Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
            Defining Connection Settings
            Selecting Ciphers
            Selecting Authentication Methods
            Selecting Colors
            Defining Keyboard Settings
            Using Keymap Editor
            Tunneling Applications
            Defining File Transfer Settings
            Defining Favorites
        Defining Global Settings >>
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Selecting Ciphers

On the Cipher List page of the Settings dialog you can control which ciphers can be used for the connection. This selection defines what encryption methods will be available when using the Cipher List encryption algorithm setting.

Figure : Select your preferred encryption algorithms with the Cipher List page

The following algorithms can be selected:

  • AES128

  • AES192

  • AES256

  • 3DES

  • Blowfish

  • CAST

  • Twofish128

  • Twofish192

  • Twofish256

  • Arcfour

  • DES

    DES (Data Encryption Standard) is a legacy cipher that is not considered to be cryptographically secure. DES is only included for compatibility with some older protocol versions. It is strongly recommended that DES is not used.

You can change the cipher order of preference with the Up and Down buttons.

  • Up

    You can give a cipher a higher priority by clicking it with the mouse, and then clicking the Up button. The selected algorithms that are located at the top of the list are preferred.

    SSH Tectia Client will try to use the first selected algorithm in the connection. If that algorithm is not supported by the remote host computer, the client software will try the next selected algorithm on the list, and so on.

  • Down

    To give a cipher a lower priority rating, select it with the mouse, and then click the Down button.

Select the check box next to each algorithm to include it in the list of available algorithms. An algorithm marked with a check mark is available for use.

To use your personal list of preferred encryption algorithms, select Cipher List as the encryption algorithm on the Connection page of the Settings dialog. For more information, see Section Defining Connection Settings.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now