
The client connects with the server by performing a TCP handshake with the server, which is for verifying whether the information provided by the user matches with the previous record of information that is stored in an RSA key store file. By default, SSH operates on TCP port 22, but it can be changed if required. The client-server based model of SSH commands or PuTTY commands allows the authentication of two remotely located systems while encrypting the data that passes through them. After setting up the connection, the SSH client also ensures that the privacy and integrity of data are maintained throughout the network by using symmetric encryption, asymmetric encryption, and hashing algorithms. The SSH client uses public key cryptography to ensure a safe connection to the SSH server. The SSH Protocol follows a client-server model in which connection is established by SSH Client to the SSH server. This kind of connection can be used for file transfer and issuing other remote commands. This communication takes place through a secured encryption process. The Secure Shell (SSH) Protocol lets a user connect to a remotely located computer from one computer.
