Question:

"Asymmetric Crypto System" under Information Technology Act means a system of a secure key pair consisting of a private key for creating a digital signature and

Show Hint

Remember the basic principle of digital signatures under the IT Act: \textbf{Private Key Signs, Public Key Verifies}. This simple rule will help you answer any question on the mechanics of asymmetric crypto systems.
Updated On: Oct 31, 2025
  • an individual key to verify the digital signature
  • a lock to verify the digital signature
  • a public key to verify the digital signature
  • a Government key to verify the digital signature
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is C

Solution and Explanation

Step 1: Understanding the Concept:
The question asks for the definition of an "asymmetric crypto system" as defined in the Information Technology Act, 2000. This is the technological foundation for digital signatures.
Step 2: Key Formula or Approach:
Section 2(1)(f) of the Information Technology Act, 2000 defines "asymmetric crypto system" as "a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature."
Step 3: Detailed Explanation:
An asymmetric crypto system, also known as public-key cryptography, uses two related keys:
1. Private Key: This key is kept secret by the owner. It is used to create the digital signature (i.e., to sign a document electronically).
2. Public Key: This key is made publicly available. It is used to verify a digital signature created by the corresponding private key.
The system is "asymmetric" because the key used for signing (private) is different from the key used for verification (public). The definition in the Act perfectly reflects this mechanism. Option (C) is a direct and accurate completion of the statutory definition.
Step 4: Final Answer:
The system consists of a private key for creating a digital signature and a public key to verify the digital signature.
Was this answer helpful?
0
0

Top Questions on Cyber Law

View More Questions