Protects sensitive privacy data
Ideal for secure adminstration interfaces
emSSH - Secure Shell
emSSH is a software library that enables secure login to your embedded system.
emSSH offers the possibility to establish a secured connection to any server application in your product. It can be used both target independent in native computer applications, as well as in embedded targets.
|Subscribe to emSSH software notifications|
Why should I use emSSH?
- emSSH offers a wide range of options for maximum compatibility.
- emSSH can be configured for minimal memory footprint for small memory systems.
- emSSH is a high quality product designed to be used easily but without limitations.
- emSSH is not covered by an open-source or required-attribution license and can be integrated in any free, commercial, or proprietary product without the obligation to disclose the combined source.
- emSSH is provided as source code and offers transparency for all included modules, allowing inspection by auditors.
- emSSH is portable. The complete software is written in ANSI C and is compiler and target independent. It can be implemented in PC applications and in embedded designs.
- emSSH is configurable. It is created for high performance and a low memory footprint. The library can be configured to fit any speed or size requirements. Unused features can be excluded, additional features can easily be added.
The emSSH package
emSSH is a complete package and comes with everything needed to secure communication.
It includes all modules which implement the required functionality to use SSH. They are provided in source code, to allow complete control of the code that is used in the product and create transparency to avoid worries about possible back doors or weakness in code, which cannot be checked in precompiled libraries.
emSSH comes with a simple, yet powerful API to make using emSSH in your product as simple as possible.
It also includes sample applications in binary and source code, which demonstrate how emSSH can be integrated in real life scenarios.
Key exchange algorithms
Public key algorithms
|Q:||Can I use emSSH with my product?|
|A:||Yes. emSSH can be included in nearly every product, independent from the used target, as well as in native computer applications.|
|Q:||What's the difference between SSH and SSL?|
|A:||SSH and SSL are completely separate protocols which have very little in common beyond using cryptography to secure a connection. SSH is targeted to secure log in whereas SSL is targeted to secure connection (typically between a web server and a browser).|
|Q:||Do SSL and SSH share any code?|
|A:||SSL and SSH are completely independent sources bases. Having said that, they share the SEGGER Cryptography Toolkit which provides cryptographic algorithm support to both. Because they both rely on a shared component, a system with both emSSL and emSSH built into it will not pay twice for cryptographic algorithm support.|
|Q: ||My question is not listed here. What can I do?|
|A:||If you have any further questions about emSSL, feel free to contact us at firstname.lastname@example.org|