SubtleCrypto: generateKey() method
{{APIRef("Web Crypto API")}} {{SecureContext_header}} {{AvailableInWorkers}}
The generateKey() method of the {{domxref("SubtleCrypto")}} interface is used to generate a new key (for symmetric algorithms) or key pair (for public-key algorithms).
Syntax
generateKey(algorithm, extractable, keyUsages)
Parameters
-
algorithm- : An object defining the type of key to generate and providing extra algorithm-specific parameters.
- For RSASSA-PKCS1-v1_5, RSA-PSS,
or RSA-OAEP:
pass an
RsaHashedKeyGenParamsobject. - For ECDSA or ECDH:
pass an
EcKeyGenParamsobject. - For HMAC: pass an
HmacKeyGenParamsobject. - For AES-CTR, AES-CBC,
AES-GCM, or AES-KW:
pass an
AesKeyGenParamsobject. - For Ed25519: pass the string
Ed25519or an object of the form{ name: "Ed25519" }. - For X25519: pass the string
X25519or an object of the form{ name: "X25519" }.
- For RSASSA-PKCS1-v1_5, RSA-PSS,
or RSA-OAEP:
pass an
- : An object defining the type of key to generate and providing extra algorithm-specific parameters.
-
extractable- : A boolean value indicating whether it will be possible to export the key using
{{domxref("SubtleCrypto.exportKey()")}}or{{domxref("SubtleCrypto.wrapKey()")}}.
- : A boolean value indicating whether it will be possible to export the key using
-
keyUsages- : An
{{jsxref("Array")}}of strings indicating what can be done with the newly generated key. Possible values for array elements are:encrypt- : The key may be used to
{{domxref("SubtleCrypto.encrypt()", "encrypt", "", "nocode")}}messages.
- : The key may be used to
decrypt- : The key may be used to
{{domxref("SubtleCrypto.decrypt()", "decrypt", "", "nocode")}}messages.
- : The key may be used to
sign- : The key may be used to
{{domxref("SubtleCrypto.sign()", "sign", "", "nocode")}}messages.
- : The key may be used to
verify- : The key may be used to
{{domxref("SubtleCrypto.verify()", "verify", "", "nocode")}}signatures.
- : The key may be used to
deriveKey- : The key may be used in
{{domxref("SubtleCrypto.deriveKey()", "deriving a new key", "", "nocode")}}.
- : The key may be used in
deriveBits- : The key may be used in
{{domxref("SubtleCrypto.deriveBits()", "deriving bits", "", "nocode")}}.
- : The key may be used in
wrapKey- : The key may be used to
{{domxref("SubtleCrypto.wrapKey()", "wrap a key", "", "nocode")}}.
- : The key may be used to
unwrapKey- : The key may be used to
{{domxref("SubtleCrypto.unwrapKey()", "unwrap a key", "", "nocode")}}.
- : The key may be used to
- : An
Return value
A {{jsxref("Promise")}} that fulfills with a {{domxref("CryptoKey")}} (for symmetric algorithms) or a {{domxref("CryptoKeyPair")}} (for public-key algorithms).
Exceptions
The promise is rejected when the following exception is encountered:
SyntaxError{{domxref("DOMException")}}- : Raised when the result is a
{{domxref("CryptoKey")}}of typesecretorprivatebutkeyUsagesis empty, or invalid for the algorithm type.
- : Raised when the result is a
SyntaxError{{domxref("DOMException")}}- : Raised when the result is a
{{domxref("CryptoKeyPair")}}and itsprivateKey.usagesattribute is empty, or invalid for the algorithm type.
- : Raised when the result is a
Examples
[!NOTE] You can try the working examples on GitHub.
RSA key pair generation
This code generates an RSA-OAEP encryption key pair. See the complete code on GitHub.
let keyPair = await window.crypto.subtle.generateKey(
{
name: "RSA-OAEP",
modulusLength: 4096,
publicExponent: new Uint8Array([1, 0, 1]),
hash: "SHA-256",
},
true,
["encrypt", "decrypt"],
);
Elliptic curve key pair generation
This code generates an ECDSA signing key pair. See the complete code on GitHub.
let keyPair = await window.crypto.subtle.generateKey(
{
name: "ECDSA",
namedCurve: "P-384",
},
true,
["sign", "verify"],
);
HMAC key generation
This code generates an HMAC signing key. See the complete code on GitHub.
let key = await window.crypto.subtle.generateKey(
{
name: "HMAC",
hash: { name: "SHA-512" },
},
true,
["sign", "verify"],
);
AES key generation
This code generates an AES-GCM encryption key. See the complete code on GitHub.
let key = await window.crypto.subtle.generateKey(
{
name: "AES-GCM",
length: 256,
},
true,
["encrypt", "decrypt"],
);
Ed25519 key generation
This code generates an Ed25519 signing key pair. It is derived from this source code on GitHub, which you can run live here.
