ArticlePDF Available

Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product

Authors:

Abstract and Figures

Nonlinear feedback shift registers (NFSRs) are the main components of stream ciphers and convolutional decoders. Recent years have seen an increase in the requirement for information security, which has sparked NFSR research. However, the NFSR study is very imperfect as a result of the lack of appropriate mathematical tools. Many scholars have discovered in recent years that the introduction of semi-tensor products (STP) of matrices can overcome this issue because STP can convert the NFSR into a quasi-linear form. As a result of STP, new NFSR research has emerged from a different angle. In view of this, in order to generalize the latest achievements of NFSRs based on STP and provide some directions for future development, the research results are summarized and sorted out, broadly including the modeling of NFSRs, the analysis of the structure of NFSRs, and the study of the properties of NFSRs.
Content may be subject to copyright.
Citation: Gao, Z.; Feng, J.-e. Research
Status of Nonlinear Feedback Shift
Register Based on Semi-Tensor
Product. Mathematics 2022,10, 3538.
https://doi.org/10.3390/
math10193538
Academic Editor: Juan A. Aledo
Received: 3 September 2022
Accepted: 26 September 2022
Published: 28 September 2022
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
mathematics
Review
Research Status of Nonlinear Feedback Shift Register Based on
Semi-Tensor Product
Zhe Gao and Jun-e Feng ,†
School of Mathematics, Shandong University, Jinan 250100, China
*Correspondence: fengjune@sdu.edu.cn
These authors contributed equally to this work.
Abstract:
Nonlinear feedback shift registers (NFSRs) are the main components of stream ciphers
and convolutional decoders. Recent years have seen an increase in the requirement for information
security, which has sparked NFSR research. However, the NFSR study is very imperfect as a result
of the lack of appropriate mathematical tools. Many scholars have discovered in recent years that
the introduction of semi-tensor products (STP) of matrices can overcome this issue because STP can
convert the NFSR into a quasi-linear form. As a result of STP, new NFSR research has emerged from
a different angle. In view of this, in order to generalize the latest achievements of NFSRs based on
STP and provide some directions for future development, the research results are summarized and
sorted out, broadly including the modeling of NFSRs, the analysis of the structure of NFSRs, and the
study of the properties of NFSRs.
Keywords:
semi-tensor product; nonlinear feedback shift register; equivalence; nonsingularity;
stability
MSC: 93C10
1. Introduction
As the information age has progressed, the nation, society, and people have become
more concerned with information security, and cryptography has emerged as a key tool for
doing so. Symmetric and asymmetric cryptosystems are the two basic types of cryptography
used today. Block ciphers and stream ciphers are examples of symmetric cryptosystems.
Due to its benefits for quick encryption and decryption, easy hardware implementation,
minimal error propagation, and simple application protocol, stream cipher is frequently
employed in vital departments and various mobile communication systems for confidential
communication. The feedback shift register (FSR) is a primary structural component of
stream cipher.
FSR, as a finite state automaton that can be represented by difference equations of a
set of Boolean functions, in addition to its application in stream ciphers, is also widely used
in communication systems, digital circuits and other fields [
1
3
]. The research of FSRs has
a history of more than 50 years. In 1967, the famous scholar Golomb [
4
] introduced the
fundamental characteristics of FSRs and the generation mechanism of the shift sequences,
and these two concepts serve as the foundation for FSR study today. Different from linear
FSR (LFSR), nonlinear FSR (NFSR) has received more attention due to its higher level of
security. In stream ciphers, NFSR, as a generator of pseudo-random sequences, has been
researched by numerous scholars. Especially after the European eSTREAM project, many
NFSR-based stream cipher algorithms emerged, such as the hardware finalists Grain [
5
],
Trivium [
6
], and Mickey [
7
]. In convolutional codes, NFSR is the main building block of
decoding algorithms such as threshold decoding [
8
,
9
]. In the threshold decoding algorithm,
the syndrome sequence formed by the received information symbols and the received
Mathematics 2022,10, 3538. https://doi.org/10.3390/math10193538 https://www.mdpi.com/journal/mathematics
Mathematics 2022,10, 3538 2 of 14
supervisory symbols is used as the input of the NFSR, and the output of the NFSR is used
as the error estimation, so that the correct information symbols can be obtained.
Over the years, NFSRs have received extensive attention due to their wide range of
application scenarios. According to the structure, NFSRs can be divided into Fibonacci
NFSRs [
10
,
11
], Galois NFSRs [
11
,
12
], Grain-like cascade NFSRs [
13
,
14
], Trivium-like cascade
NFSRs [
15
,
16
] and so on. According to whether there is input, NFSRs can be divided into
autonomous NFSRs and non-autonomous NFSRs. According to the research problems,
in addition to stream cipher algorithm designs [
17
21
] and attacks [
22
,
23
], the theoretical
study can be summarized into three parts: (1) equivalence and decomposition [
24
26
],
irreducible NFSRs [
27
,
28
] and affine sub-families [
14
,
29
]; (2) nonsingularity [
10
,
30
,
31
]; (3)
period [
32
34
] and de Bruijn sequences [
35
38
] and so on. However, due to the lack of
suitable mathematical means, the research on NFSR still has a long way to go.
In order to break the limitation of the dimension of the traditional matrix product,
Cheng et al. [
39
,
40
] proposed a new matrix product—the semi-tensor product (STP), which
allows the multiplication of two matrices of any dimension. There are numerous significant
applications in this field, including the original Boolean network (BN) [
41
47
], game the-
ory [
48
50
], multi-agent synchronization and queue control [
51
,
52
], finite automata [
53
57
],
fault diagnosis and digital circuit design [
58
,
59
], and even network query and teleoper-
ation [
60
], internal combustion engine [
61
], intelligent Home [
62
] and other engineering
problems [
63
]. STP helps to solve many challenging issues in various fields. Professor
Guo [
64
] of the Chinese Academy of Sciences gave a high evaluation of STP, saying that
“the STP may become one of the new mathematical tools called for in the computer age
to realize the purpose of discovering new phenomena and solving new problems based
on calculation”.
Fortunately, in recent years, many scholars have discovered that STP can also be used
to model and study NFSRs fairly efficiently. Because NFSRs and BNs are both composed
of finite Boolean functions and finite states, this motivates many scholars to use STP
to model NFSR into a quasi-linear form similar to BN, and this quasi-linear form will
help to simplify many research problems. From this idea, many significant results were
born. These results are more novel than previous conclusions and are very helpful for the
design of practical stream cipher algorithms and decoding algorithms. According to the
specific research object, the main achievements can be roughly divided into the modeling
of NFSRs [
65
67
], the analysis of the structure of NFSRs [
68
81
], and the study of the
properties of NFSRs
[8297]
. This paper will give an overview of the latest achievements in
NFSR research based on STP from these three aspects.
The content of this paper is organized as follows: First, the definition and properties
of STP are introduced, and several types of NFSR are briefly introduced. Then, the latest
results in NFSR research based on STP are introduced, mainly including modeling problems,
structural problems, properties and relevant criteria. Finally, a prospect and a summary of
this paper are given.
2. Preliminaries
This section provides some notations, the definition and some properties of the STP.
First of all, some notations used in this paper are listed as follows:
Rm×n: set of real matrices of dimension m×n.
F2: Galois field of two elements.
Fn
2: set of all n-dimension vectors over F2.
In: identity matrix of dimension n.
δi
n: the ith column of the identity matrix In.
2:={δi
2|i=1, 2}.
n
2: set of all n-dimension vectors over p.
Ln×r
: set of
n×r
logical matrices satisfying
Col(L)n
. For
L Ln×r
, write
L= [δi1
nδi2
n. . . δir
n]or L=δn[i1i2. . . ir]for simplicity.
Coli(M): the i-th column of matrix M.
Mathematics 2022,10, 3538 3 of 14
Rowi(M): the i-th row of matrix M.
M(i,j): the element on the i-th row, j-th column of matrix M.
dse: the largest integer less than s.
|M|: the determinant of matrix M.
ord(M): the order of matrix M.
