3. The manner in which information be authenticated by means of Digital Signature.-
A Digital
Signature shall(a) be created and verified by cryptography that concerns itself with transforming electronic record into seemingly unintelligible forms and back again
(b) use what is known as “Public Key Cryptography”, which employs an algorithm using two different but mathematical related “keys” one for creating a Digital Signature or transforming data into a seemingly unintelligible form, and another key for verifying a Digital Signature or returning the electronic record to original form, the process termed as hash function shall be used in both creating and verifying a Digital
Signature.
Explanation: Computer equipment and software utilizing two such keys are often termed as
“asymmetric cryptography”.