Type of Algorithm : Self-Synchronising Stream Cipher
Proposed Environment : Profile 2 (HW)
Intellectual Property : Free for any use. statements
Algorithm Description :
Article : The self-synchronizing stream cipher Moustique, pdf For more information about the stream cipher Moustique, please refer to the Mosquito paper.
Antoine Joux, Frédéric Muller, "Chosen-Ciphertext Attacks Against MOSQUITO", FSE 2006, LNCS 4047, pp. 390-404. (Note that this paper gives the attack against Mosquito instead of Moustique.)
Hardware Implementation:
Frank K. Gurkaynak, Peter Luethi, Nico Bernold, Rene Blattmann,
Victoria Goode, Marcel Marghitola, Hubert Kaeslin,
Norbert Felber and Wolfgang Fichtner, "Hardware Evaluation of eSTREAM Candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, Trivium, VEST, ZK-Crypt",
pdf, submitted 2006-01-02. (Note that this paper gives the implementation of Mosquito.)
Tim Good, William Chelton and Mohamed Benaissa,
"Review of stream cipher candidates from a low resource hardware perspective", pdf, submitted 2006-01-02. (Note that this paper gives the implementation of Mosquito.)