Originally posted by Sushil Sharma:
ssh protocol is complicated. It requires generation of keys and use of SSL. [/QB]
I think we should be more careful with this statement in that SSH implementation depends on SSL, which isn't true. However, the implementation of SSH can certainly share some of the encryption tools/libs that are used in SSL