1024 – 4096-Bit Key Generation
Generate RSA key pairs in any standard size. NIST-recommended 2048-bit for current use; 4096-bit for maximum long-term security. All computed via the native Web Crypto API.
Generate secure RSA key pairs instantly — 1024 to 4096-bit, PEM, PKCS8 & OpenSSH formats. Encrypt, decrypt, sign and verify messages. 100% client-side. No data leaves your browser.
Choose bit size, key usage and format — then generate, copy or download your keys instantly.
authorized_keys.A complete public-key cryptography toolkit for developers, sysadmins and security researchers.
Generate RSA key pairs in any standard size. NIST-recommended 2048-bit for current use; 4096-bit for maximum long-term security. All computed via the native Web Crypto API.
Export public keys as PEM (SPKI) or OpenSSH-compatible format for direct use in authorized_keys. Private keys export as PKCS8 PEM, compatible with OpenSSL, Java, Node.js and Python.
Encrypt plaintext messages with the public key using RSA-OAEP with SHA-256. Decrypt ciphertext with the private key. Results are Base64-encoded for easy transmission.
Digitally sign messages using RSASSA-PSS with SHA-256. Verify that a signature was produced by the holder of the corresponding private key with a single click.
Paste any RSA PEM key to inspect its format, type and key size. A SHA-256 fingerprint is automatically computed from your public key for identity verification workflows.
Every operation — key generation, encryption, decryption, signing, verification — runs entirely in your browser. No data, key material or messages are ever transmitted to any server.
Four simple steps to generate production-grade RSA keys in your browser.
Select your key size (2048 or 4096-bit recommended), key usage (encrypt/sign) and output formats for both public and private keys.
The browser's Web Crypto API generates two mathematically linked keys using the RSA algorithm with a cryptographically secure random number generator.
Copy the PEM-encoded public or private key to clipboard, or download them as .pem files ready for use in servers, applications and SSH clients.
Use the built-in operations panel to encrypt messages with the public key, decrypt with the private key, create digital signatures, and verify them instantly.
RSA — named after its inventors Rivest, Shamir and Adleman — is the most widely deployed asymmetric cryptographic algorithm in the world. Published in 1977, it underpins the security of HTTPS/TLS, SSH authentication, email encryption (PGP/S-MIME), digital certificates and countless enterprise security systems. Unlike symmetric ciphers which share a single secret key, RSA uses a mathematically linked key pair: a freely shareable public key and a closely guarded private key.
The public key can safely be distributed to anyone. Senders use it to encrypt data that only the private key holder can decrypt, or to verify digital signatures produced by the private key. The private key must remain secret at all times — it is what decrypts incoming messages and what produces unforgeable digital signatures that prove the sender's identity.
Choosing the right key size is critical. 1024-bit RSA is obsolete and should never be used in new systems. NIST recommends 2048-bit RSA as the minimum for use until at least 2030, while 4096-bit keys provide significantly stronger security suitable for long-lived certificates, root CAs and high-sensitivity applications. Larger keys are computationally slower but provide a far larger security margin against future attacks, including advances in classical and quantum computing.
In SSH (Secure Shell) authentication, RSA is used in the ssh-rsa format. You generate a key pair, place the public key in the server's ~/.ssh/authorized_keys file, and keep the private key locally on your client. This eliminates password-based authentication, removing a major attack vector. Modern SSH clients and servers also support ECDSA and Ed25519, but RSA 4096 remains universally supported and widely trusted.
Best practices when using RSA keys: always generate keys locally in a secure environment; never reuse key pairs across different services; store private keys in encrypted keystores or hardware security modules (HSMs); use passphrase protection on private key files; rotate keys periodically; and revoke any key that may have been compromised immediately. This free RSA Key Generator follows all cryptographic standards, runs entirely in your browser via the Web Crypto API, and never transmits your sensitive key material anywhere.
Common questions about RSA keys, formats and best practices.
Discover our full suite of cryptocurrency, encryption, AI-powered and developer utilities — all free, no sign-up required.