W[m,n]
: swap matrix, where
W[m,n]= [δ1
nδ1
m
,
δ2
nδ1
m
,
· · ·
,
δn
nδ1
m
,
· · ·
,
δ1
nδm
m
,
δ2
nδm
m
,
· · ·
,
δn
nδm
m]
.
Definition 1
([
98
])
.
Let
ARm×n
,
BRp×q
, the Kronecker product of matrices
A
and
B
is
defined as
AB=
A(1,1)B A(1,2)B. . . A(1,n)B
A(2,1)B A(2,2)B. . . A(2,n)B
.
.
..
.
.....
.
.
A(m,1)B A(m,2)B. . . A(m,n)B
.
Definition 2
([
99
])
.
Let
ARm×n
and
BRp×n
. The Khatri–Rao product of matrices
A
and
B
is defined as an mp ×n matrix, given by
AB= [Col1(A)Col1(B)Col2(A)Col2(B). . . Coln(A)Coln(B)]. (1)
Definition 3 ([39]).Let A Rm×n, B Rp×q. The STP of matrices A and B is defined as
AnB:= (AIs/n)(BIs/p), (2)
where s is the least common multiple of n and p.
Lemma 1
([
39
])
.
Any logical function
y=f(x1
,
x2
,
. . .
,
xn)
with Boolean variables
xi2
,
i=1, 2, . . . , n, can be expressed as a multi-linear form as
y=f(x1,x2, . . . , xn) = Mfx1x2. . . xn, (3)
where y 2, and M f L2×2nis unique, called the structural matrix of f .
3. Research Status of NFSRs Based on STP
The invention of the STP has brought new vitality into the research of NFSRs. This
section will focus on the research status on applying STP to NFSRs .
3.1. Modeling Problems for NFSRs
This section will introduce several types of NFSRs and their algebraic forms established
by STP. Identify 1 and 0 as
δ1
22
and
δ2
22
, respectively. In the sequel, we say a variable
XF2
is in a scalar form, and call the corresponding variable
x2
is in a vector form.
Without loss of generality, we usually omit n" in the following for simplicity.
3.1.1. Fibonacci NFSRs
Fibonacci NFSR is often adopted to design stream ciphers [
19
,
21
]. An
n
-stage Fibonacci
NFSR can be expressed as:
X1(t+1) = X2(t),
X2(t+1) = X3(t),
.
.
.
Xn1(t+1) = Xn(t),
Xn(t+1) = f(X1(t),X2(t), . . . , Xn(t)).
(4)
Mathematics 2022,10, 3538 4 of 14
where the content of bit
i
is denoted as
Xi(t)
,
i=
1, 2,
. . .
,
n
. The state of the NFSR at time
t
is denoted by
X(t) = [X1(t)X2(t). . . Xn(t)]
, and
f
is a nonlinear feedback function.
Figure 1represents an n-stage Fibonacci NFSR.
Figure 1. An n-stage Fibonacci NFSR.
Using Lemma 1and the vector forms, for
i=
1, 2,
. . .
,
n
, there exists a structural matrix
Li
such that
xi=Lix(t)
, where
x(t) = nn
k=1xk(t)2n
. Then, an equivalently linear form
of Fibonacci NFSR [65] an be expressed as:
x(t+1) = Lx(t), (5)
where
x(t) = nn
k=1xk(t)2n
, and
L=L1L2 · · · Ln L2n×2n
is the state transition
matrix of this NFSR.
More accurately, assume
[s1
,
s2
,
. . .
,
s2n]
to be the truth table of
f
arranged in reverse
alphabetical order and L=δ2n[η1. . . η2n1η2n1+1. . . η2n], then [66]
(ηi=2isi,
η2n1+i=2is2n1+i
(6)
for all i=1, 2, . . . , 2n1.
3.1.2. Galois NFSRs
Compared to Fibonacci NFSRs, Galois NFSRs may decrease the propagation time
and increase the throughput [
25
], so that they are employed in several stream cipher
designs [100]. An n-stage Galois NFSR can be expressed as:
X1(t+1) = f1(X1(t),X2(t), . . . , Xn(t)),
X2(t+1) = f2(X1(t),X2(t), . . . , Xn(t)),
.
.
.
Xn(t+1) = fn(X1(t),X2(t), . . . , Xn(t)).
(7)
where fiare nonlinear feedback functions, i=1, 2, . . . , n.
The Galois NFSR can also be equivalently expressed as a linear form using STP:
x(t+1) = Lx(t), (8)
where
x(t) = nn
i=1xi(t)2n
, and
L L2n×2n
is called the state transition matrix of the
Galois NFSR. Figure 2represents an n-stage Galois NFSR.
Mathematics 2022,10, 3538 5 of 14
Figure 2. An n-stage Galois NFSR.
3.1.3. Grain-Like Cascade NFSRs
In a Grain-like cascade FSR, one LFSR is used to control another NFSR (see Figure 3).
Let
[X1(t). . . Xn(t)Y1(t). . . Ym(t)]
represents the state of the Grain-like cascade NFSR.
Then they have the following relation:
Y1(t+1) = Y2(t),
.
.
.
Ym1(t) = Ym(t),
Ym(t+1) = g(Y1(t), . . . , Ym(t)),
X1(t+1) = X2(t),
.
.
.
Xn1(t+1) = Xn(t),
Xn(t+1) = f(X1(t),X2(t), . . . , Xn(t)) Y1(t).
(9)
Using Lemma 1, the multi-linear form of (9) can be obtained [86]:
(y(t+1) = L1y(t),
x(t+1) = L2y1(t)x(t).(10)
Figure 3represents an
n
-stage Fibonacci NFSR. In general, a Grain-like cascade NFSR
can be considered as an NFSR with input, where the output of the LFSR is used as input of
the NFSR. From this idea, the algebraic form (9) can be reduced to
x(t+1) = Lux(t)u(t), (11)
where
x(t)2n
is the state at time instant
t
,
u(t)2
is the input at time instant
t
. More
precisely, assume
[s1
,
s2
,
. . .
,
s2n+1]
to be the truth table of
f
arranged in the reverse alphabet
order and L=δ2n[η1. . . η2nη2n+1. . . η2n+1], then [68]
(ηi=2die si,
η2n+i=2die s2n+i
(12)
for all i=1, 2, . . . , 2n.
Mathematics 2022,10, 3538 6 of 14
Figure 3. An m+n-stage Grain-like cascade NFSR.
3.1.4. Multi-Valued NFSRs
It can be seen that the NFSRs introduced above are all binary, but in practical applica-
tions, in order to consider software implementation, some studies are based on multi-valued
NFSRs. Consider a
k
-valued Fibonacci NFSR, whose form is the same as (4), except that
the value of
Xi
is from 0 to
k
1 instead of {0,1}. Denote
L=δkn[η1η2. . . ηkn]
be the state
transition matrix of this NFSR, then [67]
ηm={[(m1)mod kn1] + 1}ksm,m=1, 2, . . . , kn. (13)
Similarly, other types of NFSRs can also be correspondingly extended to multi-valued
NFSRs, which will not be repeated here.
3.2. Structural Problems of NFSRs
This section will introduce some researches about structural problems of NFSRs that
are studied by applying STP, including the equivalence, isomorphism, decomposition and
period of NFSRs. In-depth study of the structural problems of NFSR can aid in the creation
of stream cipher algorithms that are both more effective and safe.
3.2.1. The Equivalence Transition between Galois NFSRs and Fibonacci NFSRs
In Section 3.1, we introduced the structure of Galois NFSRs and Fibonacci NFSRs.
Since both types have their own advantages and disadvantages, such as the period of
output sequences in Fibonacci NFSR being equal to that of state sequences and Galois
NFSR has higher speed of output sequences generation [
25
], it is necessary to study the
equivalence of the two. If a Galois NFSR is euivalent to a Fibonacci NFSR, then this special
Galois NFSR can have the advantages of Fibonacci NFSR in addition to its own advantages.
(1) Equivalence
Definition 4
([
101
])
.
Two NFSRs are equivalent if the sets of their output sequences are the same.
