{"data":{"markdownRemark":{"html":"<p>Hey All! I hope you all are having a productive week so far! 👍\n🔸\nLet’s talk a bit about ssh. SSH (Secure Shell) is a remote administration protocol that allows users to control and modify their remote servers over the Internet. It was created as a secure replacement for the unencrypted Telnet. It provides a secure way to authenticate a remote user and transfer data between the client and host server.\n🔸\nEncryption is used to make SSH secure. Encryption translates data into another form, so that only people with access to a secret key or password can read it.\n🔸\nThere are 3 different encryption technologies used by SSH:\n1️⃣Symmetrical encryption\n2️⃣Asymmetrical encyption\n3️⃣Hashing\n🔸\nI’ll divide this out into 4 posts - one encryption technique per post and then I’ll bring it all together in the 4th post.\n🔸\nToday we’ll go through symmetric encryption. In symmetric encryption, a secret key is used by both the client and the server to encrypt and decrypt information (shown in the pic, taken from Andrei Neagoie’s course). This type of encryption scheme is called \"shared secret\" encryption, or \"secret key\" encryption. There is typically only a single key that is used for all operations. Anyone possessing the secret key can decrypt the message being transferred.\n🔸\nWe need to be able to ensure that the secret key is only given to the client and server that want to communicate with each other and does not get into the hands of someone malicious. To do this, we have to send over the secret key in a secure way, this done through the Key Exchange Algorithm which uses asymmetric encryption. We'll talk about asymmetric encryption more in detail in the next post!\n🔸</p>\n<h3>#programmers #womenintech #programmerrepublic #worldcode #coder #web #coding #develop #nerdlife #softwaredeveloper #buildtheweb #programmerslife #fullstacklife #thedevlife #learning #girlswhocode #educateyourself #weprogrammers #udemy #andreineagoie</h3>","frontmatter":{"path":"/post-symmetrical-encryption","title":"Symmetrical Encryption","author":"CodingBeenz","date":"12 September, 2018","featuredImage":{"childImageSharp":{"sizes":{"base64":"data:image/jpeg;base64,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","aspectRatio":1,"src":"/static/9d1577a03c1215bf5023346269e5d981/08385/featured-image.jpg","srcSet":"/static/9d1577a03c1215bf5023346269e5d981/4a8c6/featured-image.jpg 158w,\n/static/9d1577a03c1215bf5023346269e5d981/845c7/featured-image.jpg 315w,\n/static/9d1577a03c1215bf5023346269e5d981/08385/featured-image.jpg 630w,\n/static/9d1577a03c1215bf5023346269e5d981/9e58b/featured-image.jpg 640w","sizes":"(max-width: 630px) 100vw, 630px"}}}}}},"pageContext":{"isCreatedByStatefulCreatePages":false}}