harmony 鸿蒙Key Generation and Conversion Overview

  • 2025-06-12
  • 浏览 (7)

Key Generation and Conversion Overview

Typical key generation operations involve the following:

  • Randomly create a key object for subsequent encryption and decryption.

  • Convert external or internal binary data into a key object for subsequent encryption and decryption.

  • Create a key object based on the specified key parameter for subsequent encryption and decryption.

  • Obtain the binary data of a key object for storage or transmission.

  • Obtain the properties of an asymmetric key object for storage or transmission.

The key object can be a symmetric key object (SymKey) or an asymmetric key pair object (KeyPair). The KeyPair object consists a public key (PubKey) and a private key (PriKey).

你可能感兴趣的鸿蒙文章

harmony 鸿蒙Crypto Architecture Kit

harmony 鸿蒙Encryption and Decryption with a 3DES Symmetric Key (ECB Mode) (C/C++)

harmony 鸿蒙Encryption and Decryption with a 3DES Symmetric Key (ECB Mode) (ArkTS)

harmony 鸿蒙Encryption and Decryption with an AES Symmetric Key (CBC Mode) (C/C++)

harmony 鸿蒙Encryption and Decryption with an AES Symmetric Key (CBC Mode) (ArkTS)

harmony 鸿蒙Encryption and Decryption with an AES Symmetric Key (CCM Mode) (C/C++)

harmony 鸿蒙Encryption and Decryption with an AES Symmetric Key (CCM Mode) (ArkTS)

harmony 鸿蒙Encryption and Decryption with an AES Symmetric Key (ECB Mode) (C/C++)

harmony 鸿蒙Encryption and Decryption with an AES Symmetric Key (ECB Mode) (ArkTS)

harmony 鸿蒙Encryption and Decryption by Segment with an AES Symmetric Key (GCM Mode) (C/C++)

0  赞