There are several studies on equivalence condition of Galois NFSR and Fibonacci NFSR
using STP [
74
] was disclosed therein that if a Galois NFSR is equivalent to a Fibonacci
NFSR, then its stage number is no less than that of the Fibonacci NFSR. The number of
n
-stage Galois NFSRs that are equivalent to a given
n
-stage Fibonacci NFSR is
(
2
n1!)2
.
The literature [
75
,
76
] gave a series of necessary and sufficient conditions for equivalence
from the perspective of observability matrix and output tuple, respectively.
In addition, there are also some special cases of equivalence that have been studied.
An
n
-stage
τ
-terminal-bit Galois NFSR is equivalent to an
n
-stage Fibonacci NFSR when
the feedback functions of the Galois NFSR satisfy certain conditions. If the output sequence
set of an
n
-stage Fibonacci NFSR equal to its complementary set, then there are 2
×(
2
n1!)2
Galois NFSRs are equivalent to this Fibonacci NFSR. For details, see [73].
A property closely related to equivalence is isomorphism. Two NFSRs are said to be
isomorphic if their state diagrams are isomorphic. Two state diagrams
G= (V
,
A)
and
G= (V
,
A)
are isomorphic means that there exists a bijection mapping
φ:VV
such
that for any edge
EA
from state
X
to
Y
, there exists an edge
EA
from
φ(X)
to
φ(Y)
.
About the relationship between isomorphism and equivalence, if an
n
-stage Fibonacci
NFSR and an
n
-stage Galois NFSR are equivalent, then their state transition diagrams are
isomorphic [
70
]. In more depth, the literature [
73
] explored the conditions that the feedback
Mathematics 2022,10, 3538 7 of 14
functions need to satisfy to make two NFSRs achieve anti-isomorphism, dual isomorphism
and dual anti-isomorphism, respectively.
(2) Weak equivalence
Weak equivalence is a relation weaker than equivalence.
Definition 5
([
80
])
.
Fibonacci NFSR (5) is said to be weakly equivalent to Galois NFSR (8) if
for any output sequence, denoted by
Y
of Fibonacci NFSR (5), there always exists an initial state
denoted by
z
, such that the output sequence of Galois NFSR (8) with initial state
z
is the same as
Y
.
According to the definition of weak equivalence, (5) is weakly equivalent to (8) if the
set of output sequences of (5) is a subset of that of (8). If Fibonacci NFSR (5) is weakly
equivalent to Galois NFSR (8), then (5) is also equivalent to (8). Conversely, if Galois NFSR
(8) is weakly equivalent to Fibonacci NFSR (5), then (8) is not necessarily equivalent to
(5). Moreover [
80
], pointed out that given any
n
-stage Fibonacci NFSR, their method can
construct
(
2
n1)!2
1 weakly equivalent
n
-stage Galois NFSRs, and conversely, given any
n
-stage Galois NFSR, it is possible to construct a weakly equivalent
m
-stage Fibonacci NFSR
where m<n.
3.2.2. The Equivalence and Decomposition between Cascade NFSRs
Stream cipher design can benefit from examining the features of two equivalent
cascade NFSRs, for example, to choose a better NFSR based on its quality metrics [
69
]
showed that for any given cascade connection of an
m
-stage NFSR1 into an
n
-stage NFSR2,
there exists only another one equivalent cascade connection of an
m
-stage NFSR3 into an
n-stage NFSR4.
Decomposability and equivalence go hand in hand for cascaded NFSR. An NFSR is
said to be decomposable if it is equivalent to a cascade connection of to NFSRs. By multi-
plying the state transition matrix by the permutation matrix, Zhong and Lin [
70
] obtained
a sufficient and necessary condition that a Fibonacci NFSR can be decomposed into a
cascade NFSR.
3.2.3. Minimum Period and Maximum Period
Minimum period is a concept in Grain-like cascade NFSRs. In 2011, Hu and
Gong [102]
confirmed that the period of the sequence generated by a Grain-like cascade NFSR is a
multiple of the period of the sequence generated by its LFSR if the initial state of the LFSR
is nonzero, and meanwhile proposed an open question: for fixed feedback functions of
an NFSR and an LFSR, determine whether the sequences generated by the NFSR in a
Grain-like structure can achieve the minimum period, i.e., the period of the LFSR. This
question has attracted some scholars to discuss. Zhong and Lin [
68
] converted this open
question into a problem of solving an integer equation based on the framework of STP. They
verified that for any given initial state of an
n
-stage NFSR and any given nonzero initial
state of an
m
-stage LFSR, the probability that the sequence produced by the Grain-like
cascade NFSR achieves the minimum period 2m1 is very small, which is at most 2n.
As for maximum period, the sequences with maximum period can keep more cryp-
tographical security than other sequences. The NFSR which can generate sequences with
maximum period is usually called full-length NFSR. Literature [
66
,
71
] revealed that an
n
-stage NFSR is a full-length NFSR if and only if the state transition matrix
L
in (5) sat-
isfies
ord(L) =
2
n
, and for an
n
-stage full-length NFSR ,
|L|=
1 holds. The full-length
NFSRs can be constructed through the cycles joining algorithm [
65
], and this algorithm can
construct 22n21different n-stage full-length NFSRs.
Other studies on cycles via STP include cycle reconstruction [
78
], cycle decomposi-
tion [82], etc.
For the convenience of readers, the relevant results are presented in Table 1in the
order of the year of publication of the mentioned literature.
Mathematics 2022,10, 3538 8 of 14
Table 1. The existing results on period of NFSRs based on STP.
Year Literature Innovation Points Object
2014 [65] cycles joining algorithm maximum period
2015 [66,71]ord(L) = 2niff the NFSR is full-length maximum period
2015 [82] multi-valued NFSRs cycle decomposition
2018 [78] NFSRs with single input cycle reconstruction
2018 [68] the probability to achieve minimum period 2nminimum period
3.3. Properties and Correlative Criteria of NFSRs
The property of NFSRs plays a crucial role in reflecting its performance. Studying the
properties of NFSRs can provide reference for stream cipher designers. This subsection will
introduce the research status of different properties of NFSRs in recent years.
3.3.1. Nonsingularity
Nonsingularity is a fundamental demand to guarantee that the NFSRs avoid gener-
ating equivalent keys in stream cipher designing. The definition of nonsingularity is as
follows:
Definition 6
([
103
])
.
An NFSR is said to be nonsingular if its state transition diagram contains
only cycles.
Lemma 2
([
103
])
.
An NFSR is nonsingular if and only if each state has only one successor and
one predecessor.
Regarding nonsingularity, there are some classical theories, such as the proof in [
4
] that
a binary NFSR is nonsingular if and only if its feedback function
f(x1
,
x2
,
. . .
,
xn) = x1
f0(x2
,
. . .
,
xn)
, where
f0
is independent of the variable
x1
. However, the paper [
82
] pointed
that this method cannot be applied directly with multi-valued NFSRs. Therefore [
82
],
proposed another method to judge nonsingularity, that is, an
n
-stage
k
-valued NFSR
is nonsingular if and only if
|Mi| 6=
0,
i=
1, 2,
. . .
,
kn1
, where
Mi Lk×k
satisfying
LW[k,k]. . . W[k,kn1]= [M1M2. . . Mkn1]
and
L
is the state transition matrix of the NFSR
obtained by STP.
For Grain-like cascade NFSR (10), Lu et al. [
86
] regarded it as an NFSR with input (11)
and put forward some sufficient conditions for nonsingularity, for example, NFSR (11) is
nonsingular if
Lu= [Lu1Lu2]
with
Lu1
and
Lu2
are both nonsingular. Lu also pointed that if
in NFSR (11)
Col(Lu)6=2n
, then this NFSR is singular. Meanwhile, some other properties
of Luare also given in this paper.
3.3.2. Stability and Driven Stability
During the decoding process of convolutional codes, decoding errors may occur due
to channel attacks and other reasons, and decoding errors may propagate to cause more
decoding errors. To limit error propagation, Massey [
104
] found that stability as well as
driven stability helps a lot in this regard. Stability is a concept in autonomous NFSRs,
indicating that NFSR has a kind of “reconvergence" ability, which can make NFSRs with
decoding error return to correct decoding. Driven stability is a property weaker than
stability, defined in non-autonomous NFSRs with input. Driven stability only requires
that the states which can be reached from the equilibrium point driven by input can
achieve reconvergence.
