Bare Act Search Results
Home Bare Acts Phrase: hashSign-up to get more results
Unlock complete result pages and premium legal research features.
Start Free TrialInformation Technology Act, 2000 Complete Act
State: Central
Year: 2000
.....record is retained intact or has been altered since such electronic record was so affixed with the digital signature. (2) Any reference in this Act to any enactment or any provision thereof shall, in relation to an area in which such enactment or such provision is not in force, be construed as a reference to the corresponding law or the relevant provision of the corresponding law, if any, in force in that area. SECTION 03: AUTHENTICATION OF ELECTRONIC RECORDS (1) Subject to the provisions of this section any subscriber may authenticate an electronic record by affixing his digital signature. (2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. Explanation."For the purposes of this sub-section, "hash function" means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "hash result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible" (a).....
List Judgments citing this sectionInformation Technology Act, 2000 Chapter II
Title: Digital Signature and Electronic Signature
State: Central
Year: 2000
.....key pair. Section 3A - Electronic signature 1["3A. Electronic signature.-- (1) Notwithstanding anything contained in section 3, but subject to the provisions of sub-section (2), a subscriber may authenticate any electronic record by such electronic signature or electronic authentication technique which-- (a) is considered reliable; and (b) may be specified in the Second Schedule. (2) For the purposes of this section any electronic signature or electronic authentication technique shall be considered reliable if-- (a) the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory' or, as (the case may be, the authenticator and to no other person; (b) the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person; (c) any alteration to the electronic signature made after affixing such signature is detectable; (d) any alteration to the information made after its authentication by electronic signature is detectable; and (e) it fulfils such other.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 3
Title: Authentication of Electronic Records
State: Central
Year: 2000
(1) Subject to the provisions of this section, any subscriber may authenticate an electronic record by affixing his digital signature. (2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. Explanation.--For the purposes of this sub-section, "hash function" means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "hash result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible-- (a) to derive or reconstruct the original electronic record from the hash result produced by the algorithm; (b) that two electronic records can produce the same hash result using the algorithm. (3) Any person by the use of a public key of the subscriber can verify the electronic record. (4) The private key and the public key are unique to the subscriber and constitute a functioning key pair.
View Complete Act List Judgments citing this section- << Prev.
- Next >>
Sign-up to get more results
Unlock complete result pages and premium legal research features.
Start Free Trial