wiz-icon
MyQuestionIcon
MyQuestionIcon
1
You visited us 1 times! Enjoying our articles? Unlock Full Access!
Question

As per Section 2(1)(f) of the Information Technology Act, 2000, ________ means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature.

A
Symmetric crypto system
No worries! We‘ve got your back. Try BYJU‘S free classes today!
B
Cryto system
No worries! We‘ve got your back. Try BYJU‘S free classes today!
C
Asymmetric crypto system
Right on! Give the BNAT exam to get a 100% scholarship for BYJUS courses
D
Asymmetric cyber system
No worries! We‘ve got your back. Try BYJU‘S free classes today!
Open in App
Solution

The correct option is C Asymmetric crypto system
Section 2(1)(f) of the IT Act, 2000, defines asymmetric crypto system as a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric).

flag
Suggest Corrections
thumbs-up
0
Join BYJU'S Learning Program
similar_icon
Related Videos
thumbnail
lock
The Monetary System
ECONOMICS
Watch in App
Join BYJU'S Learning Program
CrossIcon