Definition 7
([
84
])
.
An
n
-stage autonomous NFSR is globally stable to the equilibrium state 0
(
δ2n
2n
), if for any state
XFn
2
(
x2n
), there exists an integer
N>
0, such that
FN(X) =
0
(LNx=δ2n
2n).
Mathematics 2022,10, 3538 9 of 14
Definition 8
([
85
])
.
An
n
-stage NFSR with input is driven stable to the equilibrium state 0(state
δ2n
2n
), if for every state
X
(state
x
) that can be reached from 0(
δ2n
2n
) by driving the NFSR with an
input sequence, there exists a positive integer
N
such that
FN(X) =
0(
LNx=δ2n
2n
), where
F
and
L
are the state transition function and state transition matrix of the corresponding autonomous
NFSR.
The stability of NFSRs can be evaluated by iteration of the state transition matrix
L
via
STP [84].
Theorem 1
([
84
])
.
An
n
-stage Fibonacci NFSR (5) is globally stable if and only if there exists a
positive integer N 62n1such that each column of the matrix LNis equal to δ2n
2n.
In addition to this, there are several works that studied the stability in special cases
based on STP. Gao et al. [
78
] researched the stability of NFSRs with periodic input, including
limited length and unlimited length. Lu and his team [
87
] focused on the stability in the case
where NFSR is monotonous, which is called reliable NFSR. Their method for constructing
reliable FSRs indicated that the number of reliable FSRs is
22n4
Φ(n)(n>
5
)
times of that
constructed by the previous method. The methods given in [
91
,
92
] can be applied to
multi-valued NFSRs, and can construct stable NFSRs. Furthermore, the literature [
93
,
95
]
addressed the stability issues of (n,k)NFSR and Grain-like cascade NFSRs, respectively.
As for the driven stability, the researchers found that it is only necessary to examine
whether the state that the equilibrium point can reach can achieve reconvergence, which
is also the origin of the driven stability [
104
]. We can turn the driven stability question
into whether the reachable set of the equilibrium point is a subset of the basin [
85
] pro-
vided algorithms for finding the reachable set and the basin using STP, which reduces the
computational complexity of the previous algorithms.
For the convenience of readers, the relevant results are presented in Table 2in the
order of the year of publication of the literature. These results are helpful to the theoretical
analysis of NFSRs, and have reference significance for the design of decoding algorithm.
Table 2. The existing results on stability of NFSRs based on STP.
Year Literature Innovation Points Object
2016 [84] NFSRs, iteration method shown in Theorem 1stability
2016 [85] NFSRs, reduce the computational complexity driven stability
2017 [93](n,k)NFSRs stability
2018 [78] NFSRs with periodic input stability
2019 [91,92] multi-valued NFSRs, construct stable NFSRs stability
2020 [95] Grain-like cascade NFSRs stability
2021 [87] monotonous FSRs, construct reliable FSRs stability
3.3.3. Observability
Observability is a fundamental property in control theory which can ensure that any
two distinct initial states can be uniquely determined by their outputs. That is, starting
from two distinct initial states, the NFSR does not produce two identical outputs.
Definition 9.
(1) ([
105
]) Two initial states
x06=x0
02n
are said to be indistinguishable, if their
corresponding output sequences are equal. Otherwise, the two distinct initial states are said to
be distinguishable.
(2) An NFSR is said to be observable if every two distinct initial states are distinguishable.
In [
76
] the authors investigated the equivalence transformation between Galois NFSRs
and Fibonacci NFSRs based on observability matrix based on STP. According to the defini-
tion of observability of sequence generators, the NFSR-based stream ciphers should avoid
unobservable Galois NFSRs from the security viewpoint and select observable ones. In [
90
],
the authors studied the observability of binary Galois NFSRs using a new observability
Mathematics 2022,10, 3538 10 of 14
matrix which is constructed by putting the output sequences generated by the initial states
on the same branch and its concatenated cycles into a block via STP. Further, [
97
] researched
the observability of multi-value Galois NFSRs and gave the relevant criterion using the
state pair table method and the matrix method, respectively.
Theorem 2
([
90
])
.
Let
Nk
be the number of distinct columns of the observability matrix
Ok
of
an
n
-stage Galois NFSR (8). Then (8) is observable if and only if
Nk+1 Nk>
1for all positive
integer k satisfying Nk<2n.
4. Summary and Prospect of NFSRs
With the help of STP, NFSR research is getting ever more complete and comprehensive,
and the results on theoretical problems have significant reference value for the design
of stream cipher algorithms and decoding algorithms. However, there are still many
unresolved theoretical issues.
(1) Reduce the computational complexity. Using STP to process these actual network
models, the more network nodes, the higher the dimension of the system and the higher
the computational performance requirements of the computer. How to reduce the computa-
tional complexity of the system is a big challenge in theoretical research of NFSR. At present,
there are some methods to reduce computational complexity: approximation method [
106
],
network aggregation method [
107
], logic matrix decomposition [
108
], pinning control [
109
],
model order reduction [
110
] and block decoupling [
111
], etc. Based on these methods,
it is a future research direction to continue to explore more effective methods to reduce
computational complexity.
(2) The existing related research is not perfect, and many issues have no exact result yet,
such as the study of observability and driven stability in multi-valued NFSRs, the modeling
of Trivium-like cascade NFSR and study of its related properties, the maximum and
minimum period problems in multi-valued NFSRs. In addition, there are very few studies
on non-autonomous NFSR, which can also provide a very valuable research idea to improve
related research.
(3) Explore more comprehensive theoretical issues of NFSRs, and provide theoretical
support for the design of stream cipher algorithms and decoding algorithms. Thanks
to the STP as a tool, many indicators can be easily studied. In addition to nonsingular-
ity, observability, and stability, whether there are more indicators that can characterize
the performance and security strength of NFSRs can also be used as follow-up research
directions.
(4) Based on the above theoretical analysis, it is the ultimate goal to give more effective
stream cipher algorithms with higher security.
This paper reviews and summarizes the most recent developments in NFSR based on
STP at this stage. The combination of STP and NFSR is still slowly maturing, and there are
still a lot of problems to be solved. We believe this paper can provide researchers interested
in STP and NFSR with a thinking direction.
Author Contributions:
Conceptualization, Z.G. and J.-e.F.; methodology, Z.G.; validation, Z.G.;
formal analysis, Z.G.; investigation, Z.G.; resources, Z.G.; writing—original draft preparation, Z.G.;
writing—review and editing, Z.G..; visualization, Z.G.; supervision, J.-e.F.; project administration,
J.-e.F.; funding acquisition, J.-e.F. All authors have read and agreed to the published version of
the manuscript.
Funding:
This document is the results of the research project funded by the National Natural Science
Foundation (NNSF) of China under Grant 61877036.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
Mathematics 2022,10, 3538 11 of 14
References
1.
Meier, W.; Staffelbach, O. Fast correlation attacks on certain stream ciphers. J. Cryptol.
1989
,1, 159–176. https://doi.org/10.1007/
BF02252874.
2.
Morrissey, T. Analysis of decoders for convolutional codes by stochastic sequential machine methods. IEEE Trans. Inf. Theory
1970,16, 460–469. https://doi.org/10.1109/TIT.1970.1054499.
3.
Hellebrand, S.; Rajski, J.; Tarnick, S.; Venkataraman, S.; Courtois, B. Built-in test for circuits with scan based on reseeding of
multiple-polynomial linear feedback shift registers. IEEE Trans. Comput. 1995,44, 223–233. https://doi.org/10.1109/12.364534.
4. Solomon, G.W. Shift Register Sequence; Holden-Day: Laguna Hills, CA, USA, 1967.
5.
Hell, M.; Johansson, T.; Meier, W. Grain: A stream cipher for constrained environments. In eSTREAM, ECRYPT Stream Cipher
Project; Report 2005/010; Inderscience Enterprises Ltd.: Geneva, Switzerland, 2005. https://doi.org/10.1504/IJWMC.2007.013798.
