9.2.107 NR UE Security Capabilities

36.4233GPPEvolved Universal Terrestrial Radio Access Network (E-UTRAN)Release 17TSX2 Application Protocol (X2AP)

This IE defines the supported algorithms for encryption and integrity protection in NR as defined in TS 33.401 [18]. The eNBs store and send the complete bitmaps without modification or truncation as specified in TS 36.300 [15].

IE/Group Name

Presence

Range

IE type and reference

Semantics description

NR Encryption Algorithms

M

BIT STRING (SIZE(16, …))

Each position in the bitmap represents an encryption algorithm:

"all bits equal to 0" – UE supports no other NR algorithm than NEA0,

"first bit" – 128-NEA1,

"second bit" – 128-NEA2,

"third bit" – 128-NEA3,

“fourth to seventh bit” correspond to bit 4 to bit 1 of octet 3 in the UE Additional Security Capability IE defined in TS 24.301 [14],

“eighth to fifteenth bit” correspond to bit 8 to bit 1 of octet 4 in the UE Additional Security Capability IE defined in TS 24.301 [14],

other bits reserved for future use. Value ‘1’ indicates support and value ‘0’ indicates no support of the algorithm.

Algorithms are defined in TS 33.401 [18].

NR Integrity Protection Algorithms

M

BIT STRING (SIZE(16, …))

Each position in the bitmap represents an integrity protection algorithm:

"all bits equal to 0" – UE supports no other NR algorithm than NIA0,

"first bit" – 128-NIA1,

"second bit" – 128-NIA2,

"third bit" – 128-NIA3,

“fourth to seventh bit” correspond to bit 4 to bit 1 of octet 5 in the UE Additional Security Capability IE defined in TS 24.301 [14],

“eighth to fifteenth bit” correspond to bit 8 to bit 1 of octet 6 in the UE Additional Security Capability IE defined in TS 24.301 [14],

other bits reserved for future use.

Value ‘1’ indicates support and value ‘0’ indicates no support of the algorithm.

Algorithms are defined in TS 33.401 [18].