Comparison of secret managing schemes: Difference between revisions

imported>Pacman99
mNo edit summary
imported>Lucc
Line 66: Line 66:
| reencryption for the ssh host key
| reencryption for the ssh host key
| encrypted
| encrypted
|
| decryption with the ssh host key
|
|
| yes
| yes