, 2025
The SSH (Secure Shell) is an access credential that is used in the SSH Protocol. In other words, it is a cryptographic network protocol that is used for transferring encrypted data over the network. The port number of SSH is 22. It allow users to connect with server, without having to remember or enter password for each system. It always comes in key pairs:
Key pairs can be of the following types:
Secure Shell or SSH, is a protocol that allows you to connect securely to another computer over an unsecured network. It developed in 1995. SSH was designed to replace older methods like Telnet, which transmitted data in plain text.
Imagine a system administrator working from home who needs to manage a remote server at a company data center. Without SSH, they would have to worry about their login credentials being intercepted, leaving the server vulnerable to hackers. Instead of it after using SSH, the administrator establishes a secure connection that encrypts all data sent over the internet. They can now log in with their username and a private key, allowing them to safely execute commands on the server, transfer files, and make necessary updates, all of these without the risk of spying eyes watching their actions. This secure access is essential for maintaining the integrity of sensitive information of the company. SSH (Secure Shell) is an access credential that is used in the SSH Protocol. In other words, it is a cryptographic network protocol that is used for transferring encrypted data over the network.
Features of SSHThere are multiple functions performed by SSH Function, here below are some functions:
To provide security between a client and a server the SSH protocol uses encryption. All user authentication and file transfers are encrypted to protect the network against attacks.
SSH Protocol Techniques Used in SSHThere are majorly three major techniques used in SSH, which are
There are multiple commands supported by SSH protocol, you can tap on the link if you want to know commands in SSH.
How does generally WorkThe generalasymmetric?
For performing encryption and decryption it uses asymmetric cipher. There are many encryption methods:
rsa, dsa, ed25519 etc.
The general procedure is:
SSH is key-based authentication that is not prone to brute-force attack. It is more convenient and secure than login IDs and passwords (which can be stolen in the middle). There is no exposure of valid credentials, if a server has been compromised.
Generating an SSH key pairOpen your command prompt type : ssh-keygen Press enter It will ask you for a location. Press Enter for default location. If its already there, press 'y' to overwrite. You may enter passphrase as you like, press enter.
An example of generating an SSH Key pair in the latest version of Windows 10 is given below:
Generating SSH keys on Windows, Linux, generallywhich and Mac:
OMAC OsX and Linux : terminal (build in) OWindows :- PuTTY
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4