[{"name":"S3-240298","title":"Key issue on 256-bit algorithm adaptation in NAS procedures","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":180,"status":"merged","reservation_date":"2024-02-13 06:58:27","uploaded":"2024-02-19 07:29:59","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240298.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240299","title":"Key issue on 256-bit algorithm adaptation in AS procedures","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":190,"status":"noted","reservation_date":"2024-02-13 07:00:03","uploaded":"2024-02-19 07:29:59","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240299.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240300","title":"Key issue on Dynamic change of AKA parameters in Authentication procedures","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":100,"status":"not treated","reservation_date":"2024-02-13 10:09:35","uploaded":"2024-02-19 07:29:59","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240300.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240319","title":"Introduction for TR 33.700-41","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2024-02-16 07:27:52","uploaded":"2024-02-16 08:36:39","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240319.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240320","title":"Scope definition for TR 33.700-41","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2024-02-16 07:31:30","uploaded":"2024-02-16 08:38:11","revisionof":"","revisedto":"S3-241008","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240320.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240321","title":"Assumptions for TR 33.700-41","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2024-02-16 07:33:42","uploaded":"2024-02-16 08:39:48","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240321.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240322","title":"New Key Issue on insufficient long-term key length for 256-bit security","source":"KDDI Corporation, THALES","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":70,"status":"merged","reservation_date":"2024-02-16 07:35:08","uploaded":"2024-02-19 02:51:51","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240322.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240323","title":"New Key Issue on different cryptographic key lengths in dual connectivity","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2024-02-16 07:37:06","uploaded":"2024-02-19 02:56:26","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240323.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240324","title":"New Key Issue on bid-down attacks during negotiation of cryptographic algorithms and key lengths","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":210,"status":"noted","reservation_date":"2024-02-16 07:38:36","uploaded":"2024-02-19 03:03:56","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240324.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240325","title":"New Key Issue on different cryptographic key lengths across AMF change and AMF reallocation","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2024-02-16 07:39:50","uploaded":"2024-02-19 03:13:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240325.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240326","title":"New Key Issue on different cryptographic key lengths across handovers","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2024-02-16 07:40:52","uploaded":"2024-02-19 03:14:39","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240326.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240327","title":"New Key Issue on different cryptographic key lengths on AS and NAS layer","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2024-02-16 07:42:04","uploaded":"2024-02-19 03:16:45","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240327.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240330","title":"Draft Skeleton for TR 33.700-41","source":"KDDI Corporation","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":5,"status":"approved","reservation_date":"2024-02-16 09:19:44","uploaded":"2024-02-16 09:42:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240330.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240470","title":"New Key Issue on different length of cryptographic key in EPS and 5GS interworking","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":230,"status":"not treated","reservation_date":"2024-02-19 03:26:18","uploaded":"2024-02-19 08:36:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240470.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240492","title":"Key issues on Introduction of 256-bit algorithms in 5G system","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2024-02-19 07:17:30","uploaded":"2024-02-19 13:01:25","revisionof":"","revisedto":"S3-240989","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240492.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240493","title":"Solution on transitions to 256 bit algorithms","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":240,"status":"not treated","reservation_date":"2024-02-19 07:17:30","uploaded":"2024-02-19 13:01:25","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240493.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240543","title":"Assumption proposal for the 256-bit algorithm introduction study","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2024-02-19 07:17:45","uploaded":"2024-02-19 13:08:19","revisionof":"","revisedto":"S3-241009","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240543.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240571","title":"New KI for CAT_256 on correctly indication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":220,"status":"merged","reservation_date":"2024-02-19 08:16:16","uploaded":"2024-02-19 08:44:50","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240571.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240572","title":"New solution for CAT_256 on correctly indication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":250,"status":"not treated","reservation_date":"2024-02-19 08:16:16","uploaded":"2024-02-19 08:44:50","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240572.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240573","title":"New KI for CAT_256 on Flexibility to adjust the preference on security algorithms","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":170,"status":"noted","reservation_date":"2024-02-19 08:16:16","uploaded":"2024-02-19 08:44:50","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240573.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240574","title":"New solution for CAT_256 on Flexibility to adjust the preference on security algorithms","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":260,"status":"not treated","reservation_date":"2024-02-19 08:16:17","uploaded":"2024-02-19 08:44:50","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240574.