6.
Cannière, D.C.; Preneel, B. Trivium specifications. In eSTREAM, ECRYPT Stream Cipher Project; Report 2005/030; Inderscience
Enterprises Ltd.: Geneva, Switzerland, 2005.
7.
Babbage, S.; Dodd, M. The stream cipher MICKEY(version 1). In eSTREAM, ECRYPT Stream Cipher Project; Report 2005/015;
Inderscience Enterprises Ltd.: Geneva, Switzerland, 2005.
8. Massey, J. Threshold Decoding; The MIT Press: Cambridge, MA, USA, 1963.
9.
Massey, J. Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory
1969
,15, 122–127. https://doi.org/10.1109/TIT.19
69.1054260.
10.
Wang, X.; Tian, T.; Qi, W. A generic method for investigating nonsingular Galois NFSRs. Des. Codes Cryptogr.
2022
,77, 387–408.
https://doi.org/10.1007/s10623-021-00982-5.
11.
Wang, X.; Tian, T.; Qi, W. A necessary and sufficient condition for a class of nonsingular Galois NFSRs. Finite Fields Their Appl.
2022,77, 101952. https://doi.org/10.1016/j.ffa.2021.101952.
12.
Pan, Y.; Zhong, J.; Lin, D. On Galois NFSRs with terminal bits. In Proceedings of the 2021 IEEE International Symposium on
Information Theory (ISIT), Melbourne, Australia, 12–20 July 2021; pp. 3062–3067. https://doi.org/10.1109/ISIT45174.2021.9517
929.
13. Jiang, Y. Weak Grain-like structures. IEEE Trans. Inf. Theory 2020,66, 7717–7723. https://doi.org/10.1109/TIT.2020.3019839.
14.
Zhang, J.; Tian, T.; Qi, W.; Zheng, Q. A new method for finding affine sub-families of NFSR sequences. IEEE Trans. Inf. Theory
2019,65, 1249–1257. https://doi.org/10.1109/TIT.2018.2858769.
15.
Simpson, L.; Boztas, S. State cycles, initialization and the Trivium stream cipher. Des. Codes Cryptogr.
2012
,4, 245–258.
https://doi.org/10.1007/s12095-012-0066-6.
16.
Zhang, S.; Chen, G. New results on the state cycles of Trivium. Des. Codes Cryptogr.
2019
,87, 149–162. https://doi.org/10.1007/
s10623-018-0493-2.
17.
Deepthi, P.P.; Sathidevi, P.S. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash
functions. Comput. Secur. 2009,28, 229–241. https://doi.org/10.1016/j.cose.2008.11.006.
18. Tian, Y.; Chen, G.; Li, J. Quavium - A new stream cipher inspired by Trivium. J. Comput. 2012,7, 1278–1283.
19.
Armknecht, F.; Mikhalev, V. On lightweight stream ciphers with shorter internal states. In Proceedings of the Fast Software
Encryption; Springer: Berlin/Heidelberg, Germany, 2015; pp. 451–470. https://doi.org/10.1007/978-3-662-48116-5_22.
20.
Hamann, M.; Krause, M.; Meier, W. LIZARD - A lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric
Cryptol. 2017,3, 45–79. https://doi.org/10.13154/tosc.v2017.i1.45-79.
21.
Mikhalev, V.; Armknecht, F.; Müller, C. On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol.
2017.https://doi.org/10.13154/tosc.v2016.i2.52-79.
22.
Aumasson, J.P.; Dinur, I.; Meier, W.; Shamir, A. Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In
Proceedings of the Fast Software Encryption; Springer: Berlin/Heidelberg, Germany, 2009. https://doi.org/10.1007/978-3-642-
03317-9_1.
23.
Hu, Y.; Gao, J.; Liu, Q.; Zhang, Y. Fault analysis of Trivium. Des. Codes Cryptogr.
2012
,62, 289–311. https://doi.org/10.1007/s106
23-011-9518-9.
24.
Zhang, J.; Qi, W.; Tian, T.; Wang, Z. Further results on the decomposition of an NFSR into the cascade connection of an NFSR into
an LFSR. IEEE Trans. Inf. Theory 2015,61, 645–654. https://doi.org/10.1109/TIT.2014.2371542.
25.
Dubrova, E. A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory
2009
,55, 5263–5271. https:
//doi.org/10.1109/TIT.2009.2030467.
26.
Ma, Z.; Qi, W.; Tian, T. On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex.
2013
,
29, 173–181. https://doi.org/10.1016/j.jco.2012.09.003.
27.
Wang, H.; Zheng, Q.; Wang, Z.; Zhao, X.; Qi, W. A new result on irreducible NFSRs with respect to cascade connection. Finite
Fields Their Appl. 2021,73, 101859. https://doi.org/10.1016/j.ffa.2021.101859.
28.
Tian, T.; Qi, W. On the density of irreducible NFSRs. IEEE Trans. Inf. Theory
2013
,59, 4006–4012. https://doi.org/10.1109/TIT.20
13.2247093.
29.
Jiang, Y.; Lin, D. On affine sub-families of Grain-like structures. Des. Codes Cryptogr.
2017
,82, 531–542. https://doi.org/10.1007/
s10623-016-0178-7.
30.
Li, C.; Xie, D. Criterion for the nonsingularity of feedback shift registers. J. Electron. Inf. Technol.
1995
,17, 500–505. https:
//doi.org/10.1007/s10614-006-9021-y.
Mathematics 2022,10, 3538 12 of 14
31.
Gary, M.L. Permutation polynomials and nonsingular feedback shift registers over finite fields. IEEE Trans. Inf. Theory
1989
,
35, 900–902. https://doi.org/10.1109/18.32171.
32.
Liang, W.; Xu, Y.; Zeng, X. The periods of a class of nonlinear feedback shift register sequences. Chin. J. Electron.
2016
,25, 8.
https://doi.org/10.1049/cje.2016.03.016.
33.
Yang, Y.; Zeng, X.; Xu, Y. Periods on the cascade connection of an LFSR and an NFSR. Chin. J. Electron.
2019
,28, 301–308.
https://doi.org/10.1049/cje.2019.01.018.
34.
Zheng, Q.; Zhao, X.; Feng, X. Grain-like structures with minimal and maximal period sequences. Des. Codes Cryptogr.
2021
,
89, 679–693. https://doi.org/10.1007/s10623-020-00839-3.
35.
Zhou, L.; Tian, T.; Qi, W.; Wang, Z. Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR.
Finite Fields Their Appl. 2019,60, 101574. https://doi.org/10.1016/j.ffa.2019.101574.
36.
Yang, B.; Mandal, K.; Aagaard, M.D.; Gong, G. Efficient composited de Bruijn sequence generators. IEEE Trans. Comput.
2017
,
66, 1354–1368. https://doi.org/10.1109/TC.2017.2676763.
37.
Sawada, J.; Williams, A.; Wong, D. A surprisingly simple de Bruijn sequence construction. Discret. Math.
2016
,339, 127–131.
https://doi.org/10.1016/j.disc.2015.08.002.
38.
Li, M.; Lin, D. De Bruijn sequences, adjacency graphs, and cyclotomy. IEEE Trans. Inf. Theory
2018
,64, 2941–2952. https:
//doi.org/10.1109/TIT.2017.2787742.
39. Cheng, D.; Qi, H.; Li, Z. Analysis and Control of Boolean Networks; Springer-Verlag: London, UK, 2011.
40.
Cheng, D.; Qi, H.; Zhao, Y. An Introduction to Semi-Tensor Product of Matrices and Its Applications; World Scientific: Singapore, 2012.
41.
Zhao, Y.; Kim, J.; Filippone, M. Aggregation algorithm towards large-scale Boolean network analysis. IEEE Trans. Autom. Control
2013,58, 1976–1985. https://doi.org/10.1109/TAC.2013.2251819.
42.
Li, R.; Yang, M.; Chu, T. State feedback stabilization for Boolean control networks. IEEE Trans. Autom. Control
2013
,58, 1853–1857.
https://doi.org/10.1109/TAC.2013.2238092.
