The authentication to be affected by the use of asymmetric crypto system and hash function is known as:
Explanation & Strategy
Click any section to expand · only one open at a time
Digital signatures use asymmetric cryptography — a pair of keys (private key for signing, public key for verification). Section 3 of the IT Act provides for authentication by digital signature using this asymmetric crypto system.