1# Key Generation and Conversion Overview 2 3<!--Kit: Crypto Architecture Kit--> 4<!--Subsystem: Security--> 5<!--Owner: @zxz--3--> 6<!--Designer: @lanming--> 7<!--Tester: @PAFT--> 8<!--Adviser: @zengyawen--> 9 10Typical key generation operations involve the following: 11 121. Randomly create a key object for subsequent encryption and decryption. 13 142. Convert external or internal binary data into a key object for subsequent encryption and decryption. 15 163. Create a key object based on the specified key parameter for subsequent encryption and decryption. 17 184. Obtain the binary data of a key object for storage or transmission. 19 205. Obtain the properties of an asymmetric key object for storage or transmission. 21 22The key object can be a symmetric key object (**SymKey**) or an asymmetric key pair object (**KeyPair**). The **KeyPair** object consists a public key (**PubKey**) and a private key (**PriKey**). 23