Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Kara, O."

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Differential and Linear Analyses of DIZY Through MILP Modeling
    (Springer Science and Business Media Deutschland GmbH, 2026) İlter, M.B.; Koçak, O.; Kara, O.; Sulak, F.
    In this work, we present the first independent security analysis of DIZY, a recently proposed ultra-lightweight stream cipher with two variants: DIZY-80 and DIZY-128. Our analysis focuses on DIZY’s resistance to linear and differential cryptanalysis. We employ a formal technique known as Mixed Integer Linear Programming (MILP), which enables us to model the internal structure of DIZY and search for characteristics that describe how XOR differences or linear masks propagate through the cipher. Specifically, we construct such characteristics to evaluate how many S-boxes become “active” during keystream generation, as this number directly affects the cipher’s resistance to these attacks. Contrary to the designers’ claim that any linear or differential characteristic over 8 rounds must involve at least 20 active S-boxes in DIZY-80 and 22 in DIZY-128, we identify characteristics with only 18 differentially or linearly active S-boxes and 20 linearly active S-boxes, respectively. We mount two distinguishing attacks on each cipher. Our 3-round linear distinguishing attack requires 223 bits of keystream, while the 4-round version requires 235 bits for DIZY-128 and DIZY-80, respectively. Our 2-round differential resynchronization attacks succeed using only the first four bytes of keystream data from approximately 230 and 226 different initializations with chosen initialization vectors (IVs) for DIZY-128 and DIZY-80, respectively. While these attacks do not compromise the full 15-round version of the cipher, they provide valuable insights into the design of DIZY and contribute to a deeper understanding of the security requirements of its diffusion layer. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH
OpenAIRE Logo
OpenDOAR Logo
Jisc Open Policy Finder Logo
Harman Logo
Base Logo
OAI Logo
Handle System Logo
ROAR Logo
ROARMAP Logo
Google Scholar Logo

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback