Your browser does not allow storing cookies. We recommend enabling them.

Private Key

In public-key cryptosystems, a private key is a key used for digitally signing documents. In some cryptosystems, it can also be used for decrypting data encrypted using a public key.

Each private key has a corresponding public key. Generally the public key can be easily derived from the private key, but deriving the private key from the public key is computationally infeasible.

Private Key in SSH

In SSH, a private key is used for authenticating computers and users. A host key authenticates servers, and an identity key serves as an authentication credential for a user. Together they are called SSH keys.

SSH keys grant access to servers, similar to user names and passwords. Therefore, they should be part of identity and access management in enterprises. All cyber-security related laws and regulations also require managing SSH key based access.

It turns out that in many organizations SSH keys have not been properly managed, and they have literally millions of keys configured as authorized keys granting access to their servers. An assessment of risk and deployment of SSH key management tools is strongly recommended.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now