9

How does TLS differ from SSH from a strictly cryptographic perspective?

I know that there are many non-cryptographic differences between them, but I would like to know the cryptographic ones.

Demi
  • 4,853
  • 1
  • 22
  • 40

1 Answers1

2

I have broken my head with this subject. Then, I begin to search on the internet and found your question (I believe the same as mine). So, this is my conclusion (of course is a simplification, there are other algorithms between other stuff)

I hope it helps. If I am wrong or could add new information, please let me know

Now, in short:

SSH

  1. Establish session: Firstly, it uses the Diffie-hellman algorithm to encrypt the session
  2. Authentication: secondly, it uses the RSA algorithm to authenticate inside the encrypted session.

TLS It needs two inputs to establish connection and authentication.

  1. Authentication: A certificate. (this certificate is issued by a Certificate Authority (CA).
  2. Establish session: An algorithm (Diffie-Hellman or RSA)

Next are links to my sources with details about the process of SSH and TLS at these links.

SSH https://www.linkedin.com/pulse/understanding-ssh-encryption-connection-process-robert-althof/

TLS https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/#:~:text=TLS%20is%20an%20encryption%20protocol%20designed%20to%20secure,they%20will%20use%2C%20and%20agree%20on%20session%20keys.