Secure by design
Keys are generated on a secure backend with OpenSSL and delivered over HTTPS. No third‑party sharing.
Browser-based RSA key generator for developers, security teams, and DevOps. Create 2048 and 4096-bit RSA key pairs, manage them in a private dashboard, and export keys in PEM format.
No software to install. OpenSSL-backed, HTTPS‑only.
Use this free tool to generate a one‑off RSA key pair. Keys are generated server‑side with OpenSSL and are not stored on our servers for guest users.
Keys are generated on a secure backend with OpenSSL and delivered over HTTPS. No third‑party sharing.
PEM‑encoded public and private keys that work with OpenSSL, JWT libraries, and most crypto toolkits.
Recent keys remain available in your dashboard so you can re‑download them when needed.
Optimized for desktop, tablet, and mobile so you can generate RSA keys from anywhere.
When you create a new RSA key pair, our service uses the OpenSSL extension in PHP to generate a high‑entropy private key and derive its matching public key. Both keys are stored in PEM format, associated with your account, and can be copied directly into your configuration files or code.
An RSA key pair includes a public key and a private key. The public key can be shared, while the private key must be kept secret.
Yes. You can generate a one-time RSA key pair as a guest without creating an account. Guest keys are not stored on the server.
2048-bit RSA is the recommended default for most new uses. 4096-bit is stronger but slower, and 1024-bit is legacy and only suitable for testing or older systems.
Yes. Registered users can view, copy, and download their stored public and private keys from the dashboard.
Private keys should always be handled carefully. Guest keys are not stored, and registered users should keep their private keys secure and only download them on trusted devices.
If you prefer generating keys on your own computer, you can use OpenSSL from the command line. The example below creates a 2048-bit RSA private key and then exports the matching public key.
openssl genrsa -out private-key.pem 2048
openssl rsa -in private-key.pem -pubout -out public-key.pem
You can inspect the files afterward to confirm they contain the expected PEM headers:
BEGIN RSA PRIVATE KEY for the private key and BEGIN PUBLIC KEY for the public key.