№ lp_1_2_24901
File format: docx
Character count: 10422
File size: 37 KB
This document presents an extension to the existing opportunistic wireless encryption specification to integrate a post-quantum cryptographic algorithm.
Year:
2025
Region / City:
Cambridge, U.K.
Subject:
Wireless Network Encryption, Post-Quantum Cryptography
Document Type:
Technical Specification
Organization / Institution:
IEEE
Author:
Alex LUNGU, Mark RISON
Target Audience:
Technical professionals, researchers in wireless communication and cryptography
Validity Period:
From 2025
Approval Date:
2025-07-24
Date of Modifications:
Not specified
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.
The file will be delivered to the email address provided at checkout within 12 hours.
Don’t have cryptocurrency yet?
You can still complete your purchase in a few minutes:- Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
- In the app, tap Send.
- Select network, paste our wallet address.
- Send the exact amount shown above.
The final amount may vary slightly depending on the payment method.
The file will be sent to the email address provided at checkout within 24 hours.
The product description is provided for reference. Actual content and formatting may differ slightly.
Science Foundation Ireland Discover Programme Opportunistic Funding Mechanism Expression of Interest
Note:
Year
Region / City:
Ireland
Theme:
STEM education, public engagement
Document type:
Application form
Organization / Institution:
Science Foundation Ireland
Author:
Science Foundation Ireland
Target audience:
Applicants for funding
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2023
Region / City:
Bengaluru, India
Topic:
Post-Quantum Cryptography, Hardware Benchmarking
Document Type:
Research Paper
Author:
Jayalaxmi H, H M Brunda, Sumith Subraya Nayak, Sathya M, Anirudh S Hegde
Target Audience:
Researchers, Cryptographers, Hardware Engineers
Period of Validity:
N/A
Approval Date:
N/A
Modification Date:
N/A
Year:
2026
Location:
Goa, India
Organization:
3GPP TSG-SA3
Author:
Ericsson
Document Type:
Work Item Description
Agenda Item:
6.13
Target Release:
Rel-201
Scope:
UICC apps, Mobile Equipment, Access Network, Core Network
Classification:
Normative – Stage 1
Parent Work Item:
FS_CryptoPQC (Study on Transitioning to Post Quantum Cryptography in 3GPP)
Related Work Items:
Various referenced governmental and standards migration documents
Purpose:
Agreement on migration to post-quantum cryptography and timeline alignment
Expected Implementation Milestones:
Rel-20 Stage 3 mid-2027, SA Stage 2 December 2026, Rel-21 early 2029
Security Considerations:
Confidentiality and authentication transition strategies
References:
NIST IR 8547, EU PQC Roadmap, UK NCSC PQC Timelines, NSA CNSA 2.0 FAQ, ANSSI Guide, ASD Guidelines, Canadian CCS PQC Roadmap, Swedish NCSC PQC Guidance, NSM Cryptographic Recommendations, AIVD PQC Migration Handbook, 3GPP Release 20 Milestones
Year:
2026
Region / city:
Goa, India
Topic:
Post-Quantum Cryptography Migration
Document Type:
Meeting Document
Organization:
3GPP TSG-SA3
Author:
Ericsson
Target Audience:
3GPP Participants, Telecommunications Industry
Period of Validity:
2026-2035
Approval Date:
2026-02-09
Modification Date:
Not specified
Related Work Items:
FS_CryptoPQC
Impacts:
UICC apps, ME, AN, CN
Primary Classification:
Study, Normative – Stage 1
Parent Work Item:
FS_CryptoPQC
Other Related Work Items:
N/A
Justification:
Worldwide alignment on migration to Post-Quantum Cryptography (PQC) by 2035, prioritizing high-security systems by 2030.
References:
[1-11]
Context:
The document outlines the Post-Quantum Cryptography migration plan for 3GPP standards, focusing on high-priority systems and their secure transition to quantum-safe cryptography.
New WID on Post-quantum Cryptography Migration, 3GPP TSG-SA3 Meeting #126, February 2026, Goa, India
Year:
2026
Location:
Goa, India
Organization:
3GPP TSG-SA3
Author:
Ericsson
Document type:
Work Item Description
Topic:
Post-quantum Cryptography Migration
Meeting:
#126
Agenda item:
6.13
Target release:
Rel-201
Impacted systems:
UICC apps, ME, AN, CN, Others
Primary classification:
Study, Normative – Stage 1
Parent Work Item:
FS_CryptoPQC
Related Work Items:
Transitioning to Post Quantum Cryptography in 3GPP
Objectives:
Introduce PQC algorithms, update TLS profiles, add ECIES profiles for quantum-resistant SUCIs
Expected completion:
SA#113 (Sept 2026)
Organization:
3rd Generation Partnership Project (3GPP)
Working Group:
TSG-SA3
Meeting:
TSG-SA3 Meeting #126
Location:
Goa, India
Date:
9–13 February 2026
Source:
Ericsson
Document Type:
Work Item Description
Agenda Item:
6
Title:
Post-quantum Cryptography Migration
Acronym:
PQCMigration
Work Item Classification:
Normative – Stage 1
Parent Work Item:
FS_CryptoPQC
Parent Work Item Title:
Study on Transitioning to Post Quantum Cryptography in 3GPP
Target Release:
Rel-20
Affected Components:
UICC applications; Mobile Equipment (ME); Access Network (AN); Core Network (CN)
Submitting Organization:
Ericsson
Subject Area:
Telecommunications security and cryptography
Related Topic:
Transition to post-quantum cryptography in 3GPP systems
References:
