AdvocateKhoj
Login : Advocate | Client
Home Post Your Case My Account Law College Law Library
    

Information Technology (Certifying Authorities) Rules, 2000

3. The manner in which information be authenticated by means of Digital Signature.- A Digital Signature shall,-

(a) be created and verified by cryptography that concerns itself with transforming electronic record into seemingly unintelligible forms and back again;

(b) use what is known as "Public Key Cryptography", which employs an algorithm using two different but mathematical related "keys" one for creating a Digital Signature or transforming data into a seemingly unintelligible form, and another key for verifying a Digital Signature or returning the electronic record to original form, the process termed as hash function shall be used in both creating and verifying a Digital Signature.

Explanation : Computer equipment and software utilizing two such keys are often termed as "asymmetric cryptography".





Information Technology (Certifying Authorities) Rules, 2000 Back






Client Area | Advocate Area | Blogs | About Us | User Agreement | Privacy Policy | Advertise | Media Coverage | Contact Us | Site Map
powered by nubia  |  driven by neosys