User Rating 0.0 β˜…β˜…β˜…β˜…β˜…
Total Usage 0 times
Category Security
🔒 CLIENT-SIDE SECURE • NO SERVER UPLOADS
Entropy Collector
Move mouse here to gather randomness
0% Collected
Public Key (PEM)
Fingerprint: -
Private Key (PEM)
Is this tool helpful?

Your feedback helps us improve.

β˜… β˜… β˜… β˜… β˜…

About

This tool leverages the native window.crypto API to generate cryptographically secure SSH and encryption keys entirely within your browser client. Unlike server-side generators, your private key never traverses a network, eliminating the risk of interception or database leaks.

We support both RSA (Rivest - Shamir - Adleman) and ECDSA (Elliptic Curve Digital Signature Algorithm). RSA relies on the practical difficulty of factoring the product of two large prime numbers, p and q. ECDSA offers equivalent security at smaller key sizes by utilizing the algebraic structure of elliptic curves over finite fields, resulting in faster computations and less bandwidth usage.

ssh-keys rsa-generator ecdsa cryptography pem-tool

Formulas

RSA Public Key Generation:

n = p Γ— q

Where n is the modulus. The public exponent e is typically 65537.

Elliptic Curve Equation (Weierstrass Form):

y2 ≑ x3 + ax + b (mod p)

Security relies on the discrete logarithm problem: finding k given Q = kG.

Reference Data

AlgorithmKey SizeSecurity Level (Bits)Recommended UseEst. Quantum Resistance
RSA1024-bit80Legacy / Testing (Unsafe)Broken
RSA2048-bit112Standard Web/SSHLow
RSA4096-bit140+Long-term Cold StorageModerate
ECDSAP-256128Modern Mobile/WebModerate
ECDSAP-384192Top Secret (NSA Suite B)High
ECDSAP-521256Maximum AssuranceVery High

Frequently Asked Questions

Yes. This tool uses the Web Crypto API, a browser-native standard. No data is sent to any server. You can verify this by inspecting the Network tab in your browser developer tools or turning off your internet connection before generating.
For maximum compatibility with older systems, use RSA (2048 or 4096 bits). For modern applications requiring speed and efficiency (like mobile apps or IoT), ECDSA (P-256) is superior. ECDSA keys are significantly shorter for the same security level.
Computers are deterministic and struggle to create true randomness. By moving your mouse, you provide "entropy" - unpredictable data derived from physical movements - which seed the random number generator (CSPRNG) to ensure your keys are theoretically impossible to guess.
No. Cryptography relies on the mathematical impossibility of reversing the generation process without the key. If you lose the private key file, any data encrypted with the public key is permanently inaccessible.