Legal Document View

Unlock Advanced Research with PRISMAI

- Know your Kanoon - Doc Gen Hub - Counter Argument - Case Predict AI - Talk with IK Doc - ...
Upgrade to Premium
[Cites 0, Cited by 0] [Section 3] [Entire Act]

Union of India - Subsection

Section 3(b) in The Information Technology (Certifying Authorities) Rules, 2000

(b)use what is known as "Public Key Cryptography", which employs an algorithm using two different but mathematical related "keys" one for creating a Digital Signature or transforming data into a seemingly unintelligible form, and another key for verifying a Digital Signature or returning the electronic record to original form, the process termed as hash function shall be used in both creating and verifying a Digital Signature.