Important provisions of the IT Act, 2000

Digital Signature under the IT Act, 2000

Digital signature means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3.

Section 3 deals with the conditions subject to which an electronic record may be authenticated by means of affixing digital signature which is created in two definite steps.

First, the electronic record is converted into a message digest by using a mathematical function known as 'Hash function' which digitally freezes the electronic record thus ensuring the integrity of the content of the intended communication contained in the electronic record. Any tampering with the contents of the electronic record will immediately invalidate the digital signature.

Secondly, the identity of the person affixing the digital signature is authenticated through the use of a private key which attaches itself to the message digest and which can be verified by anybody who has the public key corresponding to such private key. This will enable anybody to verify whether the electronic record is retained intact or has been tampered with since it was so fixed with the digital signature. It will also enable a person who has a public key to identify the originator of the message.

 

'Hash function' means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "Hash Result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible to derive or reconstruct the original electronic record from the hash result produced by the algorithm; that two electronic records can produce the same hash result using the algorithm.

Digital signatures
are a means to ensure validity of electronic transactions however who guarantees about the authenticity that such signatures are indeed valid or not false. In order that the keys be secure the parties must have a high degree of confidence in the public and private keys issued. Digital Signature is not like our handwritten signature. It is a jumble of letters and digits. It looks something like this.


----- BEGIN SIGNATURE----
Uz5xHz7DxFwvBAh24zPAQCmOYhT47gvuvzO0YbDA5txg5bN1Ni3hgPgnRz8Fw
xGU
oDnj7awl7BwSBeW4MSG7/3NS7oZyD/AWO1Uy2ydYD4UQt/w3d6D2Ilv3L8EO
iHiH +r5K8Gpe5zK5CLV+zBKwGY47n6Bpi9JCYXz5YwXj4JxTT+y8=gy5N
----- END SIGNATURE ------


More Topics

1. Need for Cyber law

2. Cyber crime on the rise

3. Important terms related to cyber law

4. Cyber law in India

5. Need for cyber law in India

6. History of cyber law in India

7. Information Technology Act, 2000

8. Salient features of the Information Technology (Amendment) Act, 2008

9. Rules notified under the Information Technology Act, 2000

10. Overview of other laws amended by the IT Act, 2000 - India Panel Code 1860

11. Indian Evidence Act, 1872

12. National Policy on Information Technology 2012

13. Applicability and Scheme of the INFORMATION TECHNOLOGY ACT, 2000

14. Digital signature and Electronic signature

15. Digital Signature under the IT Act, 2000

16. Electronic Signature

17. E-Governance

18. Attribution, Acknowledgement and Dispatch of Electronic Records

19. Certifying Authorities

20. Root Certifying Authority of India (RCAI)





Subscribe Indian Cyber Security RSS feed


Enter your email address:



 


Facebook RSS

 

© Copyright-2010. All Rights Reserved.

This website is Accessible! We are proud to say, this website has ZERO detected "accessibility errors",
as per an accessibility evaluation conducted using WAVE, a highly reputable accessibility evaluation tool.

If you have any issue about publishing content of this site, then mail us to info@indiancybersecurity.com

Best View in CSS 3 Supportable Browsers and 1366x768 Resolution system.

Facebook