SEGGER - Jobs
emWin upgrade     Trade-In program     Web shop

 

pr-jlink-monitor-mode.html Protects sensitive privacy data
pr-jlink-monitor-mode.html Ideal for secure adminstration interfaces

emSSH - Secure Shell

emSSH is a software library that enables secure login to your embedded system.

emSSH offers the possibility to establish a secured connection to any server application in your product. It can be used both target independent in native computer applications, as well as in embedded targets.

Features

  • Secures your connection
  • Compatible with popular SSHv2 clients
  • Easy to understand
  • Simple to integrate
  • Extensive manual
  • Supports popular hardware crytography accelerators
  • Shares a common cryptography library, emCrypto, with emSSL, emSecure-RSA, and emSecure-ECDSA to reduce ROM requirements
  • No royalties

 

 

Notification Subscribe to emSSH software notifications
pr-jlink-monitor-mode.html Pricing

Why should I use emSSH?

  • emSSH offers a wide range of options for maximum compatibility.
  • emSSH can be configured for minimal memory footprint for small memory systems.
  • emSSH is a high quality product designed to be used easily but without limitations.
  • emSSH is not covered by an open-source or required-attribution license and can be integrated in any free, commercial, or proprietary product without the obligation to disclose the combined source.
  • emSSH is provided as source code and offers transparency for all included modules, allowing inspection by auditors.
  • emSSH is portable. The complete software is written in ANSI C and is compiler and target independent. It can be implemented in PC applications and in embedded designs.
  • emSSH is configurable. It is created for high performance and a low memory footprint. The library can be configured to fit any speed or size requirements. Unused features can be excluded, additional features can easily be added.

The emSSH package

emSSH is a complete package and comes with everything needed to secure communication.

It includes all modules which implement the required functionality to use SSH. They are provided in source code, to allow complete control of the code that is used in the product and create transparency to avoid worries about possible back doors or weakness in code, which cannot be checked in precompiled libraries.

emSSH comes with a simple, yet powerful API to make using emSSH in your product as simple as possible.

It also includes sample applications in binary and source code, which demonstrate how emSSH can be integrated in real life scenarios.


Supported capabilities

Key exchange algorithms

  • diffie-hellman-group1-sha1
  • diffie-hellman-group14-sha1
  • ecdh-sha2-nistp256
  • ecdh-sha2-nistp384
  • ecdh-sha2-nistp521

Public key algorithms

  • ssh-dss
  • ssh-rsa
  • ecdsa-sha2-nistp256
  • ecdsa-sha2-nistp384
  • ecdsa-sha2-nistp521
  • ssh-ed25519

Encryption algorithms

  • aes256-ctr
  • aes256-cbc
  • aes192-ctr
  • aes192-cbc
  • aes128-ctr
  • aes128-cbc
  • camellia256-ctr
  • camellia256-cbc
  • camellia192-ctr
  • camellia192-cbc
  • camellia128-ctr
  • camellia128-cbc
  • 3des-ctr
  • 3des-cbc
  • twofish256-cbc
  • twofish256-ctr
  • twofish192-cbc
  • twofish192-ctr
  • twofish128-cbc
  • twofish128-ctr
  • twofish-cbc
  • blowfish-ctr
  • blowfish-cbc
  • arcfour256
  • arcfour128
  • arcfour
  • cast128-ctr
  • cast128-cbc
  • aes128-gcm@openssh.com
  • aes256-gcm@openssh.com
  • rijndael-cbc@lysator.liu.se

MAC algorithms

  • hmac-sha2-512
  • hmac-sha2-256
  • hmac-sha1
  • hmac-sha1-96
  • hmac-md5
  • hmac-md5-96
  • hmac-sha2-512-etm@openssh.com
  • hmac-sha2-256-etm@openssh.com
  • hmac-sha1-etm@openssh.com
  • hmac-sha1-96-etm@openssh.com
  • hmac-md5-etm@openssh.com
  • hmac-md5-96-etm@openssh.com
  • hmac-ripemd160@openssh.com
  • hmac-ripemd160-etm@openssh.com
  • hmac-sha224@ssh.com
  • hmac-sha256-2@ssh.com
  • hmac-sha384@ssh.com
  • hmac-sha512@ssh.com

 

FAQ

Q: Can I use emSSH with my product?
A: Yes. emSSH can be included in nearly every product, independent from the used target, as well as in native computer applications.
   
Q: What's the difference between SSH and SSL?
A: SSH and SSL are completely separate protocols which have very little in common beyond using cryptography to secure a connection.  SSH is targeted to secure log in whereas SSL is targeted to secure connection (typically between a web server and a browser).
   
Q: Do SSL and SSH share any code?
A: SSL and SSH are completely independent sources bases.  Having said that, they share the SEGGER Cryptography Toolkit which provides cryptographic algorithm support to both.  Because they both rely on a shared component, a system with both emSSL and emSSH built into it will not pay twice for cryptographic algorithm support.
   
Q:
My question is not listed here. What can I do?
A: If you have any further questions about emSSL, feel free to contact us at info@segger.com