Legal Document View

Unlock Advanced Research with PRISMAI

- Know your Kanoon - Doc Gen Hub - Counter Argument - Case Predict AI - Talk with IK Doc - ...
Upgrade to Premium
[Cites 0, Cited by 0] [Entire Act]

Union of India - Section

Section 3 in The Information Technology (Certifying Authorities) Rules, 2000

3. The manner in which information be authenticated by means of Digital Signature.

- A Digital Signature shall,-
(a)be created and verified by cryptography that concerns itself with transforming electronic record into seemingly unintelligible forms and back again;
(b)use what is known as "Public Key Cryptography", which employs an algorithm using two different but mathematical related "keys" one for creating a Digital Signature or transforming data into a seemingly unintelligible form, and another key for verifying a Digital Signature or returning the electronic record to original form, the process termed as hash function shall be used in both creating and verifying a Digital Signature.
Explanation. - Computer equipment and software utilizing two such keys are often termed as "asymmetric cryptography".