Paper 2017/346
Some cryptanalytic results on Lizard
Subhadeep Banik and Takanori Isobe
Abstract
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120 bit Secret Key and a 64 bit IV. The authors claim that Lizard provides 80 bit security against key recovery attacks and a 60-bit security against distinguishing attacks. In this paper, we present an assortment of results and observations on Lizard. First, we show that by doing $2^{58}$ random trials it is possible to a set of $2^{64}$ triplets $(K,IV_0,IV_1)$ such that the Key-IV pairs $(K,IV_0)$ and $(K,IV_1)$ produce identical keystream bits. Second, we show that by performing only around $2^{28}$ random trials it is possible to obtain $2^{64}$ Key-IV pairs $(K_0,IV_0)$ and $(K_1,IV_1)$ that produce identical keystream bits. Thereafter, we show that one can construct a distinguisher for Lizard based on IVs that produce shifted keystream sequences. The process takes around $2^{51.5}$ random IV encryptions and around $2^{76.6}$ bits of memory. Finally, we propose a key recovery attack on a version of Lizard with the number of initialization rounds reduced to 223 (out of 256) based on IV collisions.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Grain v1LizardStream Cipher.
- Contact author(s)
- bsubhadeep @ ntu edu sg
- History
- 2017-04-21: received
- Short URL
- https://ia.cr/2017/346
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/346, author = {Subhadeep Banik and Takanori Isobe}, title = {Some cryptanalytic results on Lizard}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/346}, year = {2017}, url = {https://eprint.iacr.org/2017/346} }