Differential and Linear Analyses of DIZY Through MILP Modeling

Loading...
Publication Logo

Date

2026

Journal Title

Journal ISSN

Volume Title

Publisher

Springer Science and Business Media Deutschland GmbH

Open Access Color

OpenAIRE Downloads

OpenAIRE Views

Research Projects

Journal Issue

Abstract

In this work, we present the first independent security analysis of DIZY, a recently proposed ultra-lightweight stream cipher with two variants: DIZY-80 and DIZY-128. Our analysis focuses on DIZY’s resistance to linear and differential cryptanalysis. We employ a formal technique known as Mixed Integer Linear Programming (MILP), which enables us to model the internal structure of DIZY and search for characteristics that describe how XOR differences or linear masks propagate through the cipher. Specifically, we construct such characteristics to evaluate how many S-boxes become “active” during keystream generation, as this number directly affects the cipher’s resistance to these attacks. Contrary to the designers’ claim that any linear or differential characteristic over 8 rounds must involve at least 20 active S-boxes in DIZY-80 and 22 in DIZY-128, we identify characteristics with only 18 differentially or linearly active S-boxes and 20 linearly active S-boxes, respectively. We mount two distinguishing attacks on each cipher. Our 3-round linear distinguishing attack requires 223 bits of keystream, while the 4-round version requires 235 bits for DIZY-128 and DIZY-80, respectively. Our 2-round differential resynchronization attacks succeed using only the first four bytes of keystream data from approximately 230 and 226 different initializations with chosen initialization vectors (IVs) for DIZY-128 and DIZY-80, respectively. While these attacks do not compromise the full 15-round version of the cipher, they provide valuable insights into the design of DIZY and contribute to a deeper understanding of the security requirements of its diffusion layer. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.

Description

EnCRYPTON Project No. 101079319 Sabanci University; European Union – Twinning Project

Keywords

Block Cipher, Cryptanalysis, Differential Attack, DIZY, Linear Attack, Mixed Integer Linear Programming (MILP), Stream Cipher

Fields of Science

Citation

WoS Q

N/A

Scopus Q

N/A
OpenCitations Logo
OpenCitations Citation Count
N/A

Source

Lecture Notes in Computer Science -- 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025 -- 2025-09-01 Through 2025-09-02 -- Istanbul -- 347249

Volume

Issue

Start Page

285

End Page

305

Collections

PlumX Metrics
Citations

Scopus : 0

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.0

Sustainable Development Goals

SDG data could not be loaded because of an error. Please refresh the page or try again later.