Skip to main content

SSH Authentication Methods

Chapter 9: Introduction to Public Key Cryptography

In Chapter 9, you'll learn what public key cryptography actually is, how the two-key system works, and why your private key never needs to leave your machine to prove your identity to a server.

In the previous chapter, you learned how password authentication works and why it is a security liability for any server exposed to the internet. You saw that passwords can be brute-forced, stolen, and do not work well in automated workflows.

The solution to all of these problems is public key cryptography - the foundation that SSH key-based authentication is built on.

Before you generate your first SSH key pair in the next chapter, you need to understand the concept behind it. Once you do, everything about SSH keys will make complete sense.

Learn Linux Fast: 7-Day Crash Course for Beginners
A complete 7-day crash course to help beginners master Linux, the command line, software management, and more. No experience needed!

Understanding How Public Key Cryptography Works

Pro TecMint Β· Root Plan
This Article is for Root Members
Join Root to read the full article and unlock everything

Full Access to Every Article, Course & Certification Track

Join thousands of Linux professionals who use Pro TecMint to advance their careers.

Ad-free access to all premium articles
All courses: Learn Linux, Bash, Golang, Ubuntu and more
RHCSA, RHCE, LFCS & LFCA certification prep
New courses added every month
Private Telegram community & priority support
Root Plan
$8/mo
or $59/year billed annually
Save $37 with annual plan
Start Reading This Article in the Next 60 Seconds
Join Root Plan β†’