The Information Technology Act 2000 provides the legal framework for electronic transactions by recognizing digital signatures and electronic records. The act defines digital signatures which authenticate electronic records by subscribers who apply for a digital signature certificate from a certifying authority. Hash functions are algorithms that map electronic records to hash results in a way that the original record cannot be derived from the result but two records produce the same result only if identical. Digital signatures provide data origin authentication, message integrity, non-repudiation and are presumed valid unless proven otherwise.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100%(1)100% found this document useful (1 vote)
26 views
I.t.act 2008
The Information Technology Act 2000 provides the legal framework for electronic transactions by recognizing digital signatures and electronic records. The act defines digital signatures which authenticate electronic records by subscribers who apply for a digital signature certificate from a certifying authority. Hash functions are algorithms that map electronic records to hash results in a way that the original record cannot be derived from the result but two records produce the same result only if identical. Digital signatures provide data origin authentication, message integrity, non-repudiation and are presumed valid unless proven otherwise.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 4
Information Technology Act 2000
The information technology act 2000
which received the assent of president of India on 09/06/2000 for legal recognition for transactions carried out by means of electronic data interchange. To give legal recognition to digital signature for authentication under any law Digital Signature It means authentication of any electronic record by subscriber or procedure [Sec. 2(P)] Any subscriber may authenticate an electronic record by affixing his digital signature Sec. 3(1). A person in whose name the Digital Signature Certificate is issued on application to certifying authority is a subscriber sec. 2(zf). Hash function Means an algorithm mapping or translations of one sequence of bits into another, set known as “hash result” (a) to derive the original electronic record from the hash result produced by the algorithm; (b) that two electronic records can produce the same hash result using the algorithm Sec 3(2) Characteristics of digital signature
Digital signature provides an assurance that a message has in fact
come from its purported sender. It is a proof of origin or data origin authentication. It enable a recipient to verify that a message has not been intentionally or accidentally altered. It is known as message integrity. No one but the purported sender could have sent the message. It is known as non repudiation. Once a digital signature is created it will be presumed that the signer signature. A digital signature is attached to its message and stored or transmitted with its message