A Deeper Look into Public and Private SSH Keys - Montana Webmaster

A Deeper Look into Public and Private SSH Keys

Another Pesky Security Detail

For small business owners, the multitude of tasks associated with having a website can seem like a disruption to the “real work” of running the business. And, to their website developers, the security tasks associated with having a website can seem like a loss, not a gain. The real answer is that security practices help assure that the ROI to be had from a website aren’t lost. SSH protects your website’s file structure.

What is a Public Key

The image of the lock has a key to open it. Depending on what type of lock it is, you may need the key to lock it, or you may be able just to push the post down into the hole and lock it without a key. If you can just push the post down into the hole, locking it is public, anyone can do it. If you need a key to lock it, both the locking and unlocking are private actions.

The second answer is interesting because it goes into the math.

Resources

For information on the difference between symetric and asymetric:

Symmetric vs. Asymmetric Encryption – What are differences?

This is a very good question – answer set on StackOverflow. It considers situations, as well as the technical issues. And, it points out where the idea of a “key” fails. But, first, you may be wondering what public and private keys are, and why they matter.

https://security.stackexchange.com/questions/233438/what-are-the-logical-steps-taken-to-perform-ssh-key-authentication

https://blog.invgate.com/what-are-ssh-keys

https://www.cyberciti.biz/faq/how-to-set-up-ssh-keys-on-linux-unix/

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.