AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
It is also important to customize the strength of the key, which is given by the number of bits in the output – the higher the amount, the stronger the key. At this point, you are ready to initiate the generation engine, and your intervention might be required in doing so. The success and completion of the process depend on the random data that is necessary for the delivery of the key, and as such, you are asked to move the mouse around a blank area in order to include as much random information as possible. Prior to saving the key, it is recommended that you secure it with a passphrase that should be strong enough in order to prevent decryption from an outside party. Moreover, coming up with a key comment is possible. Convert your private or public keys to other formatsĪside from that, it is worth pointing out that loading an existing key is possible as well so that you can change the aforementioned details – passphrase and comments as you see fit. Users might also be interested in the fact that conversion functionality is also integrated into the program in case you don’t find its native PPK format suitable for your needs. Overall, PuTTY Key Generator paves the way to secure SSH authentications by generating RSA or DSA keys with an adjustable size.
0 Comments
Read More
Leave a Reply. |