43.
Li, H.; Wang, Y. Output feedback stabilization control design for Boolean control networks. Automatica
2013
,49, 3641–3645.
https://doi.org/10.1016/j.automatica.2013.09.023.
44.
Gao, B.; Li, L.; Peng, H.; Kurths, J.; Zhang, W.; Yang, Y. Principle for performing attractor transits with single control in Boolean
networks. Phys. Rev. E 2013,88, 062706. https://doi.org/10.1103/PhysRevE.88.062706.
45.
Lu, J.; Zhong, J.; Huang, C.; Cao, J. On pinning controllability of Boolean control networks. IEEE Trans. Autom. Control
2016
,
61, 1658–1663. https://doi.org/10.1109/TAC.2015.2478123.
46.
Zheng, Y.; Feng, J. Output tracking of delayed logical control networks with multi-constraint. Front. Inf. Technol. Electron. Eng.
2020,21, 316–323. https://doi.org/10.1631/FITEE.1900376.
47.
Zhang, Q.; Wang, B.; Feng, J. Solution and stability of continuous-time cross-dimensional linear systems. Front. Inf. Technol.
Electron. Eng. 2021,22, 210–221. https://doi.org/10.1631/FITEE.1900504.
48.
Guo, P.; Wang, Y.; Li, H. Algebraic formulation and strategy optimization for a class of evolutionary networked games via
semi-tensor product method. Automatica 2013,49, 3384–3389. https://doi.org/10.1016/j.automatica.2013.08.008.
49. Cheng, D. On finite potential games. Automatica 2014,50, 1793–1801. https://doi.org/10.1016/j.automatica.2014.05.005.
50.
Cheng, D.; He, F.; Qi, H.; Xu, T. Modeling, analysis and control of networked evolutionary games. IEEE Trans. Autom. Control
2015,60, 2402–2415. https://doi.org/10.1109/TAC.2015.2404471.
51.
Wang, Y.; Zheng, C.; Liu, Z. A matrix approach to graph maximum stable set and coloring problems with application to
multi-agent systems. Automatica 2012,48, 1227–1236. https://doi.org/10.1016/j.automatica.2012.03.024.
52.
Li, R.; Chu, T. Complete synchronization of Boolean networks. IEEE Trans. Neural Networks Learn. Syst.
2012
,23, 840–846.
https://doi.org/10.1109/TNNLS.2012.2190094.
53.
Xu, X.; Hong, Y. Observability analysis and observer design for finite automata via matrix approach. IET Control Theory Appl.
2013,7, 1609–1615. https://doi.org/10.1049/iet-cta.2013.0096.
54.
Yan, Y.; Chen, Z.; Liu, Z. Semi-tensor product approach to controllability and stabilizability of finite automata. J. Syst. Eng.
Electron. 2015,26, 134–141. https://doi.org/1011O9/JSEE.2015.00018.
55.
Zhang, K.; Zhang, L. Observability of Boolean control networks: A unified approach based on finite automata. IEEE Trans.
Autom. Control 2016,61, 2733–2738. https://doi.org/10.1109/TAC.2015.2501365.
56.
Wang, B.; Feng, J.; Meng, M. Matrix approach to model matching of composite asynchronous sequential machines. IET Control
Theory Appl. 2017,11, 2122–2130. https://doi.org/10.1049/iet-cta.2016.1651.
57.
Gao, Z.; Wang, B.; Feng, J.; Li, T. Finite automata approach to reconstructibility of switched Boolean control networks. Neurocom-
puting 2021,454, 34–44. https://doi.org/10.1016/j.neucom.2021.05.019.
58.
Li, H.; Wang, Y. Boolean derivative calculation with application to fault detection of combinational circuits via the semi-tensor
product method. Automatica 2012,48, 688–693. https://doi.org/10.1016/j.automatica.2012.01.021.
59.
Ouyang, C.; Jiang, J. Reliability estimation of sequential circuit based on probabilistic transfer matrices. Acta Electron. Sin.
2013
,
41, 171–177. https://doi.org/10.3969/j.issn.0372-2112.2013.01.30.
60.
Chen, Y.; Xi, N.; Miao, L.; Li, H.; Wang, Y. Applications of the semi-tensor product to the Internet-based tele-operation systems.
Robot 2012,34, 50–55. https://doi.org/10.3724/SP.J.1218.2012.00050.
Mathematics 2022,10, 3538 13 of 14
61.
Wu, Y.; Shen, T. A logical dynamical systems approach to modeling and control of residual gas fraction in IC engines. In IFAC
Proceedings Volumes, Proceedings of the 7th IFAC Symposium on Advances in Automotive Control, Tokyo, Japan, 4–7 September 2013;
Elsevier B.V.: Amsterdam, The Netherlands, 2013; Volume 46, pp. 495–500. https://doi.org/10.3182/20130904-4- JP-2042.00155.
62.
Kabir, M.H.; Hoque, M.R.; Seo, H.; Yang, S.H. Boolean control network based modeling for context-aware system in smart home.
Int. J. Smart Home 2016,10, 65–76. https://doi.org/10.14257/ijsh.2016.10.4.07.
63.
Li, H.; Zhao, G.; Meng, M.; Feng, J. A survey on applications of semi-tensor product method in engineering. Sci. China Inf. Sci.
2017,61, 1–17. https://doi.org/10.1007/s11432-017-9238-1.
64. Guo, L. Comments on “Semi-tensor product of matrices-A convenient new tool". Chin. Sci. Bull. 2011,56, 2662–2663.
65.
Zhao, D.; Peng, H.; Li, L.; Hui, S.; Yang, Y. Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci.
2014
,
57, 1–14. https://doi.org/10.1007/s11432-013-5058-4.
66.
Zhong, J.; Lin, D. A new linearization method for nonlinear feedback shift registers. J. Comput. Syst. Sci.
2015
,81, 783–796.
https://doi.org/10.1016/j.jcss.2014.12.030.
67.
Wang, H.; Zhong, J.; Lin, D. Linearization of multi-valued nonlinear feedback shift registers. J. Syst. Sci. Complex.
2017
,
30, 494–509. https://doi.org/10.1007/s11424-016-5156-7.
68.
Zhong, J.; Lin, D. On minimum period of nonlinear feedback shift registers in Grain-like structure. IEEE Trans. Inf. Theory
2018
,
64, 6429–6442. https://doi.org/10.1109/TIT.2018.2849392.
69.
Zhong, J.; Lin, D. On equivalence of cascade connections of two nonlinear feedback shift registers. Comput. J.
2019
,62, 1793–1804.
https://doi.org/10.1093/comjnl/bxz057.
70.
Zhong, J.; Lin, D. Decomposition of nonlinear feedback shift registers based on Boolean networks. Sci. China Inf. Sci.
2019
,62, 1–3.
https://doi.org/10.1007/s11432-017-9460-4.
71.
Zhong, J.; Lin, D. On maximum length nonlinear feedback shift registers using a Boolean network approach. In Proceedings of
the Proceedings of the 33rd Chinese Control Conference, Nanjing, China, 28–30 July 2014; pp. 2502–2507. https://doi.org/10.110
9/ChiCC.2014.6897028.
72.
Lu, J.; Li, M.; Huang, T.; Liu, Y.; Cao, J. The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor
product of matrices. Automatica 2018,96, 393–397. https://doi.org/10.1016/j.automatica.2018.07.011.
73.
Kong, W.; Zhong, J.; Lin, D. Isomorphism and equivalence of Galois nonlinear feedback shift registers. In Proceedings of
the Inscrypt 2021: Information Security and Cryptology; Springer: Berlin/Heidelberg, Germany, 2021, pp. 301–315. https:
//doi.org/10.1007/978-3-030-88323-2_16.
74.
Zhong, J.; Pan, Y.; Lin, D. On Galois NFSRs equivalent to Fibonacci ones. In Proceedings of the Information Security and
Cryptology; Springer: Berlin/Heidelberg, Germany, 2021, pp. 433–449. https://doi.org/10.1007/978-3-030-71852-7_29.
75.
