Q.16
Cyber Law Medium Knowledge-Based
Bare Act Information Technology Act, 2000 · Section 3

The authentication to be affected by the use of asymmetric crypto system and hash function is known as:

A Public key
B Private key
Digital Signature Answer
D Electronic Governance
📋

Explanation & Strategy

Click any section to expand · only one open at a time

Digital signatures use asymmetric cryptography — a pair of keys (private key for signing, public key for verification). Section 3 of the IT Act provides for authentication by digital signature using this asymmetric crypto system.

At a Glance
Subject Cyber Law
Difficulty Medium
Act Information Technology Act, 2000
Section Section 3
Answer (C) Knowledge-Based
Paper AIBE XIV — September 2019
Progress in Paper
Q.16 100 questions

16% through paper