SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
        Saving Settings
        Multiple Settings Files
        Loading Settings
        Profile Settings >>
            Connection
            Cipher List
            Keyboard
            Tunneling
            Outgoing Tunnel and Incoming Tunnel
            Outgoing Tunnel Definition
            Incoming Tunnel Definition
        Global Settings>>
        Customize
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

Cipher List

With the Cipher List page of the Settings dialog you can control which ciphers can be used in the connection. This selection defines what encryption methods will be available when using the custom encryption algorithm.


cipherlist-3.gif
Figure : Select your preferred encryption algorithms with the Cipher List page.

The following algorithms can be selected:

  • 3DES

  • Blowfish

  • Twofish

  • Arcfour

  • CAST128

  • DES

    Please note that DES is a legagy cipher that is not considered to be cryptographically secure. It is strongly recommended that DES is not used. If you select to include DES in the list, a warning dialog will be displayed.

Click the checkbox next to each algorithm to include or exclude it in the list of available custom algorithms. An algorithm marked with a checkmark is available for use.

You can also select the order of preference between the algorithms. Select an algorithm by clicking it with the mouse, and then move it upwards or downwards in the list by clicking on the Up or Down buttons.

The checkmarked algorithms that are located on the top of the list are preferred. The SSH Secure Shell for Workstations Windows client will first try to use the first checkmarked algorithm in the connection. If that algorithm is not supported by the remote host computer, the client software will try the next checkmarked algorithm on the list, and so on.

To take your list of preferred encryption algorithms into use, select custom as the encryption algorithm on the Connection page of the Settings dialog. For more information, see section Connection.

Previous Next Up [Contents] [Index]


[ Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2000 SSH Communications Security Corp
All rights reserved.