tl;dr 😎

RSA Based keys aren’t safe, use EdDSA-based keys instead.

ssh-keygen -o -a 256 -t ed25519 -C "$(hostname)-$(date +'%d-%m-%Y')"

And a long’ish version… 🥲

With the rising era of quantum computing, RSA-based SSH keys are becoming obsolete and easy to overcome.

RSA

Supported by all common major languages, compatible with legacy machines (SHA-1).

Slow to generate (especially when you opt for beefy keys as 2048-bits) and quantum computers are here to crack those keys in no time.

ECDSA

Supported by major languages and compatible with many clients with a nice improvement of key generating over RSA.

However, the way this key is being generated can compromise the private key as not so private anymore.

EdDSA

A fast-performing key with the best length/security ratio, which fixed the security flaws that have been found in ECDSA.

But on the other hand, it’s relatively new and not supported by all the major languages.

Comments to: Don’t use RSA for SSH Keys, use this insead

Your email address will not be published. Required fields are marked *