Zhong, J.; Pan, Y.; Kong, W.; Lin, D. Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones
and Their Application to the Stream Cipher Trivium. Cryptology ePrint Archive, Paper 2021/928. 2021. Available online:
https://eprint.iacr.org/2021/928 (accessed on 28 June 2022).
76.
Zhao, X.; Wang, B.; Yan, Y.; Feng, J. The equivalence transformation between Galois NFSRs and Fibonacci NFSRs. Asian J. Control
2020,23, 2865–2873. https://doi.org/10.1002/asjc.2390.
77.
Zhao, X. Research on nonlinear feedback shift register via semi-tensor product. Master ’s Thesis, Shandong University, Jinan,
China, 2021. https://doi.org/10.27272/d.cnki.gshdu.2021.003534.
78.
Gao, B.; Liu, X.; Lan, Z.; Fu, R. A novel method for reconstructing period with single input in NFSR. Chaos Solitons Fractals
2018
,
109, 36–40. https://doi.org/10.1016/j.chaos.2018.01.012.
79.
Zhao, X.; Wang, B.; Zhu, S.; Feng, J. On degeneracy problem of NFSRs via semi-tensor product. In Proceedings of the 2020 39th
Chinese Control Conference (CCC), Shenyang, China, 27–29 July 2020; pp. 146–151. https://doi.org/10.23919/CCC50068.2020.91
89105.
80.
Li, B.; Zhu, S.; Li, J. Improved transformation between Fibonacci FSRs and Galois FSRs based on semi-tensor product. J. Frankl.
Inst. 2022,359, 224–239. https://doi.org/10.1016/j.jfranklin.2021.04.019.
81.
Li, B. Boolean-Network-Based Analysis and Synthesis of Pseudo-Random Sequence Generators. Ph.D. Thesis, Southeast
University, Nanjing, China, 2022. https://doi.org/10.27014/d.cnki.gdnau.2021.000065.
82.
Liu, Z.; Wang, Y.; Cheng, D. Nonsingularity of feedback shift registers. Automatica
2015
,55, 247–253. https://doi.org/10.1016/j.
automatica.2015.03.014.
83.
Liu, Z. Control and Application of Mix-Valued Logical Networks via the Semi-Tensor Product Method. Ph.D. Thesis, Shandong
University, Jinan, China, 2014.
84.
Zhong, J.; Lin, D. Stability of nonlinear feedback shift registers. Sci. China Inf. Sci.
2016
,59, 197–208. https://doi.org/10.1007/s1
1432-015-5311-0.
85.
Zhong, J.; Lin, D. Driven stability of nonlinear feedback shift registers with inputs. IEEE Trans. Commun.
2016
,64, 2274–2284.
https://doi.org/10.1109/TCOMM.2016.2557330.
86. Lu, J.; Li, M.; Liu, Y.; Ho, D.W.; Kurths, J. Nonsingularity of Grain-like cascade FSRs via semi-tensor product. Sci. China Inf. Sci.
2018,61, 010204. https://doi.org/10.1007/s11432-017-9269-6.
87.
Lu, J.; Li, B.; Zhong, J. A novel synthesis method for reliable feedback shift registers via Boolean networks. Sci. China Inf. Sci.
2021,64, 1–14. https://doi.org/10.1007/s11432-020-2981-4.
Mathematics 2022,10, 3538 14 of 14
88. Gao, B.; Liu, X.; Wu, X.; Li, S.; Lan, Z.; Lu, H.; Liu, B. Stability of nonlinear feedback shift registers with periodic input. Comput.
Mater. Contin. 2020,62, 833–847. https://doi.org/10.32604/cmc.2020.06702.
89.
Gao, B. Research on Encryption Algorithm Based on Semi-Tensor Product. Ph.D. Thesis, Beijing Jiaotong University, Beijing,
China, 2014.
90.
Kong, W.; Zhong, J.; Lin, D. Observability of Galois nonlinear feedback shift registers. Sci. China Inf. Sci.
2021
.https:
//doi.org/10.1007/s11432-021-3346-6.
91.
Wang, H.; Zhong, J.; Lin, D. Stability of multi-valued nonlinear feedback shift registers. In Proceedings of the 2016 IEEE
International Conference on Information and Automation (ICIA), Ningbo, China, 1–3 August 2016; pp. 1764–1769. https:
//doi.org/10.1109/ICInfA.2016.7832103.
92.
Wang, H.; Lin, Q.; Chen, J.; Li, J.; Zhong, J.; Lin, D.; Wang, J.; Ma, L. On stability of multi-valued nonlinear feedback shift registers.
Complexity 2019,2019, 1–11. https://doi.org/10.1155/2019/8765970.
93.
Li, M.; Lu, J.; Zhong, J. Stability of (n,k) nonlinear feedback shift registers. In Proceedings of the 2017 13th IEEE Conference on
Automation Science and Engineering (CASE), Xi’an, China, 20–23 August 2017; pp. 166–170. https://doi.org/10.1109/COASE.
2017.8256097.
94.
Li, M. Research on Several Nonlinear Feedback Shift Registers Based on Semi-Tensor Product of Matrix. Master ’s Thesis,
Southeast University, Nanjing, China, 2018.
95.
Ren, B.; Liu, Y.; Lu, J.; Cao, J. A novel analysis method for Grain-like cascade FSRs. In Proceedings of the 2020 12th
International Conference on Advanced Computational Intelligence (ICACI), Dali, China, 14–16 August 2020; pp. 597–601.
https://doi.org/10.1109/ICACI49185.2020.9177497.
96.
Ren, B. Analysis of Grain-Like Cascade Feedback Shift Registers. Master’s Thesis, Zhejiang Normal University, Jinhua, China,
2020. https://doi.org/10.27464/d.cnki.gzsfu.2020.000453.
97.
Gao, Z.; Feng, J.; Yu, Y.; Cui, Y. On observability of Galois NFSRs over finite fields. Front. Inf. Technol. Electron. Eng.
2022
, 1–13.
https://doi.org/10.1631/FITEE.2200228.
98.
Roger, A.; Johnson, C.R. Topics in Matrix Analysis; Cambridge University Press: Cambridege, UK, 1991. https://doi.org/10.1017/
CBO9780511840371.
99. Ljung, L.; Söderström, T. Theory and Practice of Recursive Identification; MIT Press: Cambridge, MA, USA, 1983.
100.
Dubrova, E.; Hell, M. Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun.
2017
,9, 273–289.
https://doi.org/10.1007/s12095-015-0173-2.
101.
Dubrova, E. Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations. IEEE Trans. Inf.
Theory 2010,56, 2961–2966. https://doi.org/10.1109/TIT.2010.2046250.
102.
Hu, H.; Gong, G. Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. Int. J. Found.
Comput. Sci. 2011,22, 1317–1329. https://doi.org/10.1142/S0129054111008738.
103. Lai, X. Condition for the nonsingularity of a feedback shift-register over a general finite field (Corresp.). IEEE Trans. Inf. Theory
1987,33, 747–749. https://doi.org/10.1109/TIT.1987.1057338.
104.
Massey, J.; Liu, R. Application of Lyapunov’s direct method to the error-propagation effect in convolutional codes (Corresp.).
IEEE Trans. Inf. Theory 1964,10, 248–250. https://doi.org/10.1109/TIT.1964.1053678.
105.
Fornasini, E.; Valcher, M.E. Observability, reconstructibility and state observers of Boolean control networks. IEEE Trans. Autom.
Control 2013,58, 1390–1401. https://doi.org/10.1109/TAC.2012.2231592.
106.
Cheng, D.; Zhao, Y.; Kim, J.; Zhao, Y. Approximation of Boolean networks. In Proceedings of the 10th World Congress on
Intelligent Control and Automation, Beijing, China, 6–8 July 2012; pp. 2280–2285. https://doi.org/10.1109/WCICA.2012.6358254.
107.
Zhao, Y.; Ghosh, B.K.; Cheng, D. Control of large-scale Boolean networks via network aggregation. IEEE Trans. Neural Networks
Learn. Syst. 2016,27, 1527–1536. https://doi.org/10.1109/TNNLS.2015.2442593.
108.
