1a. Describe the SSH protocols. For what applications is SSH useful? b. Are there any advantages in not including the MAC in the scope of the packet encryption in SSH? c. What purpose does the MAC serve during the change cipher spec SSL exchange? d. List and define the parameters that define an SSL session state. Solution a)SSH is naturally used to log in to a remote machine and execute commands, however it also holds tunneling, forwarding TCP ports and X11 connections; it can move files utilizing the connected SSH file transfer SFTP or secure copy SCP protocols. SSH exercises the client-server model. c)To integrity defend the first set of messages where the cookies and crypto suite in order is replaced. This will stop a man-in-the-middle attack in step 1 for example, where someone can repress the original message and send a weaker place of crypto suites. d) a. Brute Force Cryptanalytic Attack: An exhaustive look for of the key space for a conventional encryption algorithm. This Attack: The conventional encryption algorithms utilize key lengths sorting from 40 to 168 bits. b. Replay Attack: previous SSL handshake messages are replayed. This is stopped by the employ of nonces. c. Man-in-the-Middle Attack: An attacker interposes during key swap, acting as the user to the server and as server to the user. Man-in-the-Middle Attack: This is stopped by the employ of public-key certificates to validate the correspondents. d. Password Sniffing: Passwords in HTTP or additional utilization traffic are eavesdropped.this User data is encrypted..