how is authentication of electronic records done ?

Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Uma asked over 3 years ago

    0       0 Answer Now Comment Report
3 Answers
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 veeru answered almost 3 years ago

‘Hash function’ means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known ‘as “hash result”. An electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible— (a) to derive or reconstruct the original electronic record from the hash result produced by the algorithm; (b) that two electronic records can produce the same hash result using the algorithm.

    0       0 Comment Report
Important Note – Preparing for CA Final?
CAKART provides Indias top faculty each subject video classes and lectures – online & in Pen Drive/ DVD – at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below – 
For any questions Request A Call Back  
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 narahari answered about 3 years ago

As per Section 3 of IT Act, 2000 as amended, any subscriber may authenticate an electronic record by affixing his digital signature. The authentication of the electronic record are effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record.

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 lochan answered over 3 years ago

**AUTHENTICATION OF ELECTRONICS RECORDS** As per Section 3 of IT Act, 2000 as amended, any subscriber may authenticate an electronic record by affixing his digital signature. The authentication of the electronic record are effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. ‘Hash function’ means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known ‘as “hash result”. An electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible— (a) to derive or reconstruct the original electronic record from the hash result produced by the algorithm; (b) that two electronic records can produce the same hash result using the algorithm. The private key and the public key are unique to the subscriber and constitute a functioning key pair. The electronic records can be verified by a person by the use of a public key of the subscriber. Thanks

    0       0 Comment Report
Similar Questions
Get Notifications
Videos
Books
Notes
Loading
SIGN UP
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.