1# Key Generation and Conversion Overview
2
3
4Typical key generation operations involve the following:
5
6
7- Randomly create a key object for subsequent encryption and decryption.
8
9- Convert external or internal binary data into a key object for subsequent encryption and decryption.
10
11- Create a key object based on the specified key parameter for subsequent encryption and decryption.
12
13- Obtain the binary data of a key object for storage or transmission.
14
15- Obtain the properties of an asymmetric key object for storage or transmission.
16
17
18The key object can be a symmetric key object (**SymKey**) or an asymmetric key pair object (**KeyPair**). The **KeyPair** object consists a public key (**PubKey**) and a private key (**PriKey**).
19
20