Solved

How to check the keysize of private/public key?

Posted on 2011-02-20
8
549 Views
Last Modified: 2012-05-11
Hello, I have a paired private/public key.. I would like to know what key strength I am using. Whether it is 1024 or 2048 bit, please let me know how can I check it using openssl command.

Is is always true that if a private key is of 1024 bit then public key would be also 1024 bit? Thanks!
0
Comment
Question by:beer9
  • 3
  • 3
  • 2
8 Comments
 
LVL 5

Expert Comment

by:chqshaitan
ID: 34939432
what package did you create the key with?
0
 

Author Comment

by:beer9
ID: 34940660
I am not sure.. But I have public/private key pair but I think it was openssl
0
 
LVL 5

Assisted Solution

by:chqshaitan
chqshaitan earned 250 total points
ID: 34940956
0
NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

 
LVL 33

Expert Comment

by:Dave Howe
ID: 34949438
on windows? just look at the certificate in certificate manager and under "public key" it will tell you the key size (firefox offers similar views of the certificate)
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 34949443
note if you have the certificate as a cer file (or .pem) You can just double click it in windows to get the same view.
0
 

Author Comment

by:beer9
ID: 34987047
I see information like below as the output of "openssl x509 -in 1.pem -noout -text | less", so does it mean that it is 1024 bit? what is the difference of Modulus and Public key. Are they both same? Thanks!

            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):

Open in new window

0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 250 total points
ID: 34991871
They are effectively the same.

an rsa key consists of two parts, a public exponent (usually 65537 for most ssl certs) and a modulus (which is what is usually considered "keysize" as it is the product of the secretly generated primes that form the secret key)
0
 

Author Closing Comment

by:beer9
ID: 35036347
Thank you! :-)
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Imagine a situation that you have installed SSL (http://en.wikipedia.org/wiki/Secure_Sockets_Layer) Certificate on your Cisco ASA (Cisco Adaptive Security Appliance) firewall. Installation of SSL certificate on ASA is an another topic for which you …
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question