3. The manner in which information be authenticated by means of Digital Signature.-

A Digital

Signature shall

(a) be created and verified by cryptography that concerns itself with transforming electronic record into seemingly unintelligible forms and back again

(b) use what is known as “Public Key Cryptography”, which employs an algorithm using two different but mathematical related “keys” – one for creating a Digital Signature or transforming data into a seemingly unintelligible form, and another key for verifying a Digital Signature or returning the electronic record to original form, the process termed as hash function shall be used in both creating and verifying a Digital

Explanation: Computer equipment and software utilizing two such keys are often termed as

“asymmetric cryptography”.

Main Index

Rules and Regulations of India


Leave a Comment

Your email address will not be published. Required fields are marked *