Use RSA and DSA key files with PuTTY and puttygen This post covers how to log into an SSH server with PuTTY using an RSA or DSA private keyfile. Some SSH servers require the use of these RSA and DSA key files for greater security when logging in, because additional authenication is. Historically, version 1 of the SSH protocol supported only RSA keys. When version 2 was defined, RSA was still patented, so support of DSA was added, so that an opensource patent-free implementation could be made. RSA patent expired more than 10 years ago, so there is no worry now.
puttygen - public-key generator for the PuTTY tools
puttygen is a tool to generate and manipulate SSH public and private key pairs. It is part of the PuTTY suite, although it can also interoperate withthe private key formats used by some other SSH clients.

When you run puttygen, it does three things. Firstly, it either loads an existing key file (if you specified keyfile), or generates a new key(if you specified keytype). Then, it optionally makes modifications to the key (changing the comment and/or the passphrase); finally, it outputs thekey, or some information about the key, to a file.
All three of these phases are controlled by the options described in the following section.
In the first phase, puttygen either loads or generates a key. The options to control this are:

In the second phase, puttygen optionally alters properties of the key it has loaded or generated. The options to control this are:
In the third phase, puttygen saves the key or information about it. The options to control this are:
If no output type is specified, the default is private.
The following options do not run PuTTYgen as normal, but print informational messages and then quit:
To generate an SSH-2 RSA key pair and save it in PuTTY's own format (you will be prompted for the passphrase):To generate a larger (2048-bit) key:To change the passphrase on a key (you will be prompted for the old and new passphrases):To change the comment on a key:To convert a key into OpenSSH's private key format:To convert a key from another format (puttygen will automatically detect the input key type):To display the fingerprint of a key (some key types require a passphrase to extract even this much information):To add the OpenSSH-format public half of a key to your authorised keys file:
There's currently no way to supply passphrases in batch mode, or even just to specify that you don't want a passphrase at all.
Generate a New Private Key Login to the AWS EC2 console and select Key Pairs in the left sidebar On the next page, click the Create Key Pair button Give the new key a name, then click the create button. Generate public key from private aws. If you have the private SSH key you can re-generate the public key component simply by running the following ssh-keygen command: ssh-keygen -i -f /path/to/private-key /path/to/public-key That much is the simple part. The AWS console and API does not support pushing 2. The AWS private key file and certificate file that are generated by Amazon and used together to allow Elastic Bamboo to securely access some of the AWS services, such as EBS for elastic instances and the Amazon command line tools. Amazon EC2 uses public key cryptography to encrypt and decrypt login information. Public key cryptography uses a public key to encrypt a piece of data, and then the recipient uses the private key to. If you create the key via the ec2 console, AWS will keep the public key in the system automatically and your browser will download the private key. See Creating a Key Pair Using Amazon EC2. (this second approach will save you having to upload it to ec2 keypairs).