🔑

SSH Key Generator

Generate secure SSH key pairs for server authentication. Supports RSA, ED25519, and ECDSA algorithms. All keys are generated locally in your browser for maximum security.

Key Configuration

Add a comment to identify your key (e.g., email or username)

How to Use SSH Keys

1

Generate Your Keys

Select your preferred algorithm (ED25519 recommended), add an optional comment, and click "Generate SSH Key Pair". The tool will create your public and private keys instantly.

2

Add Public Key to Server

Copy your public key and add it to your server's authorized keys file:

echo "your-public-key" >> ~/.ssh/authorized_keys

Or use ssh-copy-id if available:

ssh-copy-id -i ~/.ssh/id_rsa.pub user@server
3

Save Private Key Securely

Download your private key and save it to your local machine:

mv ~/Downloads/id_rsa ~/.ssh/id_rsa
chmod 600 ~/.ssh/id_rsa

The chmod 600 command sets proper permissions (read/write for owner only).

4

Connect to Your Server

Use SSH to connect with your new key:

ssh -i ~/.ssh/id_rsa user@server-ip

If your key is named id_rsa, you can omit the -i flag as it's the default.

Algorithm Comparison

✓ ED25519

Modern elliptic curve algorithm offering the best security and performance.

  • • Most secure option
  • • Fastest generation & authentication
  • • Smallest key size (256-bit)
  • • Recommended for new deployments

RSA 2048/4096

Traditional algorithm with wide compatibility across all systems.

  • • Universal compatibility
  • • Slower than ED25519
  • • Larger key size (2048-4096 bits)
  • • Use for legacy systems

ECDSA P-256/384/521

Elliptic curve algorithm offering good security with smaller keys.

  • • Good performance
  • • Smaller keys than RSA
  • • Multiple strength levels
  • • Wide support in modern systems

Security Tip

Always use strong algorithms and never share your private key. For production servers, consider using ED25519 or RSA 4096.

Security Best Practices

Protect Private Keys

Never share your private key. Store it securely with 600 permissions (readable only by you).

Use Strong Passphrases

Add a passphrase to your private key for an extra layer of security in case it's compromised.

Rotate Keys Regularly

Generate new keys periodically and remove old ones from authorized_keys files.

Disable Password Auth

Once SSH keys are set up, disable password authentication in /etc/ssh/sshd_config.