SSH Key Generator
Generate RSA & Ed25519 SSH key pairs securely in your browser
What Are SSH Keys?
SSH keys provide a more secure way to authenticate with remote servers than passwords. They use asymmetric cryptography — a public key (shared with servers) and a private key (kept secret on your machine).
When you connect to a server, SSH uses your private key to prove your identity without transmitting any passwords. This eliminates brute-force attacks and makes authentication both more secure and more convenient.
Ed25519 is the modern standard — it produces smaller, faster keys with equivalent or better security than RSA. Use RSA only when connecting to systems that don't support Ed25519.
Quick Start Guide
- 1
Select Key Type
Choose Ed25519 (recommended) for modern systems, or RSA 2048/4096 for older compatibility.
- 2
Add a Comment
Optionally add a comment (like user@hostname) to identify the key.
- 3
Generate Key Pair
Click Generate. Your key pair is created instantly in your browser using the Web Crypto API.
- 4
Save Your Keys
Download or copy both keys. Add the public key to your server's authorized_keys file.
How to Use SSH Keys
After generating your key pair:
- Save the private key to
~/.ssh/id_ed25519(orid_rsa) - Set permissions:
chmod 600 ~/.ssh/id_ed25519 - Copy the public key to your server's
~/.ssh/authorized_keys - Connect:
ssh user@server— no password needed
For GitHub: Go to Settings → SSH and GPG keys → New SSH key, paste your public key.
Ed25519 Support
Modern elliptic curve keys — smaller, faster, more secure than RSA
RSA 2048/4096
Traditional RSA keys for maximum compatibility with older systems
Client-Side Only
Keys are generated in your browser using Web Crypto API — nothing sent to any server
OpenSSH Format
Public keys in standard OpenSSH format, ready for authorized_keys
Download & Copy
One-click download or copy to clipboard for both public and private keys
SHA-256 Fingerprint
Verify your key identity with standard SHA-256 fingerprint
Security & Privacy
Your keys never leave your browser. This tool uses the Web Crypto API — a cryptographic standard built into modern browsers.
- ✅ No server communication during key generation
- ✅ No keys stored in cookies, localStorage, or any persistence layer
- ✅ Source code is open and auditable
- ✅ Keys are generated using cryptographically secure random number generators
Best practices:
- Always protect your private key with file permissions (
chmod 600) - Use a passphrase for additional protection (encrypt the private key locally after download)
- Rotate keys periodically (every 1-2 years)
- Never share your private key
Frequently Asked Questions
Related Tools
devtoolsShowing 8 of 94 related tools