In the SSH algorithm negotiation phase, the SSH server and client exchange the list of algorithms that hey support. The list of symmetric encryption algorithms of the SSH server is as follows: aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. The list of symmetric encryption algorithms of the SSH client is as follows: aes128-ctr, aes192-ctr, aes256-ctr, and aes256-cbc. Which of the following symmetric encryption algorithms can be used by both the SSH server and client?
7c3a129
10 months, 3 weeks ago