• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Key Generation and Conversion Overview
2
3<!--Kit: Crypto Architecture Kit-->
4<!--Subsystem: Security-->
5<!--Owner: @zxz--3-->
6<!--Designer: @lanming-->
7<!--Tester: @PAFT-->
8<!--Adviser: @zengyawen-->
9
10Typical key generation operations involve the following:
11
121. Randomly create a key object for subsequent encryption and decryption.
13
142. Convert external or internal binary data into a key object for subsequent encryption and decryption.
15
163. Create a key object based on the specified key parameter for subsequent encryption and decryption.
17
184. Obtain the binary data of a key object for storage or transmission.
19
205. Obtain the properties of an asymmetric key object for storage or transmission.
21
22The key object can be a symmetric key object (**SymKey**) or an asymmetric key pair object (**KeyPair**). The **KeyPair** object consists a public key (**PubKey**) and a private key (**PriKey**).
23