1# Key Generation and Conversion Overview 2 3 4Typical key generation operations involve the following: 5 6 7- Randomly create a key object for subsequent encryption and decryption. 8 9- Convert external or internal binary data into a key object for subsequent encryption and decryption. 10 11- Create a key object based on the specified key parameter for subsequent encryption and decryption. 12 13- Obtain the binary data of a key object for storage or transmission. 14 15- Obtain the properties of an asymmetric key object for storage or transmission. 16 17 18The key object can be a symmetric key object (**SymKey**) or an asymmetric key pair object (**KeyPair**). The **KeyPair** object consists a public key (**PubKey**) and a private key (**PriKey**). 19 20