Law 19983 on

Classified in Computers

Written at on English with a size of 3.43 KB.

CASE 1: Cyber Law: (Unit V):-
In an E-trade agreement, signature is based exclusively on asymmetric methods or

Solution:
Overview of the case:
„h In an E-trade agreement, signature is based exclusively on asymmetric
methods or techniques. It has been described as a special door, which can be
opened with a four key lock.
„h The only thing is sure that the door can only be opened when the four keys
are in it.
Introduction of Cyber Laws:
„h Cyber Law is the law governing cyber space. Cyber space is a very wide
term and includes computers, networks, software, data storage devices (such
as hard disks, USB disks etc), the Internet, websites, emails and even
electronic devices such as cell phones, ATM machines etc.
„h Law encompasses the rules of conduct that have been approved by the
government, which are in force over a certain territory, and which must be
obeyed by all persons on that territory.
„h Violation of these rules could lead to government action such as
imprisonment or fine or an order to pay compensation.
Problems Identified in the case:-
„h Both the parties stand respectively on each side of the door and both of them
have different keys.
„h One of them is coincidental with the key possessed by the other party, since
they have agreed on the shape and notches in the key (public key).
„h However, the other party is not, and none of the parties knows exactly, what
kind of notches the other key will have.
„h The only thing is sure that the door can only be opened when the four keys
are in it.
Solution to the Problems in the Case:
„h Asymmetric Crypto System means a system of a secure key pair
consisting of a private key for creating a digital signature and a public key to
verify the digital signature.
„h Certifying Authority means a person who has been granted a license to
issue an Electronic Signature Certificate under section 24 of Information
Act, 2000.
„h This case tells us about Public keys that are required to open the doors.
„h Cyber Security means protecting the information, equipments, devices and
information stored for modification.
„h This case is related to Cyber Laws as it requires electronic mediums to solve
the case.
„h Electronic Signature is considered reliable and is specified in the second
schedule.
„h The signature creation data or authentication data at the time of signing.
„h The Central Government provides authentication technique that may be
specified.
„h Certifying Authority means a person who has been granted a license to issue
an Electronic Signature Certificate under section 24 of Information Act,
2000.
„h Due to the use of Electronic Signature, digital signature can be used for
Public Keys so that the both the parties can open the door only when the four
keys are in it.

Entradas relacionadas: