Examveda
Examveda

The authentication to be affected by the use of asymmetric crypto system and hash function is known as:

A. Public key

B. Private key

C. Digital Signature

D. Electronic Governance

Answer: Option C


This Question Belongs to Law >> Information Technology Act

Join The Discussion

Related Questions on Information Technology Act