<input id="run-button" type="button" value="Run" />
<pre id="log">Click "Run" button</pre>
#log {
height: 170px;
white-space: pre-wrap; /* wrap pre blocks */
overflow-wrap: break-word; /* break on words */
overflow-y: auto;
padding: 0.5rem;
border: 1px solid black;
}
const logElement = document.querySelector("#log");
function log(text) {
logElement.innerText = `${logElement.innerText}${text}\n`;
logElement.scrollTop = logElement.scrollHeight;
}
JavaScript
Code for generating a key pair using the Ed25519 algorithm and logging the information in each key is shown below.
Note that the code is run in a try..catch block because not all browsers support this algorithm.
The JavaScript first gets the #sign-button and #message {{HTMLElement("input")}} elements, then adds a listener for the click event on the button.
The event handler clears the log and runs the other operations passing the content of the <input> element.
const button = document.querySelector("#run-button");
const input = document.querySelector("#log");
button.addEventListener("click", () => {
// Clear log
logElement.innerText = "";
logElement.scrollTop = logElement.scrollHeight;
// Run test
test();
});
async function test() {
try {
// Create a key pair and use destructuring assignment to assign to variables
const { publicKey, privateKey } = await crypto.subtle.generateKey(
{
name: "Ed25519",
},
true,
["sign", "verify"],
);
// Log the properties of the keys
log(`publicKey: ${publicKey}`);
log(` type: ${publicKey.type}`);
log(` extractable: ${publicKey.extractable}`);
log(` algorithm: ${JSON.stringify(publicKey.algorithm)}`);
log(` usages: ${publicKey.usages}`);
log(`privateKey: ${privateKey}`);
log(` type: ${privateKey.type}`);
log(` extractable: ${privateKey.extractable}`);
log(` algorithm: ${JSON.stringify(privateKey.algorithm)}`);
log(` usages: ${privateKey.usages}`);
} catch (error) {
log(error);
}
}
Result
The information about the created keys is logged below (or an error string if the browser does not allow the key to be created).
{{EmbedLiveSample("Ed25519", "100%", "240px")}}
X25519 key generation
This code generates an X25519 public and private key pair that can be used in {{domxref("SubtleCrypto.deriveKey()")}} to create a shared key, or in {{domxref("SubtleCrypto.deriveBits()")}} to create a shared secret.
<input id="run-button" type="button" value="Run" />
<pre id="log">Click "Run" button</pre>
#log {
height: 170px;
white-space: pre-wrap; /* wrap pre blocks */
overflow-wrap: break-word; /* break on words */
overflow-y: auto;
padding: 0.5rem;
border: 1px solid black;
}
const logElement = document.querySelector("#log");
function log(text) {
logElement.innerText = `${logElement.innerText}${text}\n`;
logElement.scrollTop = logElement.scrollHeight;
}
JavaScript
Code for generating a key pair using the X25519 algorithm and logging the information in each key is shown below.
Note that the code is run in a try..catch block because not all browsers support this algorithm.
The JavaScript first gets the #run-button and #log {{HTMLElement("input")}} elements, then adds a listener for the click event on the button.
The event handler clears the log, generates an X25519 key pair, and logs some of its properties.
const button = document.querySelector("#run-button");
const input = document.querySelector("#log");
button.addEventListener("click", () => {
// Clear log
logElement.innerText = "";
logElement.scrollTop = logElement.scrollHeight;
// Run test
test();
});
async function test() {
try {
// Create a key pair and use destructuring assignment to assign to variables
const { publicKey, privateKey } = await crypto.subtle.generateKey(
{
name: "X25519",
},
true,
["deriveKey", "deriveBits"],
);
// Log the properties of the keys
log(`publicKey: ${publicKey}`);
log(` type: ${publicKey.type}`);
log(` extractable: ${publicKey.extractable}`);
log(` algorithm: ${JSON.stringify(publicKey.algorithm)}`);
log(` usages: ${publicKey.usages}`);
log(`privateKey: ${privateKey}`);
log(` type: ${privateKey.type}`);
log(` extractable: ${privateKey.extractable}`);
log(` algorithm: ${JSON.stringify(privateKey.algorithm)}`);
log(` usages: ${privateKey.usages}`);
} catch (error) {
log(error);
}
}
Result
The information about the created keys is logged below (or an error string if the browser does not allow the key to be created).
{{EmbedLiveSample("X25519", "100%", "240px")}}
Specifications
{{Specifications}}
Browser compatibility
{{Compat}}