Setup SSH Keys Public/Private, Disable Password Based Login | CentOS 8 Server Setup Part #6
SSH public-key authentication relies on asymmetric cryptographic algorithms that generate a pair of separate keys (a key pair), one public and another private.
centos 8