Cryptology ePrint Archive: Report 2017/346

Some cryptanalytic results on Lizard

Subhadeep Banik and Takanori Isobe

Abstract: Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120 bit Secret Key and a 64 bit IV. The authors claim that Lizard provides 80 bit security against key recovery attacks and a 60-bit security against distinguishing attacks. In this paper, we present an assortment of results and observations on Lizard. First, we show that by doing $2^{58}$ random trials it is possible to a set of $2^{64}$ triplets $(K,IV_0,IV_1)$ such that the Key-IV pairs $(K,IV_0)$ and $(K,IV_1)$ produce identical keystream bits. Second, we show that by performing only around $2^{28}$ random trials it is possible to obtain $2^{64}$ Key-IV pairs $(K_0,IV_0)$ and $(K_1,IV_1)$ that produce identical keystream bits. Thereafter, we show that one can construct a distinguisher for Lizard based on IVs that produce shifted keystream sequences. The process takes around $2^{51.5}$ random IV encryptions and around $2^{76.6}$ bits of memory. Finally, we propose a key recovery attack on a version of Lizard with the number of initialization rounds reduced to 223 (out of 256) based on IV collisions.

Category / Keywords: secret-key cryptography / Grain v1, Lizard, Stream Cipher.

Date: received 19 Apr 2017

Contact author: bsubhadeep at ntu edu sg

Available format(s): PDF | BibTeX Citation

Version: 20170421:215112 (All versions of this report)

Short URL: ia.cr/2017/346

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]