TMCnet News

Wednesday TECHtionary.com TECH-Tip – Introduction to SSH-Secure SHell for VoIP
[July 19, 2005]

Wednesday TECHtionary.com TECH-Tip – Introduction to SSH-Secure SHell for VoIP


The animated TECH-Tip tutorial is available at http://www.techtionary.com

Summary

This is intended to be an introduction to SSH-Secure SHell, not an indepth analysis of the topic. The example of SSH is in a VoIP-Voice over Internet Protocol. However, SSH can be used in all kinds of IP situations.

Details

This is intended to be an introduction to SSH-Secure SHell, not an indepth analysis of the topic. The example of SSH is in a VoIP-Voice over Internet Protocol. However, SSH can be used in all kinds of IP situations. One of the key points of SSH is that the connection is established and encrypted (passwords are not passed between devices in plain text) before a user is possible. SSH keys are asymmetric or symmetric. Symmetric keys are used for the session and same (symmetric) key is used to encrypt and decrypt. That is, symmetric keys are derived (created) from one another. Asymmetric uses pairs of Public and Private Keys. Rules are:



- If you encrypt with the private key, it can only be DEcrypted with the public key.

- If you encrypt with the public key, it can only be DEcrypted with the private key.


SSH uses common hash values.

For more information www.openssh.org

Here are a few words on "keys."

- Public key - uses a key (means of "scrambling" or encryption) from a public source but still has its own "grooves" or codes to scramble the content or message. There are many types of encryption such as PGP-Pretty Good Privacy which has 2 to the 1024 (two followed by 24 zeroes) power "grooves" or key combinations, 56-bit, single-key DES encryption, or others that support the much stronger 168-bit, three-key Triple DES-Data Encryption Standard - AES-Advanced Encryption Standard (tunnel) to encrypt files.

- Private Key - create your own "skeleton" key which no else knows about.

An animation of the Secure SHell processes is next.

In addition to SSL, RSA-RSA-Rivest-Shamir-Aldeman and other encryption algorithms, digital certificates are another means of security. However, given the real-time nature of voice and other multi-media systems, practical methods (cell phones) are also recommended if security is not possible or uncertain.

TECHtionary http://www.techtionary.com is the World's First and Largest Animated (rich media) Library/Magazine on Technology - Web Hosting Magazine’s Editor’s Choice for Technical Help. TECHtionary has more than 2,650+ free tutorials on data, internet, wireless, VoIP-Voice over Internet Protocol (internet telephony), PBX systems, central office switching, protocols, telephony, telecommunications, networking, routing, IPTV, WiMax, power systems, broadband, WiFi-Wireless Fidelity and other technologies. TECHtionary.com provides "just enough – just-in-time" critical success information. TECHtionary produces web infomercials proven to "increase revenues, decrease customer support costs and increase customer satisfaction." Tom Cross CEO of TECHtionary is the Security and Emerging Technology Columnist for TMCnet, Technology Columnist for Telecommunications Magazine and member of the Technical Board of Advisors for the VOIP-Security Alliance. TECHtionary also publishes animated medical tutorials at http://www.msnopedia.com

Corporate Office – 303-444-6226

[ Back To TMCnet.com's Homepage ]