1e41f4b71Sopenharmony_ci# Key Generation and Conversion Overview
2e41f4b71Sopenharmony_ci
3e41f4b71Sopenharmony_ci
4e41f4b71Sopenharmony_ciTypical key generation operations involve the following:
5e41f4b71Sopenharmony_ci
6e41f4b71Sopenharmony_ci
7e41f4b71Sopenharmony_ci- Randomly create a key object for subsequent encryption and decryption.
8e41f4b71Sopenharmony_ci
9e41f4b71Sopenharmony_ci- Convert external or internal binary data into a key object for subsequent encryption and decryption.
10e41f4b71Sopenharmony_ci
11e41f4b71Sopenharmony_ci- Create a key object based on the specified key parameter for subsequent encryption and decryption.
12e41f4b71Sopenharmony_ci
13e41f4b71Sopenharmony_ci- Obtain the binary data of a key object for storage or transmission.
14e41f4b71Sopenharmony_ci
15e41f4b71Sopenharmony_ci- Obtain the properties of an asymmetric key object for storage or transmission. 
16e41f4b71Sopenharmony_ci
17e41f4b71Sopenharmony_ci
18e41f4b71Sopenharmony_ciThe key object can be a symmetric key object (**SymKey**) or an asymmetric key pair object (**KeyPair**). The **KeyPair** object consists a public key (**PubKey**) and a private key (**PriKey**).
19e41f4b71Sopenharmony_ci
20