[{"name":"S3-180536","title":"pCR to TR 33.841 - Assessment of quantum computing impact timelines","source":"China Mobile Com. Corporation","contact":"Fuwen Liu","contact-id":73191,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":5880,"status":"merged","reservation_date":"2018-02-14 09:20:27","uploaded":"2018-02-14 09:41:27","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180536.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180588","title":"Threats and potential countermeasures posed due to quantum computing","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"Approval","abstract":"Development to section 4 on threats and potential countermeasures due to quantum computing including threats to asymmetric, symmetric and hash algorithms.","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":5360,"status":"revised","reservation_date":"2018-02-18 12:57:26","uploaded":"2018-02-19 09:40:59","revisionof":"","revisedto":"S3-180937","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180588.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180589","title":"Assessment of quantum computing impact timelines","source":"NCSC","contact":"Florence Driscoll","contact-id":70271,"tdoctype":"pCR","for":"","abstract":"Content for Section 5 on assessment of quantum computing impact timelines, including timescales for a quantum computer and the current state of standardisation of quantum resistant algorithms.","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":5890,"status":"revised","reservation_date":"2018-02-18 13:04:21","uploaded":"2018-02-19 09:40:59","revisionof":"","revisedto":"S3-180938","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180589.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180603","title":"The impaction of 256 bit keys for NG areas and requirement of a longer MAC","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":6030,"status":"noted","reservation_date":"2018-02-18 17:12:32","uploaded":"2018-02-18 17:38:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180603.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180604","title":"The impaction of 256 bit keys for NG areas","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":6040,"status":"noted","reservation_date":"2018-02-18 17:16:56","uploaded":"2018-02-18 17:38:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180604.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180605","title":"The clarification of the entropy CK and IK","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":6060,"status":"revised","reservation_date":"2018-02-18 17:18:39","uploaded":"2018-02-18 17:38:51","revisionof":"","revisedto":"S3-180939","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180605.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180606","title":"The clarification of the entropy CK and IK","source":"CATT","contact":"Wei Zhou","contact-id":61782,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":7170,"status":"noted","reservation_date":"2018-02-18 17:20:15","uploaded":"2018-02-18 17:38:51","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180606.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180717","title":"Update to Clause 7 \u2013 IV entropy","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":6050,"status":"approved","reservation_date":"2018-02-19 12:37:09","uploaded":"2018-02-19 14:49:29","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180717.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180718","title":"Update to Clause 10 \u2013 RES and Editorials","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":7180,"status":"approved","reservation_date":"2018-02-19 12:37:09","uploaded":"2018-02-19 14:49:29","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180718.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180936","title":"Draft TR 33.841","source":"Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":93600,"status":"approved","reservation_date":"2018-03-02 12:39:31","uploaded":"2018-03-02 12:39:31","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.2.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180936.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180937","title":"Threats and potential countermeasures posed due to quantum computing","source":"NCSC","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":5361,"status":"approved","reservation_date":"2018-03-02 09:57:59","uploaded":"2018-03-02 09:57:59","revisionof":"S3-180588","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180937.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180938","title":"Assessment of quantum computing impact timelines","source":"NCSC,China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":5891,"status":"approved","reservation_date":"2018-03-02 09:57:59","uploaded":"2018-03-02 09:57:59","revisionof":"S3-180589","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180938.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-180939","title":"The clarification of the entropy CK and IK","source":"CATT","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":87,"ainumber":"5.3","ainame":"Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)","tdoc_agenda_sort_order":6061,"status":"approved","reservation_date":"2018-02-28 08:49:19","uploaded":"2018-02-28 08:49:19","revisionof":"S3-180605","revisedto":"","release":"Rel-15","crspec":33.841,"crspecversion":"0.1.0","workitem":[{"winame":"FS_256_Algo"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_90Bis_SanDiego\/Docs\/S3-180939.zip","group":"S3","meeting":"S3-90","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]