What’s worse than leaving private keys lying unattended? Having public keys that can be brute-forced. The “secure” in secure shell comes from the combination of hashing, symmetric encryption, and asymmetric encryption.
https://gravitational.com/blog/comparing-ssh-keys/
origin - https://www.pipiscrew.com/2020/08/comparing-ssh-encryption-algorithms-rsa-dsa-ecdsa-or-eddsa/ comparing-ssh-encryption-algorithms-rsa-dsa-ecdsa-or-eddsa