SSH

Configuring Cryptographic Algorithms

Configuring Ciphers
Configuring MACs
Configuring KEXs
Configuring Host Key Signature Algorithms
Configuring Public Key Signature Algorithms
Cryptographic Hardware Support
[Note]Note

Algorithm names are case-sensitive.