Information Security Asked by Uncaught on December 30, 2020
In the SSH spec, Section 7.1, key exchange algorithms are distinguished based on whether they require an "encryption-capable" or a "signature-capable" host key algorithm.
If I understood their details correctly, the well-known DH-based key exchanges algorithms such as curve25519-sha256
, diffie-hellman-group14-sha256
and ecdh-sha2-nistp256
all require a signature-capable host key algorithm. What are examples of SSH key exchange algorithms that instead require an encryption-capable host key algorithm?
0 Asked on November 6, 2021
2 Asked on November 6, 2021
1 Asked on November 6, 2021 by sibwara
1 Asked on November 6, 2021
2 Asked on October 28, 2021
1 Asked on October 28, 2021
0 Asked on October 28, 2021 by vtex
1 Asked on October 28, 2021 by user13105993
2 Asked on October 28, 2021
3 Asked on October 28, 2021 by cppiscool
2 Asked on October 28, 2021 by paradoxis
6 Asked on October 28, 2021 by myusername
1 Asked on October 28, 2021
Get help from others!
Recent Answers
Recent Questions
© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP