| Field | Value | Copy |
|---|---|---|
| {{ row.label }} | {{ row.value }} | |
| No data | ||
SSH public keys are structured identifiers for secure remote access and automation, and their fingerprints are compact signatures that help you confirm identity quickly. Many teams search for an ssh key fingerprint checker so they can compare what a server shows with what they hold.
Paste a single OpenSSH key line and read the summary with one glance. You get a modern fingerprint plus a hexadecimal digest and clear key details so matching a host or user becomes straightforward.
In a deployment workflow you might paste a server key copied from known_hosts or a public key from an authorized_keys entry and compare the short string shown on first connection. The same approach helps during audits when you want to verify stored keys against a registry.
Public keys identify key material and not account status, so a match confirms bytes and not trust. Keep inputs tidy and consistent for clean comparisons, and prefer current key types for long term safety. If you paste multiple lines only the first is processed and extra lines are ignored with a short note.
Secure Shell (SSH) public keys are provided as a token that names the key family and a Base64 payload that encodes the key blob. The tool reads the payload, decodes the bytes, and reports digest summaries that are designed for fast human comparison.
The main computation forms a fingerprint from the decoded key bytes, not from the text line. It reports a Base64 summary of the SHA256 digest and a colon separated hexadecimal summary of the MD5 digest. When enabled, it also reports a Base64 summary of the SHA1 digest for legacy environments.
Results include the key family, a pretty type label, bit length or curve, and the original comment. Warnings highlight deprecated families, unusually small modulus sizes, certificate blobs, and type mismatches between the visible token and the inner blob.
Comparisons are valid for the exact bytes of the encoded key blob. They do not assert ownership or authorization and they do not test whether a private key exists for the public key.
| Symbol | Meaning | Unit/Datatype | Source |
|---|---|---|---|
| key bytes | Decoded OpenSSH key blob | byte array | Derived |
| SHA256 digest of key bytes | 32 bytes | Derived | |
| Displayed Base64 fingerprint without padding | string | Derived | |
| Colon separated hexadecimal pairs | string | Derived | |
| bits | Estimated key size or curve size | integer | Derived |
Input line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJ0vS6m… user@host.
Interpretation: the ED25519 label confirms family, the fingerprint strings allow side‑by‑side matching with what a host or agent reports.
| Warning | Trigger | Implication |
|---|---|---|
| RSA key shorter than 2048 bits | RSA modulus bit length < 2048 | Consider migrating to larger RSA or ED25519/ECDSA. |
| DSA keys are deprecated | Family token is ssh-dss |
Expect rejection in many SSH builds. |
| OpenSSH certificate detected | Inner type ends with -cert-v…@openssh.com |
Fingerprint reflects the certificate blob bytes. |
| Type token mismatch | Outer token differs from inner blob type | Line may be malformed or rewritten. |
| Unexpected Ed25519 key length | Public key byte length ≠ 32 | Input likely truncated or corrupted. |
| Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
|---|---|---|---|---|---|---|
| Public key line | string | 1 char | — | Rejects private key headers | Private keys are not accepted. | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAA… user@host |
| Strict format | string | — | — | type base64 [comment] |
Expected "type base64 [comment]". | — |
| Key type token | enum | — | — | Known OpenSSH families | Unsupported or unknown key type. | — |
| Base64 after type | string | 1 char | — | Non‑empty | Missing Base64 key after type. | — |
| Base64 decoding | string | — | — | Padding added except length mod 4 = 1 | Invalid Base64 key data. | — |
| Browser crypto | capability | — | — | WebCrypto required | WebCrypto is unavailable in this browser. | — |
| Input | Accepted Families | Output | Encoding/Precision | Rounding |
|---|---|---|---|---|
| OpenSSH line | ED25519, RSA, DSA, ECDSA, SK‑ECDSA, SK‑ED25519, OpenSSH certificates | SHA256, MD5, optional SHA1; bits/curve; comment | Base64 (no padding) and hex with colons | Exact digests; no rounding |
| authorized_keys entry | Heuristic token discovery | As above | As above | — |
| known_hosts line | Host patterns and markers ignored | As above | As above | — |
Units, precision, and rendering: digests are exact; SHA256 and SHA1 are reported without trailing = padding; MD5 can be uppercase on request; byte counts are integers.
Networking and storage behavior: processing is client‑only with no uploads; copy and download actions write to the local clipboard or files.
Diagnostics and determinism: the same input bytes always yield the same outputs; warnings are purely rule based.
Security considerations: never paste private keys; fingerprints prove byte identity only; MD5 is for compatibility and not for risk decisions.
Privacy & compliance: no data is transmitted or stored server‑side.
SSH public key fingerprints let you compare keys quickly and confirm what a host or agent presents.
type base64 [comment] format if needed.Example: paste ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAA… alice@work and match the shown SHA256:… with a server prompt.
No. All parsing and hashing occur in your browser and the page does not send inputs anywhere.
Never paste private keys.ED25519, RSA, DSA, ECDSA, security‑key variants, and OpenSSH certificate forms. Unknown families are rejected during parse.
It exists for compatibility with older systems. Leave it off unless you must compare against a legacy record.
The hex digest is grouped as byte pairs for readability. You can switch to uppercase if your reference uses it.
Yes. Heuristics locate the key token and Base64 payload, ignoring host patterns or options that precede the key.
Warnings highlight deprecated families or short RSA sizes. They suggest migration but do not block fingerprint comparison.
This tool focuses on SSH public keys and fingerprints. Use a certificate utility to inspect certificate signing requests.
Yes after the page loads, since computation happens locally. Clipboard and file actions depend on your browser settings.