Advertisement

The Self-synchronizing Stream Cipher Moustique

  • Joan Daemen
  • Paris Kitsos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4986)

Abstract

We present a design approach for hardware-oriented self-synchronizing stream ciphers and illustrate it with a concrete design called Moustique. The latter is intended as a research cipher: it proves that the design approach can lead to concrete results and will serve as a target for cryptanalysis where new attacks may lead to improvements in the design approach such as new criteria for the cipher building blocks.

Keywords

Boolean Function Field Programmable Gate Array Block Cipher Stream Cipher Pipeline Stage 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Maurer, U.M.: New Approaches to the Design of Self-Synchronizing Stream Ciphers. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 458–471. Springer, Heidelberg (1991)Google Scholar
  2. 2.
    Daemen, J., Govaerts, R., Vandewalle, J.: On the Design of High Speed Self-Synchronizing Stream Ciphers. In: Kam, P.Y., Hirota, O. (eds.) Singapore ICCS/ISITA 1992 Conference Proceedings, pp. 279–283. IEEE, Los Alamitos (1992)Google Scholar
  3. 3.
    Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral Dissertation, K.U.Leuven (March 1995)Google Scholar
  4. 4.
    Joux, A., Muller, F.: Loosening the KNOT. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 87–99. Springer, Heidelberg (2003)Google Scholar
  5. 5.
  6. 6.
    Daemen, J., Kitsos, P.: Submission to ECRYPT call for stream ciphers: the self-synchronizing stream cipher Mosquito: eSTREAM documentation, version 2 (December 8, 2005), http://www.ecrypt.eu.org/stream/
  7. 7.
    Joux, A., Muller, F.: Chosen-Ciphertext Attacks against MOSQUITO. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 390–404. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Daemen, J., Kitsos, P.: Submission to ECRYPT call for stream ciphers: the self-synchronizing stream cipher Moustique (June 30, 2006), http://www.ecrypt.eu.org/stream/
  9. 9.
    Xilinx Virtex FPGA Data Sheets (2005), URL: http://www.xilinx.com
  10. 10.
    Altera FPGA Data Sheets (2005), URL: http://www.altera.com

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Joan Daemen
    • 1
  • Paris Kitsos
    • 2
  1. 1.STMicroelectronicsBelgium
  2. 2.Hellenic Open University, Patras, Greece and Dept. of Computer Science and Technology, University of the PeloponneseTripoliGreece

Personalised recommendations