[{"name":"S3-241116","title":"New Key Issue on permanent secret key length (K)","source":"KDDI Corporation, Samsung, Xiaomi","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":40,"status":"noted","reservation_date":"2024-05-04 08:50:27","uploaded":"2024-04-08 10:03:54","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241116.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241117","title":"New Key Issue on different cryptographic key lengths in dual connectivity scenarios","source":"KDDI Corporation, CMCC","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2024-05-04 08:52:51","uploaded":"2024-04-08 10:04:57","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241117.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241118","title":"New Key Issue on algorithm negotiation on re-establishing RRC connection","source":"KDDI Corporation, CMCC","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2024-05-04 08:54:28","uploaded":"2024-04-08 10:04:57","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241118.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241170","title":"New Key Issue on authentication parameters in AKA procedure","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":50,"status":"noted","reservation_date":"2024-08-04 02:29:22","uploaded":"2024-04-08 07:10:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241170.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241171","title":"New Key Issue on different length of cryptographic key in EPS and 5GS interworking","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":190,"status":"noted","reservation_date":"2024-08-04 02:29:22","uploaded":"2024-04-08 07:10:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241171.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241172","title":"New Solution on different length of cryptographic key in EPS and 5GS interworking","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":230,"status":"noted","reservation_date":"2024-08-04 02:29:22","uploaded":"2024-04-08 07:10:40","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241172.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241181","title":"New key issue on algorithm negotiation for 256-bit algorithms","source":"vivo","contact":"Li Hu","contact-id":104884,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":100,"status":"noted","reservation_date":"2024-08-04 02:53:02","uploaded":"2024-04-08 03:00:24","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241181.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241190","title":"new kew issue on backward compatibility","source":"CableLabs, Charter Communications","contact":"Tao Wan","contact-id":79074,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2024-08-04 03:13:32","uploaded":"2024-04-08 03:18:18","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241190.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241275","title":"Adaptations to AS and NAS Procedures","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":110,"status":"noted","reservation_date":"2024-08-04 08:46:42","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241275.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241276","title":"Architecture Assumptions","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":20,"status":"noted","reservation_date":"2024-08-04 08:49:39","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241276.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241286","title":"UE States and Transitions","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":30,"status":"noted","reservation_date":"2024-08-04 08:51:49","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241286.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241288","title":"Introduction of AEAD Algorithm for Air-link Data Protection","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":200,"status":"noted","reservation_date":"2024-08-04 08:54:17","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241288.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241289","title":"Introduction of AEAD Algorithm and the Order of Data Protection","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":210,"status":"noted","reservation_date":"2024-08-04 08:56:16","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241289.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241291","title":"Discussion on AEAD Properties","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":220,"status":"noted","reservation_date":"2024-08-04 08:59:04","uploaded":"2024-04-08 11:02:31","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241291.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241310","title":"key issues on introducing 256-bit algorithm in 5GS","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":120,"status":"noted","reservation_date":"2024-08-04 09:25:04","uploaded":"2024-04-08 13:00:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241310.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241316","title":"New Key Issue on different cryptographic key lengths in URLLC scenario","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2024-08-04 09:25:05","uploaded":"2024-04-08 13:00:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241316.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241359","title":"Add KI on 256 bits algorithms selection in 5G system","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2024-08-04 09:44:40","uploaded":"2024-04-08 10:35:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241359.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241362","title":"Add sol on 256 bits algorithm selection in 5G system","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":240,"status":"noted","reservation_date":"2024-08-04 09:46:54","uploaded":"2024-04-08 10:35:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241362.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241377","title":"Conclusion on 256 bits algorithms selection in 5G system KI","source":"OPPO","contact":"Lihui Xiong","contact-id":100807,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":290,"status":"noted","reservation_date":"2024-08-04 09:50:02","uploaded":"2024-04-08 10:35:03","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241377.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241390","title":"New key issue on specifying usage of new encryption and integrity protection algorithms in the 5G system","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2024-08-04 10:23:44","uploaded":"2024-04-08 10:51:02","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241390.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241391","title":"New solution for specifying usage of new encryption and integrity protection algorithms in the 5G system","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":250,"status":"noted","reservation_date":"2024-08-04 10:23:44","uploaded":"2024-04-08 10:51:02","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241391.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241394","title":"CAT256 - New KI for CAT_256 on correctly indication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":170,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241394.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241395","title":"CAT256 - New solution for CAT_256 on correctly indication","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":260,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241395.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241396","title":"CAT256 - New KI for CAT_256 on Flexibility to adjust the preference on security algorithms","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":180,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241396.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241397","title":"CAT256 - New solution for CAT_256 on Flexibility to adjust the preference on security algorithms","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":270,"status":"noted","reservation_date":"2024-08-04 10:46:32","uploaded":"2024-04-08 13:26:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.701","crspecversion":"0.0.2","workitem":[{"winame":"FS_MiBiDA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241397.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241466","title":"New KI on AKA related 256-bit algorithm update","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":60,"status":"noted","reservation_date":"2024-08-04 12:36:11","uploaded":"2024-04-08 13:56:10","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241466.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241467","title":"New KI on negotiation for NAS and AS related 256-bit algorithms","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2024-08-04 12:36:11","uploaded":"2024-04-08 13:56:10","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241467.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241480","title":"KI on key hiearchy","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":70,"status":"noted","reservation_date":"2024-08-04 12:43:00","uploaded":"2024-04-08 12:54:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241480.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241481","title":"Solution on Key Hierarchy","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":280,"status":"noted","reservation_date":"2024-08-04 12:43:59","uploaded":"2024-04-08 12:54:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241481.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241482","title":"Conclusion on Key Hierarchy KI","source":"OPPO","contact":"Marcus Wong","contact-id":95029,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":300,"status":"noted","reservation_date":"2024-08-04 12:45:06","uploaded":"2024-04-08 12:54:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.1.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241482.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241504","title":"Draft TR 33.700-41","source":"KDDI Corporation","contact":"Yuto Nakano","contact-id":97324,"tdoctype":"draft TR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":13,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":15040,"status":"withdrawn","reservation_date":"2024-04-19 11:28:29","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]