Section 3 provides as follows:
(1) Any
subscriber may authenticate an electronic record by affixing his digital signature.
(2) The
authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and
transform the initial electronic record into another electronic record.
The
"hash function" means an algorithm mapping or translation of one sequence
of bits into another, generally smaller set known as "hash result"
such that an electronic record yields the same hash result every time the
algorithm is executed with the same electronic record as its input making it
computationally infeasible (a) to derive or reconstruct the original electronic
record from the hash result produced by the algorithm; (b) that two electronic
records can produce the same hash result using the algorithm.
(3) Any
person by the use of a public key of the subscriber can verify the electronic record.
No comments:
Post a Comment