NIST IR 8547; EU Roadmap for the Transition to Post-Quantum Cryptography; UK NCSC PQC migration timelines; NSA CNSA 2.0 FAQ; ANSSI Guide des mécanismes cryptographiques; ASD Guidelines for Cryptography; Canadian Centre for Cyber Security PQC roadmap; Swedish NCSC guidance; NSM Cryptographic Recommendations; AIVD PQC Migration Handbook; 3GPP Release 20 milestones
Year:
Not specified
Region / Country:
United Kingdom
Topic:
Data security and encryption
Document type:
Policy template
Organization:
Not specified
Audience:
Organizational staff handling confidential data
Standards referenced:
AES 256-bit encryption
Legal considerations:
UK export regulations, Data Protection Act (EEA and non-EEA)
Device coverage:
Laptops, tablets, smartphones, external drives, USB sticks, digital recorders
Review cycle:
Annually
Next review date:
Not specified
Exceptions procedure:
Documented and formally approved by relevant authorities
Year:
2007
Region / city:
United States
Subject:
Encryption of unclassified data at rest
Document Type:
Policy Memorandum
Organization:
Department of Defense
Author:
Not specified
Target audience:
DoD personnel, contractors, and other related stakeholders
Period of validity:
Ongoing
Approval date:
July 3, 2007
Amendment date:
Not specified
Year:
2017
Region / City:
Brunei Darussalam
Theme:
ICT Security, Authentication, Encryption
Document Type:
Request for Information (RFI)
Organization / Institution:
Ministry of Foreign Affairs and Trade, Brunei Darussalam
Author:
Ministry of Foreign Affairs and Trade, ICT Department
Target Audience:
ICT companies, vendors
Validity Period:
Not specified
Approval Date:
Not specified
Amendment Date:
Not specified
Year:
2023
Region / City:
United States
Topic:
Encryption Implementation, Data Protection
Document Type:
Template
Organ / Institution:
FedRAMP PMO
Author:
FedRAMP PMO
Target Audience:
Organizations implementing FedRAMP compliance
Effective Period:
Ongoing
Approval Date:
06/30/2023
Year:
2023
Region / City:
United States
Topic:
Email Encryption, Travel Vendor Setup
Document Type:
Instructional Guide
Organization / Institution:
Federal Aviation Administration (FAA)
Author:
FAA
Target Audience:
FAA personnel, travel arrangers
Effective Period:
Ongoing
Approval Date:
07.13.23
Date of Changes:
None
Year:
2015
Region / city:
New York, NY
Topic:
Cryptography
Document type:
Educational article
Institution:
McGraw Hill Education (India) Private Limited
Author:
Forouzan, B. A., Mukhopadhyay, D.
Target audience:
Students and professionals in cryptography
Period of validity:
Not specified
Approval date:
Not specified
Modification date:
Not specified
Year:
2024
Region / City:
Miami, United States
Field:
Web Development, Security
Document Type:
Research Article
Institution:
Smart Barrel
Author:
Onwuegbuzie
Target Audience:
Developers, Policymakers
Period of Validity:
September 2024 - March 2025
Approval Date:
N/A
Date of Changes:
N/A
Year:
2024
Region / City:
Malawi
Topic:
Electronic Transactions, Cyber Security, Certification Authority, Encryption
Document Type:
Regulations
Authority / Institution:
Malawi Communications Regulatory Authority
Author:
Moses Kunkuyu, Minister of Information and Digitalization
Target Audience:
Certification authorities, encryption service providers, legal and regulatory professionals in Malawi
Effective Period:
Ongoing from 2024
Approval Date:
2024
Date of Amendments:
Not specified
Note:
Year
Topic:
Email security
Document Type:
Procedure
Organization / Institution:
ORAU
Target Audience:
External email recipients
Year:
2026
Region/City:
Not specified
Subject:
Medical Image Encryption
Document Type:
Research Paper
Organization/Institution:
Not specified
Authors:
Frist Name Last Name1, Frist Name Last Name2, Frist Name Last Name3
Target Audience:
Researchers in cryptography and medical imaging
Period of validity:
Not specified
Approval Date:
28/Feb/2026
Date of Changes:
Not specified
Document ID:
SCG/ENCP/025/1.0
Security Classification:
Confidential
Date Issued:
30-Jul-2025
Version:
1.0
Project Name:
NA
Author:
AJ KHAN
Note:
Version History / Change History
Issued to:
Internal Review
Review Date:
30-Jul-2025
Reviewed By:
Internal Review
Date Approved:
30-Jul-2025
Approved By:
Internal Review
Date:
30-Jul-2025
Name/Distribution List:
Customer_DL_ABC
Comments:
Published to Customer ABC
DOC_ID:
SCG/BASEINS/005/1.0
DOC Version:
1.0
DOC Link:
Base Template Instructions
CISO:
Accountable for overseeing the implementation and enforcement of this policy.
DPO (Data Privacy Officer):
Responsible to review this Policy.
System administrators and application owners:
Implementing and maintaining encryption controls.
Security Team:
Responsible for enforcing backup requirements and periodic reviews to ensure compliance.
Employees / Contractors:
Responsible for protecting encryption keys and sensitive data.
Data at Rest:
Implement Full Disk Encryption (FDE) for all laptops and desktops.
Database and Storage Encryption:
Sensitive data in databases and storage systems must be encrypted using AES-256.
Backup Encryption:
Backup media must be encrypted with AES-256.
Removable Media Encryption:
Data on USBs and external hard drives must be encrypted with AES-256.
Cloud Storage Encryption:
Sensitive data in cloud storage services must be encrypted with AES-256.
Key Management:
Encryption keys must be securely managed.