Lawzonline.com 
 
Home|Discussion Forum|Communities|Professional Search|Law Dictionary|Bare Acts|Law Schools|State Bare Acts|Free Judgement Search|Law quotes
Articles  |    Humor    |    Law Digest
 
 
Bare acts search

 
  
Bare acts > Information Technology Act, 2000 > Section 3
 
  


 

3. Authentication of Electronic Records.- (1) Subject to the provisions of this section any subscriber may authenticate an electronic record by affixing his Digital Signature.


(2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record.


Explanation -For the purposes of this sub-section, "Hash function" means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "Hash Result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible

(a) to derive or reconstruct the original electronic record from the hash result produced by the algorithm;

(b) that two electronic records can produce the same hash result using the algorithm.

(3) Any person by the use of a public key of the subscriber can verify the electronic record.

(4) The private key and the public key are unique to the subscriber and constitute a functioning key pair.

 

 

 

 

 

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

 

 

Quick Links     
      
Family LawsInsurance LawsEnvironmental lawTax LawFDI 
Company LawTelecommunication LawLabour LawsCentral RulesRBI 
Business & Commercial LawsConsumer lawsCorporate lawsCriminal lawsSEBI 
Intellectual Property lawMedia & Press lawsPharma & Medical lawsProperty lawFEMA 
Debt Recovery LawsAmendmentsProfessional lawBanking LawsLegal Links 
      
      
 
 
 
 
 

 
   
 

 

 

Privacy PolicyDisclaimer

Copyright @2010