As per Section 2(1)(f) of the Information Technology Act, 2000, ________ means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature.
A
Symmetric crypto system
No worries! We‘ve got your back. Try BYJU‘S free classes today!
B
Cryto system
No worries! We‘ve got your back. Try BYJU‘S free classes today!
C
Asymmetric crypto system
Right on! Give the BNAT exam to get a 100% scholarship for BYJUS courses
D
Asymmetric cyber system
No worries! We‘ve got your back. Try BYJU‘S free classes today!
Open in App
Solution
The correct option is C Asymmetric crypto system Section 2(1)(f) of the IT Act, 2000, defines asymmetric crypto system as a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric).