Understanding SSH encryption algorithms