Documentation forKiwi CatTools

List of algorithms for SSH2 connections

These algorithms define the supported methods for key exchange, message authentication, encryption, and key signatures in SSH2 connections.

  • Key exchange algorithm:

    ecdh-sha2-nistp256
    ecdh-sha2-nistp384
    ecdh-sha2-nistp521
    curve25519-sha256
    curve25519-sha256@libssh.org
    diffie-hellman-group-exchange-sha256
    diffie-hellman-group16-sha512
    diffie-hellman-group14-sha256
    diffie-hellman-group18-sha512
    diffie-hellman-group-exchange-sha1
    diffie-hellman-group1-sha1
    diffie-hellman-group14-sha1
    ext-info-c
    kex-strict-c-v00@openssh.com
  • HMAC algorithm:

    sha2-256-etm@openssh.com
    hmac-sha2-512-etm@openssh.com
    hmac-sha1-etm@openssh.com
    hmac-sha2-256
    hmac-sha2-512  
  • Encryption algorithm:

    8-ctr
    aes128-gcm@openssh.com
    aes128-cbc
    chacha20-poly1305@openssh.com
    3des-cbc
    blowfish-cbc
    aes192-ctr
    aes192-cbc
    aes256-gcm@openssh.com
    aes256-ctr
    aes256-cbc
    rijndael128-cbc
    rijndael192-cbc
    rijndael256-cbc
    rijndael-cbc@lysator.liu.se
    cast128-cbc
  • Key signature algorithm:

    a2-512
    rsa-sha2-256
    ssh-rsa
    ssh-dss
    ssh-ed25519
    ecdsa-sha2-nistp521
    ecdsa-sha2-nistp384
    ecdsa-sha2-nistp256