communication, the client again sends the key ID to the server after the symmetric key is established successfully between them. The server checks the key ID and tries to find a corresponding match of the public key from the stored public keys. If a match is found, then the server generates a random number and sends the random number encrypted with the public key of the client. The client will possess its corresponding private key. So, it will decrypt the random number and then send an MD5 hash of the random number after encrypting it with the session key.
The server now calculates the MD5 hash of the random number it sent and verifies it with the bytes it got from the client after decrypting it with the session key. If both the values match, the authenticity of the client is successful. Now, the server and the client can communicate with each other securely, and the data can be encrypted with the session key established between them previously.
So, this is how SSH works. I hope this helps.
Security Fundamentals Practice Tests
The Security Fundamentals Practice Tests test one’s fundamental knowledge of cyber security. The practice tests are good for those who are preparing for various certification exams like the CCNA, CCNP, or CompTIA. They are also good for students and IT/security professionals who want to improve their understanding of cybersecurity.








































0 Comments