Comparing SSH encryption algorithms: RSA, DSA, ECDSA, or EdDSA?

Costas

Administrator
Staff member
What’s worse than leaving private keys lying unattended? Having public keys that can be brute-forced. The “secure” in secure shell comes from the combination of hashing, symmetric encryption, and asymmetric encryption.

https://gravitational.com/blog/comparing-ssh-keys/
 
Top