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240628","title":"Discussion about 256-bit security","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2024-02-19 09:25:02","uploaded":"2024-02-19 10:23:56","revisionof":"","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240628.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240629","title":"Adding Security Assumpations to TR 33.700-41","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2024-02-19 09:25:02","uploaded":"2024-02-19 10:23:56","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240629.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240698","title":"Key Issue on insufficient entropy due to permanent secret key length (K)","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":80,"status":"revised","reservation_date":"2024-02-19 10:52:20","uploaded":"2024-02-19 12:48:29","revisionof":"","revisedto":"S3-241022","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240698.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240769","title":"New KI on Key Derivation","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":110,"status":"merged","reservation_date":"2024-02-19 12:06:18","uploaded":"2024-02-19 12:10:22","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240769.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240784","title":"New KI on 256-bit CK IK in AKA procedure","source":"Xiaomi Communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":120,"status":"not treated","reservation_date":"2024-02-19 12:51:20","uploaded":"2024-02-19 14:04:44","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240784.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240785","title":"New KI on 256-bit security algorithm negotiation","source":"Xiaomi Communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":90,"status":"merged","reservation_date":"2024-02-19 12:51:20","uploaded":"2024-02-19 14:04:44","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240785.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240989","title":"Key issues on Introduction of 256-bit algorithms in 5G system","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":201,"status":"noted","reservation_date":"2024-05-03 15:46:39","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240492","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240989.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241008","title":"Scope definition for TR 33.700-41","source":"KDDI Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":21,"status":"approved","reservation_date":"2024-05-03 15:46:48","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240320","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241008.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241009","title":"Assumption proposal for the 256-bit algorithm introduction study","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":41,"status":"approved","reservation_date":"2024-05-03 15:46:48","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240543","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241009.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241010","title":"Draft TR 33.700-41","source":"KDDI","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2024-05-03 15:46:48","uploaded":"2024-03-12 10:21:11","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241010.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241022","title":"Key Issue on insufficient entropy due to permanent secret key length (K)","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"5.5","ainame":"New Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":81,"status":"noted","reservation_date":"2024-05-03 15:46:56","uploaded":"2024-03-05 15:51:18","revisionof":"S3-240698","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.0.1","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241022.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241116","title":"New Key Issue on permanent secret key length (K)","source":"KDDI Corporation, Samsung, Xiaomi","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":40,"status":"noted","reservation_date":"2024-05-04 08:50:27","uploaded":"2024-04-08 10:03:54","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241116.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241117","title":"New Key Issue on different cryptographic key lengths in dual connectivity scenarios","source":"KDDI Corporation, CMCC","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2024-05-04 08:52:51","uploaded":"2024-04-08 10:04:57","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241117.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241118","title":"New Key Issue on algorithm negotiation on re-establishing RRC connection","source":"KDDI Corporation, CMCC","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2024-05-04 08:54:28","uploaded":"2024-04-08 10:04:57","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241118.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241170","title":"New Key Issue on authentication parameters in AKA procedure","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2024-08-04 02:29:22","uploaded":"2024-04-08 07:10:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241170.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241171","title":"New Key Issue on different length of cryptographic key in EPS and 5GS interworking","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":190,"status":"noted","reservation_date":"2024-08-04 02:29:22","uploaded":"2024-04-08 07:10:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241171.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241172","title":"New Solution on different length of cryptographic key in EPS and 5GS interworking","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":230,"status":"noted","reservation_date":"2024-08-04 02:29:22","uploaded":"2024-04-08 07:10:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241172.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241181","title":"New key issue on algorithm negotiation for 256-bit algorithms","source":"vivo","contact":"Li Hu","contact-id":104884,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":100,"status":"noted","reservation_date":"2024-08-04 02:53:02","uploaded":"2024-04-08 03:00:24","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241181.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241190","title":"new kew issue on backward compatibility","source":"CableLabs, Charter Communications","contact":"Tao Wan","contact-id":79074,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2024-08-04 03:13:32","uploaded":"2024-04-08 03:18:18","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241190.