SSH

Tectia® Client/Server 6.4

Enabling Elliptic Curve Cryptography

Practical Guide

SSH Communications Security Corporation

This software and documentation are protected by international copyright laws and treaties. All rights reserved.

ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jurisdictions.

SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions.

All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the User Manual.

10 November 2015


Table of Contents

1. Introduction
2. Enabling ECC for Tectia Client and Server on Windows
Tectia Client
User Keys
Host Keys
Key Exchange
Tectia Server
User Keys
Host Key
Key Exchange
3. Enabling ECC for Tectia Client and Server on Unix
Tectia Client
User Keys
Host Keys
Key Exchange
Tectia Server
User Keys
Host Key
Key Exchange
Testing the Connection
Configuration File Reference
Tectia Client (ssh-broker-config.xml)
Tectia Server (ssh-server-config.xml)