Joint Cipher Bureau
Encyclopedia
The Joint Cipher Bureau is an agency of the Indian armed forces
Indian Armed Forces
The Indian Armed Forces are the military forces of the Republic of India. They consist of the Army, Navy and Air Force, supported by three paramilitary forces and various inter-service institutions such as the Strategic Forces Command.The President of India is...

 responsible for signals intelligence and cryptanalysis
Cryptanalysis
Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key...

 and co-ordinating similar activities and operations of military intelligence agencies.

Most current equipment providing tactical intelligence is of Russian origin, including specialised direction finding and monitoring equipment.

The Joint Cipher Bureau works closely with the IB and R&AW. It is responsible for cryptanalysis and encryption of sensitive data. The inter-services Joint Cipher Bureau has primary responsibility for cryptology and SIGINT, providing coordination and direction to the other military service organizations with similar mission. Most current equipment providing tactical intelligence is of Russian origin, including specialized direction finding and monitoring equipment.

The Joint Cipher Bureau is also responsible for issues relating to public and private key management. Cryptographic products are export-controlled licensed items, and licenses to India are not generally available for products of key length of more than 56 bits. The domestic Indian computer industry primarily produces PCs, and PC-compatible cryptographic products have been developed and are being used commercially. More robust cryptologic systems are not commercially produced in India, and progress in this field has been slow due to the general unavailability of technology and know-how. Customised cryptographic products have been designed and produced by organizations in the defense sector are engaged in the implementation of cryptographic techniques, protocols and the products.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK