Nice write-up on how to setup ssh to use public/private keys for authentication. I am mixed on using keys since those could be compromised as well by finding out where they are held and getting them from that machine.
http://www.makeuseof.com/tag/how-to-authenticate-over-ssh-with-keys-instead-of-passwords/