Differences

This shows you the differences between the selected revisions of the page.

2021-05-20 2021-05-20
5.18.5 SSH private key tools (PuTTYgen and Pageant) upgraded to PuTTY 0.75 (Upgraded default SSH key fingerprint format to OpenSSH-style SHA-256 + PuTTYgen now supports alternative provable-prime generation algorithm for RSA and DSA) (martin) style (martin)
Line 50: Line 50:
  * For EdDSA, the only valid sizes are 255 bits (these keys are also known as Ed25519 and are commonly used) and 448 bits (Ed448, which is much less common at the time of writing – //This feature is available only in PuTTYgen 0.75 included in the latest beta release.//). &beta (256 is also accepted for backward compatibility, but the effect is the same as 255.)   * For EdDSA, the only valid sizes are 255 bits (these keys are also known as Ed25519 and are commonly used) and 448 bits (Ed448, which is much less common at the time of writing – //This feature is available only in PuTTYgen 0.75 included in the latest beta release.//). &beta (256 is also accepted for backward compatibility, but the effect is the same as 255.)
-===== Selecting the prime generation method =====+===== Selecting the Prime Generation Method =====
//This feature is available only in PuTTYgen 0.75 included in the latest beta release.// &beta //This feature is available only in PuTTYgen 0.75 included in the latest beta release.// &beta
Line 148: Line 148:
WinSCP can [[ui_login_authentication#private_key_tools|show you the public key]] too. WinSCP can [[ui_login_authentication#private_key_tools|show you the public key]] too.
-===== [[save_params]] Parameters for saving key files =====+===== [[save_params]] Parameters for Saving Key Piles =====
//This feature is available only in PuTTYgen 0.75 included in the latest beta release.// &beta //This feature is available only in PuTTYgen 0.75 included in the latest beta release.// &beta
Line 156: Line 156:
In most cases, it's entirely sensible to leave all of these at their default settings. In most cases, it's entirely sensible to leave all of these at their default settings.
-==== PPK file version ====+==== PPK File Version ====
This defaults to version 3, which is fine for most uses. This defaults to version 3, which is fine for most uses.
Line 164: Line 164:
The version 2 format is less resistant to brute-force decryption, and doesn't support any of the following options to control that. The version 2 format is less resistant to brute-force decryption, and doesn't support any of the following options to control that.
-==== Options affecting passphrase hashing ====+==== Options Affecting Passphrase Hashing ====
All of the following options only affect keys saved with passphrases. They control how much work is required to decrypt the key (which happens every time you type its passphrase). This allows you to trade off the cost of legitimate use of the key against the resistance of the encrypted key to password-guessing attacks. All of the following options only affect keys saved with passphrases. They control how much work is required to decrypt the key (which happens every time you type its passphrase). This allows you to trade off the cost of legitimate use of the key against the resistance of the encrypted key to password-guessing attacks.

Last modified: by martin