Home
|
FAQ
|
Feedback
|
Licence
|
Updates
|
Mirrors
|
Keys
|
Links
|
Team
Download:
Stable
·
Snapshot
|
Docs
|
Privacy
|
Changes
|
Wishlist
A combined cipher/MAC scheme using AES in a Galois Counter Mode (GCM) is defined for SSH by RFC 5647.
OpenSSH defines and implements its own versions, aes256-gcm@openssh.com and aes128-gcm@openssh.com (described in their protocol extension documentation), which use the same cryptography but avoid the badly-specified negotiation semantics in the RFC.
As of August 2022, PuTTY implements this - only the OpenSSH variants, so PuTTY won't use this cipher/MAC with SSH servers that only offer the unsuffixed aes256-gcm and aes128-gcm protocol IDs (if any such servers exist). (PuTTY's implementation makes basic use of processor cryptographic acceleration where available, although it could probably be improved upon.)