Question:

The authentication to be affected by the use of asymmetric crypto system and hash function is known as:

Show Hint

Think of it like this: Hash Function (creates a unique fingerprint) + Asymmetric Crypto System (locks the fingerprint with a private key) = Digital Signature.
Updated On: Oct 31, 2025
  • Public key
  • Private key
  • Digital Signature
  • Electronic Governance
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is C

Solution and Explanation

This is the technical definition of a "Digital Signature" as per the Information Technology Act, 2000. The process works as follows: \begin{enumerate} \item A **hash function** creates a unique, fixed-size digital fingerprint (hash) of the electronic record. \item An **asymmetric crypto system** uses a pair of keys: a private key (kept secret by the signer) and a public key (freely available). \item The signer uses their private key to encrypt the hash. This encrypted hash is the **Digital Signature**. \end{enumerate} Anyone can then use the signer's public key to decrypt the signature and verify that it matches the hash of the document, thus authenticating the sender and ensuring the document's integrity.
Was this answer helpful?
0
0

Top Questions on Cyber Law

View More Questions

Questions Asked in AIBE exam

View More Questions