which undergo an independent verification and check of identity and authority,
performed by the issuing certificate authority. Apps involved with asymmetric keys must use approved Class 3 certificates or prepositioned keying material and hardware tokens that protect the user's private key. Networks and apps not using Class 3 certificates are vulnerable to a variety of malicious attacks that would essentially allow unauthorized access to and intrusion in a network. The use of approved Class 3 certificates assures authentication, message, data and content integrity, and confidentiality encryption.