Differential and Linear Analyses of DIZY Through MILP Modeling
| dc.contributor.author | İlter, M.B. | |
| dc.contributor.author | Koçak, O. | |
| dc.contributor.author | Kara, O. | |
| dc.contributor.author | Sulak, F. | |
| dc.date.accessioned | 2026-03-05T15:08:15Z | |
| dc.date.available | 2026-03-05T15:08:15Z | |
| dc.date.issued | 2026 | |
| dc.description | EnCRYPTON Project No. 101079319 Sabanci University; European Union – Twinning Project | en_US |
| dc.description.abstract | In this work, we present the first independent security analysis of DIZY, a recently proposed ultra-lightweight stream cipher with two variants: DIZY-80 and DIZY-128. Our analysis focuses on DIZY’s resistance to linear and differential cryptanalysis. We employ a formal technique known as Mixed Integer Linear Programming (MILP), which enables us to model the internal structure of DIZY and search for characteristics that describe how XOR differences or linear masks propagate through the cipher. Specifically, we construct such characteristics to evaluate how many S-boxes become “active” during keystream generation, as this number directly affects the cipher’s resistance to these attacks. Contrary to the designers’ claim that any linear or differential characteristic over 8 rounds must involve at least 20 active S-boxes in DIZY-80 and 22 in DIZY-128, we identify characteristics with only 18 differentially or linearly active S-boxes and 20 linearly active S-boxes, respectively. We mount two distinguishing attacks on each cipher. Our 3-round linear distinguishing attack requires 223 bits of keystream, while the 4-round version requires 235 bits for DIZY-128 and DIZY-80, respectively. Our 2-round differential resynchronization attacks succeed using only the first four bytes of keystream data from approximately 230 and 226 different initializations with chosen initialization vectors (IVs) for DIZY-128 and DIZY-80, respectively. While these attacks do not compromise the full 15-round version of the cipher, they provide valuable insights into the design of DIZY and contribute to a deeper understanding of the security requirements of its diffusion layer. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026. | en_US |
| dc.identifier.doi | 10.1007/978-3-032-15541-2_16 | |
| dc.identifier.isbn | 9789819698936 | |
| dc.identifier.isbn | 9789819698042 | |
| dc.identifier.isbn | 9789819698110 | |
| dc.identifier.isbn | 9789819698905 | |
| dc.identifier.isbn | 9783032004949 | |
| dc.identifier.isbn | 9789819569564 | |
| dc.identifier.isbn | 9789819512324 | |
| dc.identifier.isbn | 9783032026019 | |
| dc.identifier.isbn | 9783032008909 | |
| dc.identifier.isbn | 9783032163417 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.scopus | 2-s2.0-105029371051 | |
| dc.identifier.uri | https://doi.org/10.1007/978-3-032-15541-2_16 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14411/11210 | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
| dc.relation.ispartof | Lecture Notes in Computer Science -- 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025 -- 2025-09-01 Through 2025-09-02 -- Istanbul -- 347249 | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Block Cipher | en_US |
| dc.subject | Cryptanalysis | en_US |
| dc.subject | Differential Attack | en_US |
| dc.subject | DIZY | en_US |
| dc.subject | Linear Attack | en_US |
| dc.subject | Mixed Integer Linear Programming (MILP) | en_US |
| dc.subject | Stream Cipher | en_US |
| dc.title | Differential and Linear Analyses of DIZY Through MILP Modeling | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 57226528394 | |
| gdc.author.scopusid | 36165068500 | |
| gdc.author.scopusid | 23396967100 | |
| gdc.author.scopusid | 36624418400 | |
| gdc.collaboration.industrial | true | |
| gdc.description.department | Atılım University | en_US |
| gdc.description.departmenttemp | [İlter] Murat Burhan, ASELSAN A.Ş., Yenimahalle, Ankara, Turkey; [Koçak] Onur, Türkiye Bilimsel ve Teknolojik Araştirma Kurumu, Kavaklidere, Ankara, Turkey; [Kara] Orhun, Türkiye Bilimsel ve Teknolojik Araştirma Kurumu, Kavaklidere, Ankara, Turkey, Department of Mathematics, Izmir Yüksek Teknoloji Enstitüsü, Izmir, Turkey; [Sulak] Fatih, Department of Mathematics, Atilim University, Ankara, Turkey | en_US |
| gdc.description.endpage | 305 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | N/A | |
| gdc.description.startpage | 285 | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W7126212955 | |
| gdc.index.type | Scopus | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.55 | |
| gdc.opencitations.count | 0 | |
| gdc.plumx.scopuscites | 0 | |
| gdc.scopus.citedcount | 0 | |
| gdc.virtual.author | Sulak, Fatih | |
| relation.isAuthorOfPublication | 40b5c43b-abb5-47ad-9931-a3dcff0a8fe5 | |
| relation.isAuthorOfPublication.latestForDiscovery | 40b5c43b-abb5-47ad-9931-a3dcff0a8fe5 | |
| relation.isOrgUnitOfPublication | 50be38c5-40c4-4d5f-b8e6-463e9514c6dd | |
| relation.isOrgUnitOfPublication | 31ddeb89-24da-4427-917a-250e710b969c | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 50be38c5-40c4-4d5f-b8e6-463e9514c6dd |
