Chapter 8: Using public keys for SSH authentication