Figure 3:
Initial packet exchanges negotiating cryptographic keys in SSH.
Back to Article