Hi Ankit, thank you very much for your feedback.
I completely agree and acknowledge that I left out the initial stage of host verification and establishing a secure channel. It was my thinking that I would focus on explaining at a high-level how private keys and public keys function in general, since this article is geared towards those who are mostly unfamiliar with the main concepts and processes driving SSH. I also wanted to keep the article relatively short and digestible — more of a primer than a complete overview. It was my hope that this article would simply provide a good foundation for others to more thoroughly explore how SSH works on their own.
Based on your feedback, I am considering adding a short section to the end of the article that describes what my article is missing. I might also want to clarify my goal and scope throughout the content.
Thank you again, and please let me know if you have any more feedback or suggestions.