Tech-invite  3GPPspecsRELsGlossariesSIP
Info21222324252627282931323334353637384‑5x

Top   in Index   Prev   Next

TR 33.841SA3
Study on the support of 256-bit Algorithms for 5G

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V16.1.0 (Wzip)  2019/03  25 p.

WI Acronym:  FS_256_Algo
Rapporteur:  Mr. Evans, Tim P.

Quantum computing poses a long-term threat to information security. This may apply to some of the current protection measures in 5G systems. These threats are studied in this document so as to ensure that 5G systems remain secure also in the future.
The threats will impact symmetric and asymmetric cryptographic algorithms in different ways. This document focuses on symmetric cryptographic algorithms. In particular, it focuses on the implications of introducing 256 bit cryptographic keys and algorithms.

full Table of Contents for  TR 33.841  Word version:   16.1.0

Here   Top
1  ScopeWord-p. 7
2  References
3  Definitions and abbreviationsWord-p. 9
4  Threats posed by quantum computing and potential countermeasuresWord-p. 10
5  Assessment of quantum computing impact timelinesUp
6  Impacted NextGen areas
7  Study of full entropy 256-bit keys in the 5G key hierarchy
8  Assessment of the requirement for and impact of a longer MACWord-p. 17
9  Study of coexistence of different size keys and key size negotiation.
10  Study of desired number of 256-bit algorithms
11  Study the desired performance aspects for the new 256-bit algorithms
12  Study of key managementWord-p. 22
13  Study of individual algorithm details
14  Potential requirements
15  Conclusions
A  Change historyWord-p. 25

Up   Top