Crypto Key Generate Rsa
control
Member Posts: 309
in CCNA & CCENT
I know the above is used to generate a encrypted key, but how/when exactly is it used, in terms of communication. I know if I want to SSH into a router which is SSH enabled the key will be used, but I'd like to know the "how this is done" during the data flow between router / ssh client. I don't like to just know how to type a command, I really want to understand how it achieves its job. I have looked this up but can't find much. All just tells me how to generate a key, which I know how to do.
Is it possible to show the process in a diagram at all just to make it clear.
Is it possible to show the process in a diagram at all just to make it clear.
Comments
-
Forsaken_GA Member Posts: 4,024SSH, and other protocols, use the Diffie-Hellman key exchange method
If you're interested in the specifics of how it works:
Diffie
But unless you're a huge crypto nerd, then all you really need to know is that the client and the server exchange keys to generate the encrypted stream, and generating the key on the router side is just generating the server side of the key in this case, which will be exhanged with the client during session setup to create a unique encrypted stream