files/en-us/web/api/subtlecrypto/generatekey/index.md
{{APIRef("Web Crypto API")}}{{SecureContext_header}}{{AvailableInWorkers}}
The generateKey() method of the {{domxref("SubtleCrypto")}} interface is used to generate a new key (for symmetric algorithms) or key pair (for public-key algorithms).
generateKey(algorithm, extractable, keyUsages)
algorithm
RsaHashedKeyGenParams object.EcKeyGenParams object.HmacKeyGenParams object.AesKeyGenParams object.Ed25519 or an object of the form { name: "Ed25519" }.X25519 or an object of the form { name: "X25519" }.extractable
extractable parameter determines whether the private key can be exported; the public key is always extractable.keyUsages
encrypt
decrypt
sign
verify
deriveKey
deriveBits
wrapKey
unwrapKey
A {{jsxref("Promise")}} that fulfills with a {{domxref("CryptoKey")}} (for symmetric algorithms) or a {{domxref("CryptoKeyPair")}} (for public-key algorithms).
The promise is rejected when the following exception is encountered:
SyntaxError {{domxref("DOMException")}}
secret or private but keyUsages is empty, or invalid for the algorithm type.SyntaxError {{domxref("DOMException")}}
privateKey.usages attribute is empty, or invalid for the algorithm type.[!NOTE] You can try the working examples on GitHub.
This code generates an RSA-OAEP encryption key pair. See the complete code on GitHub.
let keyPair = await window.crypto.subtle.generateKey(
{
name: "RSA-OAEP",
modulusLength: 4096,
publicExponent: new Uint8Array([1, 0, 1]),
hash: "SHA-256",
},
true,
["encrypt", "decrypt"],
);
This code generates an ECDSA signing key pair. See the complete code on GitHub.
let keyPair = await window.crypto.subtle.generateKey(
{
name: "ECDSA",
namedCurve: "P-384",
},
true,
["sign", "verify"],
);
This code generates an HMAC signing key. See the complete code on GitHub.
let key = await window.crypto.subtle.generateKey(
{
name: "HMAC",
hash: { name: "SHA-512" },
},
true,
["sign", "verify"],
);
This code generates an AES-GCM encryption key. See the complete code on GitHub.
let key = await window.crypto.subtle.generateKey(
{
name: "AES-GCM",
length: 256,
},
true,
["encrypt", "decrypt"],
);
This code generates an Ed25519 signing key pair. It is derived from this source code on GitHub, which you can run live here.
<input id="run-button" type="button" value="Run" />
<pre id="log">Click "Run" button</pre>
#log {
height: 170px;
white-space: pre-wrap; /* wrap pre blocks */
overflow-wrap: break-word; /* break on words */
overflow-y: auto;
padding: 0.5rem;
border: 1px solid black;
}
const logElement = document.querySelector("#log");
function log(text) {
logElement.innerText = `${logElement.innerText}${text}\n`;
logElement.scrollTop = logElement.scrollHeight;
}
Code for generating a key pair using the Ed25519 algorithm and logging the information in each key is shown below.
Note that the code is run in a try..catch block because not all browsers support this algorithm.
The JavaScript first gets the #sign-button and #message {{HTMLElement("input")}} elements, then adds a listener for the click event on the button.
The event handler clears the log and runs the other operations passing the content of the <input> element.
const button = document.querySelector("#run-button");
const input = document.querySelector("#log");
button.addEventListener("click", () => {
// Clear log
logElement.innerText = "";
logElement.scrollTop = logElement.scrollHeight;
// Run test
test();
});
async function test() {
try {
// Create a key pair and use destructuring assignment to assign to variables
const { publicKey, privateKey } = await crypto.subtle.generateKey(
{
name: "Ed25519",
},
true,
["sign", "verify"],
);
// Log the properties of the keys
log(`publicKey: ${publicKey}`);
log(` type: ${publicKey.type}`);
log(` extractable: ${publicKey.extractable}`);
log(` algorithm: ${JSON.stringify(publicKey.algorithm)}`);
log(` usages: ${publicKey.usages}`);
log(`privateKey: ${privateKey}`);
log(` type: ${privateKey.type}`);
log(` extractable: ${privateKey.extractable}`);
log(` algorithm: ${JSON.stringify(privateKey.algorithm)}`);
log(` usages: ${privateKey.usages}`);
} catch (error) {
log(error);
}
}
The information about the created keys is logged below (or an error string if the browser does not allow the key to be created).
{{EmbedLiveSample("Ed25519", "100%", "240px")}}
This code generates an X25519 public and private key pair that can be used in {{domxref("SubtleCrypto.deriveKey()")}} to create a shared key, or in {{domxref("SubtleCrypto.deriveBits()")}} to create a shared secret.
<input id="run-button" type="button" value="Run" />
<pre id="log">Click "Run" button</pre>
#log {
height: 170px;
white-space: pre-wrap; /* wrap pre blocks */
overflow-wrap: break-word; /* break on words */
overflow-y: auto;
padding: 0.5rem;
border: 1px solid black;
}
const logElement = document.querySelector("#log");
function log(text) {
logElement.innerText = `${logElement.innerText}${text}\n`;
logElement.scrollTop = logElement.scrollHeight;
}
Code for generating a key pair using the X25519 algorithm and logging the information in each key is shown below.
Note that the code is run in a try..catch block because not all browsers support this algorithm.
The JavaScript first gets the #run-button and #log {{HTMLElement("input")}} elements, then adds a listener for the click event on the button.
The event handler clears the log, generates an X25519 key pair, and logs some of its properties.
const button = document.querySelector("#run-button");
const input = document.querySelector("#log");
button.addEventListener("click", () => {
// Clear log
logElement.innerText = "";
logElement.scrollTop = logElement.scrollHeight;
// Run test
test();
});
async function test() {
try {
// Create a key pair and use destructuring assignment to assign to variables
const { publicKey, privateKey } = await crypto.subtle.generateKey(
{
name: "X25519",
},
true,
["deriveKey", "deriveBits"],
);
// Log the properties of the keys
log(`publicKey: ${publicKey}`);
log(` type: ${publicKey.type}`);
log(` extractable: ${publicKey.extractable}`);
log(` algorithm: ${JSON.stringify(publicKey.algorithm)}`);
log(` usages: ${publicKey.usages}`);
log(`privateKey: ${privateKey}`);
log(` type: ${privateKey.type}`);
log(` extractable: ${privateKey.extractable}`);
log(` algorithm: ${JSON.stringify(privateKey.algorithm)}`);
log(` usages: ${privateKey.usages}`);
} catch (error) {
log(error);
}
}
The information about the created keys is logged below (or an error string if the browser does not allow the key to be created).
{{EmbedLiveSample("X25519", "100%", "240px")}}
{{Specifications}}
{{Compat}}