Field | Value | Copy |
---|---|---|
{{ row.label }} | {{ row.value }} | |
No data |
SSH key fingerprints are short identifiers that safely represent a public key. They let you compare what a server presents with what you trust, without exposing the key itself. The OpenSSH fingerprint format is a common reference in audits and inventory work, helping teams verify host identity during provisioning and routine checks.
You provide one public key line or an entry from a known_hosts or authorized_keys list. The output shows digest values plus parsed details such as key type, bit length or curve, and an optional comment. A human‑readable summary pairs with structured data so you can paste into tickets, playbooks, and asset records.
Picture a note that includes ssh‑ed25519, a long Base64 string, and a user tag. The SHA256 value becomes the anchor you compare across machines. If it changes, pause and confirm the source before continuing. Never paste a private key anywhere, and always verify through a trusted channel.
Use SHA‑256 for matching, keep MD5 for legacy listings, and enable SHA‑1 only when you must compare with older catalogs. The short preview is handy on screen, but copy the complete value when filing requests. Certificate tokens are recognized, and their fingerprint reflects the whole certificate rather than the inner raw key.
The engine parses a single OpenSSH public key line, or applies heuristics to authorized_keys and known_hosts entries, to locate the key type token and Base64 payload. It decodes the SSH key blob, derives inner type, bit length or curve, and computes fingerprints over the raw blob. Digests include SHA‑256 (primary), MD5 (colon‑separated hex, optional uppercase), and optionally SHA‑1. Processing is deterministic for identical inputs and runs entirely in your browser.
Symbol | Meaning | Unit/Datatype | Source |
---|---|---|---|
k | Key type token (e.g., ssh‑ed25519, ssh‑rsa) | text | Input |
b64 | Base64 payload of the OpenSSH key | text | Input |
L | Key blob length | bytes | Derived |
n | RSA modulus bit length | bits | Derived |
c | Curve name for ECDSA or security‑key types | text | Derived |
SHA256b64 | Primary fingerprint in OpenSSH style | Base64 (no padding) | Derived |
MD5hex | Legacy fingerprint | hex pairs with colons | Derived |
*‑cert‑vNN@openssh.com
token.=
padding.Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
---|---|---|---|---|---|---|
Public key or single line | text | 1 char | — | OpenSSH type, then Base64, then optional comment | “Private keys are not accepted.”; “Enter a single OpenSSH public key line.”; “Could not find a supported key type in the line.”; “Missing Base64 key after type.”; “Invalid Base64 length.”; “Invalid Base64 key data.”; “Truncated key blob.”; “Truncated string in key blob.”; “WebCrypto is unavailable in this browser.” | ssh‑ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJ0vS6m... user@host |
Include SHA‑1 | boolean | — | — | Computes legacy SHA‑1 fingerprint in Base64 | Default off | — |
Uppercase MD5 hex | boolean | — | — | Shows MD5 hex in uppercase | Default off | — |
Strict parsing | boolean | — | — | Only “type base64 [comment]”; else heuristics apply | Default off | — |
Input | Accepted Families | Output | Encoding/Precision | Rounding |
---|---|---|---|---|
OpenSSH public key line | OpenSSH token plus Base64 and optional comment | SHA‑256 (primary) | Base64 without padding as SHA256:<value> |
Exact |
authorized_keys / known_hosts entry | Heuristic token and payload extraction | MD5 (legacy) | Hex byte pairs with colons; optional uppercase | Exact |
OpenSSH certificate token | *‑cert‑vNN@openssh.com |
SHA‑1 (optional) | Base64 without padding as SHA1:<value> |
Exact |
File text | Loaded as UTF‑8 text and trimmed | JSON and CSV exports | UTF‑8 text with quoted fields | Exact |
Input: ssh‑ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJ0vS6m... user@host
Derived: type ED25519, bits 256, comment user@host.
Output: SHA256:<base64‑without‑padding>
, MD5 as aa:bb:cc:…
, plus a one‑line summary like 256 SHA256:<value> user@host (ED25519)
.
No data is transmitted or stored server‑side; all parsing and hashing happen locally in your browser.
Follow these steps to compute and export fingerprints from a single key line.
Example: Paste an ssh‑rsa line; you’ll see SHA‑256, MD5, bit length, and any comment, plus a one‑line summary for quick comparison.
Reminder Never paste private keys; this checker rejects them by design.
No. Parsing and hashing occur entirely in your browser, and nothing is sent to any server or saved.
Use trusted devices for sensitive material.ed25519, RSA, DSA, ECDSA on NIST P‑256/P‑384/P‑521, two security‑key types, and OpenSSH certificates marked by *‑cert‑vNN@openssh.com
.
OpenSSH‑style SHA‑256 in Base64 without padding, MD5 as colon‑separated hex, and optional SHA‑1 in Base64.
Fingerprints are exact digests of the key blob. The process is deterministic; identical inputs yield identical outputs.
Once loaded, computation runs in your browser with no additional requests. Use a modern browser that supports WebCrypto.
SHA‑1 exists for backward comparison only. Keep it off unless you must match older records.
A compact line showing bits, the SHA‑256 value, an optional comment, and the pretty type in parentheses for quick side‑by‑side comparison.
Only the first non‑empty line is processed. Extra lines are ignored with a small notice.
Short RSA keys are weak by today’s standards. A warning helps you spot keys that should be rotated.