There is a very basic tool that everyone uses that works with servers and infrastructure. It is ssh, ssh uses both symmetric and public-key cryptography to keep the data safe in transit. In this article, we are going to talk about the math behind public-key cryptography. Public-key cryptography depends on the prime numbers and large
![The math behind public-key cryptography which is also used in SSH](https://i0.wp.com/www.learnsteps.com/wp-content/uploads/2021/05/sshmath.png?resize=848%2C522&ssl=1)