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241275","title":"Adaptations to AS and NAS Procedures","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":110,"status":"noted","reservation_date":"2024-08-04 08:46:42","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241275.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241276","title":"Architecture Assumptions","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":20,"status":"noted","reservation_date":"2024-08-04 08:49:39","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241276.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241286","title":"UE States and Transitions","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2024-08-04 08:51:49","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241286.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241288","title":"Introduction of AEAD Algorithm for Air-link Data Protection","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":200,"status":"noted","reservation_date":"2024-08-04 08:54:17","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241288.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241289","title":"Introduction of AEAD Algorithm and the Order of Data Protection","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":210,"status":"noted","reservation_date":"2024-08-04 08:56:16","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241289.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241291","title":"Discussion on AEAD Properties","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":220,"status":"noted","reservation_date":"2024-08-04 08:59:04","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241291.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241310","title":"key issues on introducing 256-bit algorithm in 5GS","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":120,"status":"noted","reservation_date":"2024-08-04 09:25:04","uploaded":"2024-04-08 13:00:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241310.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241316","title":"New Key Issue on different cryptographic key lengths in URLLC scenario","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2024-08-04 09:25:05","uploaded":"2024-04-08 13:00:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241316.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241359","title":"Add KI on 256 bits algorithms selection in 5G system","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2024-08-04 09:44:40","uploaded":"2024-04-08 10:35:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241359.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241362","title":"Add sol on 256 bits algorithm selection in 5G system","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":240,"status":"noted","reservation_date":"2024-08-04 09:46:54","uploaded":"2024-04-08 10:35:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241362.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241377","title":"Conclusion on 256 bits algorithms selection in 5G system KI","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":290,"status":"noted","reservation_date":"2024-08-04 09:50:02","uploaded":"2024-04-08 10:35:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241377.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241390","title":"New key issue on specifying usage of new encryption and integrity protection algorithms in the 5G system","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2024-08-04 10:23:44","uploaded":"2024-04-08 10:51:02","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241390.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241391","title":"New solution for specifying usage of new encryption and integrity protection algorithms in the 5G system","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":250,"status":"noted","reservation_date":"2024-08-04 10:23:44","uploaded":"2024-04-08 10:51:02","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241391.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241394","title":"CAT256 - New KI for CAT_256 on correctly indication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":170,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241394.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241395","title":"CAT256 - New solution for CAT_256 on correctly indication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":260,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241395.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241396","title":"CAT256 - New KI for CAT_256 on Flexibility to adjust the preference on security algorithms","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":180,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241396.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241397","title":"CAT256 - New solution for CAT_256 on Flexibility to adjust the preference on security algorithms","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":270,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241397.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241466","title":"New KI on AKA related 256-bit algorithm update","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":60,"status":"noted","reservation_date":"2024-08-04 12:36:11","uploaded":"2024-04-08 13:56:10","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241466.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241467","title":"New KI on negotiation for NAS and AS related 256-bit algorithms","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2024-08-04 12:36:11","uploaded":"2024-04-08 13:56:10","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241467.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241480","title":"KI on key hiearchy","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":70,"status":"noted","reservation_date":"2024-08-04 12:43:00","uploaded":"2024-04-08 12:54:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241480.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241481","title":"Solution on Key Hierarchy","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":280,"status":"noted","reservation_date":"2024-08-04 12:43:59","uploaded":"2024-04-08 12:54:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241481.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241482","title":"Conclusion on Key Hierarchy KI","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":300,"status":"noted","reservation_date":"2024-08-04 12:45:06","uploaded":"2024-04-08 12:54:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241482.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241504","title":"Draft TR 33.700-41","source":"KDDI Corporation","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":15040,"status":"withdrawn","reservation_date":"2024-04-19 11:28:29","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]