Differential and Linear Analyses of DIZY Through MILP Modeling
Loading...

Date
2026
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Science and Business Media Deutschland GmbH
Open Access Color
OpenAIRE Downloads
OpenAIRE Views
Abstract
In this work, we present the first independent security analysis of DIZY, a recently proposed ultra-lightweight stream cipher with two variants: DIZY-80 and DIZY-128. Our analysis focuses on DIZY’s resistance to linear and differential cryptanalysis. We employ a formal technique known as Mixed Integer Linear Programming (MILP), which enables us to model the internal structure of DIZY and search for characteristics that describe how XOR differences or linear masks propagate through the cipher. Specifically, we construct such characteristics to evaluate how many S-boxes become “active” during keystream generation, as this number directly affects the cipher’s resistance to these attacks. Contrary to the designers’ claim that any linear or differential characteristic over 8 rounds must involve at least 20 active S-boxes in DIZY-80 and 22 in DIZY-128, we identify characteristics with only 18 differentially or linearly active S-boxes and 20 linearly active S-boxes, respectively. We mount two distinguishing attacks on each cipher. Our 3-round linear distinguishing attack requires 223 bits of keystream, while the 4-round version requires 235 bits for DIZY-128 and DIZY-80, respectively. Our 2-round differential resynchronization attacks succeed using only the first four bytes of keystream data from approximately 230 and 226 different initializations with chosen initialization vectors (IVs) for DIZY-128 and DIZY-80, respectively. While these attacks do not compromise the full 15-round version of the cipher, they provide valuable insights into the design of DIZY and contribute to a deeper understanding of the security requirements of its diffusion layer. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
Description
EnCRYPTON Project No. 101079319 Sabanci University; European Union – Twinning Project
Keywords
Block Cipher, Cryptanalysis, Differential Attack, DIZY, Linear Attack, Mixed Integer Linear Programming (MILP), Stream Cipher
Fields of Science
Citation
WoS Q
N/A
Scopus Q
N/A

OpenCitations Citation Count
N/A
Source
Lecture Notes in Computer Science -- 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025 -- 2025-09-01 Through 2025-09-02 -- Istanbul -- 347249
Volume
Issue
Start Page
285
End Page
305
Collections
PlumX Metrics
Citations
Scopus : 0
Google Scholar™

