1e41f4b71Sopenharmony_ci# Key Generation and Conversion Overview 2e41f4b71Sopenharmony_ci 3e41f4b71Sopenharmony_ci 4e41f4b71Sopenharmony_ciTypical key generation operations involve the following: 5e41f4b71Sopenharmony_ci 6e41f4b71Sopenharmony_ci 7e41f4b71Sopenharmony_ci- Randomly create a key object for subsequent encryption and decryption. 8e41f4b71Sopenharmony_ci 9e41f4b71Sopenharmony_ci- Convert external or internal binary data into a key object for subsequent encryption and decryption. 10e41f4b71Sopenharmony_ci 11e41f4b71Sopenharmony_ci- Create a key object based on the specified key parameter for subsequent encryption and decryption. 12e41f4b71Sopenharmony_ci 13e41f4b71Sopenharmony_ci- Obtain the binary data of a key object for storage or transmission. 14e41f4b71Sopenharmony_ci 15e41f4b71Sopenharmony_ci- Obtain the properties of an asymmetric key object for storage or transmission. 16e41f4b71Sopenharmony_ci 17e41f4b71Sopenharmony_ci 18e41f4b71Sopenharmony_ciThe key object can be a symmetric key object (**SymKey**) or an asymmetric key pair object (**KeyPair**). The **KeyPair** object consists a public key (**PubKey**) and a private key (**PriKey**). 19e41f4b71Sopenharmony_ci 20