RSA Key Pair Generator
Generate RSA-OAEP key pairs (2048 or 4096-bit) instantly in your browser using the Web Crypto API. Keys are exported in PEM format — compatible with OpenSSL, Node.js, Python, and most TLS libraries. Nothing is sent to any server.
Frequently Asked Questions
What is RSA encryption?▼
RSA is an asymmetric cryptographic algorithm that uses a pair of mathematically linked keys: a public key (for encryption or signature verification) and a private key (for decryption or signing). It's widely used for SSL/TLS, SSH, and secure key exchange.
What is the difference between 2048-bit and 4096-bit RSA?▼
4096-bit keys are stronger than 2048-bit but are slower to generate and use. 2048-bit is considered secure for most uses through 2030+. 4096-bit provides extra margin for highly sensitive long-lived keys.
What format are the generated keys?▼
Public keys are exported in SPKI (SubjectPublicKeyInfo) format, encoded as PEM. Private keys use PKCS#8 format, also PEM-encoded. These formats are compatible with OpenSSL, Node.js crypto, Python cryptography, and most TLS libraries.
Are the keys generated securely?▼
Yes. Keys are generated using the browser's built-in SubtleCrypto Web Crypto API, which uses the operating system's cryptographically secure random number generator. Keys are never sent to any server.
Looking for more free developer tools?
Browse All Free Tools →Related Products
on GumroadDeveloper Productivity Bundle
Stop rebuilding the same setup every project. 51 VSCode snippets, 40 Git aliases, 5 Docker Compose stacks, 5 GitHub Actions workflows, 5 README templates, and a dotfiles kit. Set up a professional dev environment in under an hour.
Buy on Gumroad →AI Prompt Engineering Toolkit
Production-ready prompt templates, chain-of-thought workflows, and API integration code for GPT-4, Claude, Gemini, and any instruction-following LLM.
Buy on Gumroad →Developer Productivity Toolkit
Complete dev environment setup: VS Code settings, keybindings, snippets, shell aliases, Git hooks, tmux config, and Starship prompt. Copy, paste, code faster.
Buy on Gumroad →More Free Tools
Related Articles
Hash Functions Explained: MD5, SHA-1, SHA-256, and When to Use Each
Understand cryptographic hash functions: how MD5, SHA-1, SHA-256, and bcrypt work, why you should never use MD5 for passwords, and when each is appropriate in 2026.
How to Generate Secure Passwords: Entropy, Strength, and Best Practices
Learn how to generate truly secure passwords, understand password entropy, evaluate password strength, and implement password policies. Includes code examples and security guidelines.
Node.js Best Practices for Security and Performance in 2026
12 essential Node.js best practices covering security hardening, async patterns, memory management, error handling, and production deployment. With code examples.
Get weekly developer tips
Tool guides, productivity playbooks & AI tricks. Free. No spam.
Unlock AI-Powered Dev Tools
- ⚡ AI Code Review, Doc Generator & SQL Builder
- ⚡ All premium templates & early access
- ⚡ Member discounts on Gumroad products
$9/mo after trial · Cancel anytime
Want the full toolkit?
Get DevPlaybook Pro
Every template, guide, boilerplate, and automation script in one bundle. 13 premium products — grab them all at once and save big.
MIT licensed · Instant download · No subscription
See what's included → Browse all deals →