Skip to main content

SSH Key Generator

Generate RSA & Ed25519 SSH key pairs securely in your browser

100% client-side — private keys never leave your device
Configuration

What Are SSH Keys?

SSH keys provide a more secure way to authenticate with remote servers than passwords. They use asymmetric cryptography — a public key (shared with servers) and a private key (kept secret on your machine).

When you connect to a server, SSH uses your private key to prove your identity without transmitting any passwords. This eliminates brute-force attacks and makes authentication both more secure and more convenient.

Ed25519 is the modern standard — it produces smaller, faster keys with equivalent or better security than RSA. Use RSA only when connecting to systems that don't support Ed25519.

Quick Start Guide

  1. 1

    Select Key Type

    Choose Ed25519 (recommended) for modern systems, or RSA 2048/4096 for older compatibility.

  2. 2

    Add a Comment

    Optionally add a comment (like user@hostname) to identify the key.

  3. 3

    Generate Key Pair

    Click Generate. Your key pair is created instantly in your browser using the Web Crypto API.

  4. 4

    Save Your Keys

    Download or copy both keys. Add the public key to your server's authorized_keys file.

3
Key Types
100%
Browser-based
Free
Cost

How to Use SSH Keys

After generating your key pair:

  1. Save the private key to ~/.ssh/id_ed25519 (or id_rsa)
  2. Set permissions: chmod 600 ~/.ssh/id_ed25519
  3. Copy the public key to your server's ~/.ssh/authorized_keys
  4. Connect: ssh user@server — no password needed

For GitHub: Go to Settings → SSH and GPG keys → New SSH key, paste your public key.

Ed25519 Support

Modern elliptic curve keys — smaller, faster, more secure than RSA

RSA 2048/4096

Traditional RSA keys for maximum compatibility with older systems

Client-Side Only

Keys are generated in your browser using Web Crypto API — nothing sent to any server

OpenSSH Format

Public keys in standard OpenSSH format, ready for authorized_keys

Download & Copy

One-click download or copy to clipboard for both public and private keys

SHA-256 Fingerprint

Verify your key identity with standard SHA-256 fingerprint

Security & Privacy

Your keys never leave your browser. This tool uses the Web Crypto API — a cryptographic standard built into modern browsers.

  • ✅ No server communication during key generation
  • ✅ No keys stored in cookies, localStorage, or any persistence layer
  • ✅ Source code is open and auditable
  • ✅ Keys are generated using cryptographically secure random number generators

Best practices:

  • Always protect your private key with file permissions (chmod 600)
  • Use a passphrase for additional protection (encrypt the private key locally after download)
  • Rotate keys periodically (every 1-2 years)
  • Never share your private key

Frequently Asked Questions

Last updated: