…

…
…
This RSA key generator is designed for practical key-pair creation when you need a public key, a private key, and enough control over the output to match your environment. The current interface lets you choose the key size, select unencrypted or encrypted PKCS#8 PEM output, pick the cipher used for encrypted private keys, add a passphrase when encryption is enabled, and then generate both public and private keys in one pass. Once the keys are ready, you can copy or download each one separately, download both together, or temporarily hide the private key on screen.
That makes the page useful for development, testing, staging certificates, SSH-adjacent experiments, application prototypes, and other workflows where you need a fresh RSA key pair quickly. The page is strongest as a controlled generation step, not as a place to store secrets long term or replace your organization’s key-management policy.
RSA uses a mathematically linked public/private key pair: the public key is meant to be shared, while the private key must stay secret. The generator creates both sides of that pair for you and packages them in PEM form so they can be used by common tools and libraries. The format choice matters because the receiving system may care about PKCS style, encryption state, and passphrase handling just as much as the raw key material itself.
The key safety rule is simple: generation is only the first step. A correct RSA key pair can still be mishandled if the private key is copied to insecure places, shared too broadly, or stored without policy controls. A strong sanity check is to verify the format and then move the private key immediately into your approved secret-handling workflow.
Choose encrypted PKCS#8, pick the cipher, enter the passphrase, and generate the pair. That gives you a more controlled private-key output for environments that require passphrase-protected storage or transfer.
Pick a common key length, generate the pair, copy the public key into the consuming system, and keep the private key local to the test. This is useful when you need fast validation without waiting on a larger provisioning process.
What does this page generate?
It generates an RSA public/private key pair and lets you copy or download the results in PKCS#8 PEM form.
Why would I encrypt the private key?
Encrypting the private key adds passphrase protection, which can reduce risk during storage or transfer when the environment expects encrypted key material.
What should I do after generating the keys?
Verify the expected format, protect the private key immediately, and move into the next workflow such as CSR creation, certificate setup, or application integration.
After the main result looks right, continue with TLS Checker if the next step in the workflow needs another related check, transform, or verification pass.
Hoaxes use weaknesses in human behavior to ensure they are replicated and distributed. In other words, hoaxes prey on the Human Operating System.
…