Asymmetric Key Algorithms

Previously you learned about asymmetric key algorithms and you should understand that asymmetric encryption requires two keys: public and private. As a review, using the flashcards define asymmetric key encryption, public key, private key, and digital certificate. Then read the section on asymmetric encryption.

SSH is a cryptographic network protocol that provides secure remote access. It uses TCP port 22 and is the secure alternative to FTP or Telnet. SSH can be used to execute remote commands and provide data confidentiality and integrity over an unsecured network.