AnswerBun.com

Examples of SSH key exchange algorithms requiring encryption-capable host keys

In the SSH spec, Section 7.1, key exchange algorithms are distinguished based on whether they require an "encryption-capable" or a "signature-capable" host key algorithm.

If I understood their details correctly, the well-known DH-based key exchanges algorithms such as curve25519-sha256, diffie-hellman-group14-sha256 and ecdh-sha2-nistp256 all require a signature-capable host key algorithm. What are examples of SSH key exchange algorithms that instead require an encryption-capable host key algorithm?

Information Security Asked by Uncaught on December 30, 2020

0 Answers

Add your own answers!

Related Questions

Diffie Hellman c# implementation

2  Asked on January 2, 2022 by roger-far

     

How to know if an RFI/LFI attack was successful?

2  Asked on December 31, 2021 by user226295

   

Suricata and rules based on MAC address

1  Asked on December 28, 2021 by loi219

         

Signing CSR using an ECC keypair

2  Asked on December 28, 2021

         

How to identify IP from a UDP-based DoS

4  Asked on December 26, 2021 by nihas

       

PostgreSQL injection with basic sanitization

1  Asked on December 26, 2021 by asker-asky

     

Ask a Question

Get help from others!

© 2022 AnswerBun.com. All rights reserved.