Section 3
Authencity Of Electronic Record
1) Any subscriber may, subject to the provisions of this section, authenticate to any electronic record by his/her
personal digital signature.
(2) While authenticating the electronic record pursuant to Sub- section (1), an act of transforming such electronic record to other electronic
record shall be effected by the use of asymmetric crypto system and hash function.
Explanation: For the purpose of this section, “hash function” means the acts of mapping of algorithm or translating of a sequence of bits into another,
generally smaller, set yielding the same hash result from any record in the same form while executing the algorithm each and every time by using the same
record as an input, infeasible to derive or reconstruct any record from the hash result produced by the algorithm from the computation point of view, and
making the two records, which produce the same hash result by using the  algorithm, computationally infeasible to derive.
(3) Any person may verify the electronic record by using the public key of the subscriber.