Symmetric Key Algorithms

You already learned about symmetric key ciphers and the major issue with symmetric keys. Read the section in this article on symmetric key encryptions to learn more about the advantages and disadvantages of symmetric keys. There is more information about symmetric key ciphers in this article that will be covered in more detail later in this unit, but this article will give you a preview of 3DES, IDEA, and AES ciphers. View the flashcard tool as well to better understand and to learn the terms used in cryptography such as plaintext, ciphertext, key, encryption, decryption, countermeasure, symmetric key encryption, and block cipher.

16. Registration Authority

In most Certificate Authority systems, there are different levels of certificates, and each level requires different forms of identification. Certificates with higher class levels generally require more information when requested including the information that was requested for the previous level.

The information requested by a Registration Authority is shown below.

Class Certification Information Requirements

Level of Certification Requirements/Forms of Identification Purpose
Class 1
  • Name
  • Email Address
  • Physical Address
  • Email
Class 2
  • Class 1 requirements
  • Driver License
  • Passport
  • Company information
  • Used when proof of identity required
Class 3
  • Class 2 requirements
  • Face to face meeting in RA office
  • Used for servers that assign software and independent identity verification
Class 4
  • Class 3 requirements
  • Requires company specific information that will be determined by the transaction
  • Online Business between companies
Class 5
  • Class 4 requirements
  • Requirements determined by requesting agency
  • Private organizations or governmental security