Chapter I : Preliminary
Chapter II : Digital Signature
Chapter III : Electronic Governance
Chapter IV : Attribution, Acknowledgment And Despatch Of Electronic Records
Chapter V : Secure Electronic Records And Secure Digital Signatures
ChapterVI : Regulation Certifying Authorities
Chapter VII : Digital Signature Certificates
Chapter VIII : Duties
Of Subscribers
Chapter IX : Penalties And Adjudication
ChapterX : The Cyber Regulations Appellate Tribunal
Chapter XI : Offences
Chapter XII : Network Service Providers Not Be Liable In Certain Cases.
Chapter XIII : Miscellaneous
The First Schedule : Amendment To The Indian Penal Code (See Section 91)(45 Of
1860]
The Second Schedule: Amendments To The Indian Evidence Act, 1872 (See Section
92) [1 Of 1872]
The Third Schedule : Amendments To The Bankers' Books Evidence Act, 1891 (See
Section 93) [18 Of 1891]
The Fourth Schedule : Amendment To The Reserve Bank Of India Act, 1934 (See
Section 94) [2 Of 1934]
CHAPTER II : DIGITAL
SIGNATURE
1. Authentication of electronic records
(1) Subject to the provisions of this section any subscriber may authenticate
an
electronic record by affixing his digital signature.
(2) The authentication of the electronic record shall be effected by the
use of
asymmetric crypto system and hash function which envelop and transform
the initial
electronic record into another electronic record.
Explanation- For the purposes of this sub-section, "hash function"
means an
algorithm mapping or translation of one sequence of bits into another,
generally
smaller, set known as "hash result" such that an electronic
record yields the same
hash result every time the algorithm is executed with the same electronic
record as
its input making it computationally infeasible-
(a) to derive or reconstruct the original electronic record from the hash
result
produced by the algorithm;
(b) that two electronic records can produce the same hash result using
the algorithm.
(3) Any person by the use of a public key of the subscriber can verify
the electronic record.
(4) The private key and the public key are unique to the subscriber and
constitute a functioning key pair.

Top
|