Li, H.; Wang, Y. Logical matrix factorization with application to topological structure analysis of Boolean network. IEEE Trans.
Autom. Control 2015,60, 1380–1385. https://doi.org/10.1109/TAC.2014.2348216.
109.
Zhong, J.; Ho, D.W.C.; Lu, J. A new approach to pinning control of Boolean networks. IEEE Trans. Control Netw. Syst.
2022
,
9, 415–426. https://doi.org/10.1109/TCNS.2021.3106453.
110.
Meng, M.; Lam, J.; Feng, J.; Li, X.
l1
-gain analysis and model reduction problem for Boolean control networks. Inf. Sci.
2016
,
348, 68–83. https://doi.org/10.1016/j.ins.2016.02.010.
111.
Yu, Y.; Feng, J.; Pan, J.; Cheng, D. Block decoupling of Boolean control networks. IEEE Trans. Autom. Control
2019
,64, 3129–3140.
https://doi.org/10.1109/TAC.2018.2880411.
... Different from DT-MCs, as clarified in the work [8], CT-MCs are always assumed to be homogenous and continuous in the stochastic sense, so that the transition rate matrix (TRM) is set as an invariant parameter and induces a linear ordinary differential equation subject to the TPM. Similarly, the counterpart of CT-MCs involving the external control inputs are termed the continuous-time controlled Markov chains (CT-CMCs) and have been applied to characterize mathematical models, ranging from logical control networks [22]- [24], nonlinear shift register [25], finite-field networks [26], multiagent systems [27], [28], finite automata [29], [30], and to Petri-nets [31], [32]. ...
... It indicates the reachability among all quotients in (25). ...
Article
In this paper, the scale reduction problem of continuous-time Markov chains (CT-MCs) and continuous-time controlled Markov chains (CT-CMCs) are disserted both from the bisimulation perspective. Based on the features of bisimulation, the reachability, macro-controllability, controllability, and stabilizability of CT-MCs and CT-CMCs, particularly, the large-scale ones, are addressed over the corresponding reduced chains. The bisimulation relations are defined for both CT-MCs and CT-CMCs to establish the equivalence between the original networks and their condensed networks. A computable algorithm is developed to compute the reachability-based maximal bisimulation relation for CMCs, resulting in the smallest bisimulating CMCs. Notably, one advantage of our techniques lies in their efficiency in implementing the existing analysis and control results on MCs and CMCs in a lower amount of time, with wide applications to logical networks, finite-field networks, finite automata, and Petri nets. Compared to their discrete-time counterparts, CT-MCs and CT-CMCs inherit a simplified essential network topology in the discrete-time structures while providing a quantitative description of transient functional kinetics on the micro-time scale level. Besides, all the developed theoretical results for CT-MCs and CT-CMCs are operated based on the transition rate matrices of chains rather than transition probability matrices used in the traditional methods. Finally, the derived theoretical results are validated by investigating the p53-Mdm2 signaling network and a relevant case-study involving a set of randomly generated CT-CMCs.
... A lot of interesting results have been derived, such as synchronization [5], observability [6,7], stabilization [8,9] and so on [10]. In addition, the semi-tensor product method is extensively used in game theory [11], fuzzy control [12], shift register [13] and so on. ...
Article
Full-text available
This paper studies the robust stabilization of impulsive Boolean control networks (IBCNs) with function perturbation. A Boolean control network (BCN) with a state-dependent impulsive sequence is converted to an equivalent BCN by the semi-tensor product method. Based on the equivalence of stabilization between the IBCN and the corresponding BCN, several criteria are proposed for the robust stabilization of IBCNs. Furthermore, when the IBCN is not robustly stabilizable after the function perturbation, an algorithm is presented to modify the control or the impulse-triggered set. Finally, an example is given to verify the obtained results.
Article
This brief aims to introduce the concept of robust control from continuous-state systems to the field of finite state machines (FSMs). It expands on the concept of observability by proposing current state observability and current state set observability for FSMs. The concept of robust controllability is introduced for FSMs, including robust controllability between states and robust controllability between states and state sets. An existence condition for robust controllers of FSMs is established. Consequently, a robust controller is designed to enable FSMs with uncertainty to possess robust controllability, ensuring that FSMs exhibit the desired state evolution behavior under uncertain disturbances. Unlike the robust control of continuous-state systems, the built robust control systems of FSMs use reference states that represent the desired state transitions as the reference inputs of the closed-loop systems. Additionally, a brief discussion is conducted on how to further investigate robust control problems of FSMs within the STP framework. Note to Practitioners —The motivation of this paper is to address the control of uncertainty in Finite State Machines (FSMs), but it also has significant implications for other logic dynamic systems, such as Boolean networks, game systems, and finite-value systems. Existing control methods for FSMs are typically based on supervised control, which limits control over system uncertainty. Drawing inspiration from robust control in continuous state systems (CSS), this paper presents a robust control approach for FSMs. This approach enables the application of robust control methods from CSS to control the uncertainty in FSMs. The usage of this approach closely resembles the well-known and widely utilized robust control methods employed in practical industrial domains involving CSS. Several new concepts, ideas, and methods are proposed in this paper, followed by the design of a corresponding controller. Numerical examples demonstrate the feasibility of this approach, although it has not been validated in actual industrial systems. Nevertheless, the findings can undoubtedly be applied to many industrial systems in theory, such as communication and networks, control systems, embedded systems, and natural language processing. In future research, we will explore the application of the proposed robust control for FSMs in specific real-world industrial systems.
Article
Full-text available
Let n be a positive integer. An n-stage Galois NFSR has n registers and each register is updated by a feedback function. Then a Galois NFSR is called nonsingular if every register generates (strictly) periodic sequences, i.e., no branch points. In this paper, a generic method for investigating nonsingular Galois NFSRs is provided. Two fundamental concepts that are standard Galois NFSRs and the simplified feedback function of a standard Galois NFSR are proposed. Based on the new concepts, a sufficient condition is given for nonsingular Galois NFSRs. In particular, for the class of Galois NFSRs with linear simplified feedback functions, a necessary and sufficient condition is presented.
Article
Observability ensures that any two distinct initial states can be uniquely determined by their outputs, so the stream ciphers can avoid unobservable nonlinear feedback shift registers (NFSRs) to prevent the occurrence of equivalent keys. This paper discusses the observability of Galois NFSRs over finite fields. Galois NFSRs are treated as logical networks using the semi-tensor product. The vector form of the state transition matrix is introduced, by which a necessary and sufficient condition is proposed, as well as an algorithm for determining the observability of general Galois NFSRs. Moreover, a new observability matrix is defined, which can derive a matrix method with lower computation complexity. Furthermore, the observability of two special types of Galois NFSRs, a full-length Galois NFSR and a nonsingular Galois NFSR, is investigated. Two methods are proposed to determine the observability of these two special types of NFSRs, and some numerical examples are provided to support these results.
Article
Nonlinear feedback shift registers (NFSRs) have been used in many recent stream ciphers. They are generally classified into Fibonacci NFSRs and Galois NFSRs according to their implementation configurations. An NFSR is observable if any two distinct initial states can be distinguished from their corresponding output sequences. From the security perspective, NFSR-based stream ciphers should select observable NFSRs; otherwise, they will be subject to weak key attacks. Any Fibonacci NFSR is observable as the first n bits of its output sequence is just its initial state, where n is the stage number of the Fibonacci NFSR. This paper considers the observability of Galois NFSRs. Some necessary and/or sufficient conditions are presented, using the semi-tensor product-based Boolean network theory. In particular, a new observability matrix is proposed to facilitate the observability determination.
Article
Let n be a positive integer. An n-stage Galois NFSR is nonsingular if and only if the output sequences of each bit register are purely periodic. It is well known that a Galois NFSR used to build a stream cipher should be nonsingular. Recently, a useful concept that is the simplified feedback function is proposed for a Galois NFSR, which is a vectorial Boolean function. Generally, for a Galois NFSR, its simplified feedback function has less nonlinear terms than its traditional feedback function, and so is easier to analyze. Moreover, it has been shown that the nonsingularity of a Galois NFSR is decided by the invertibility of its simplified feedback function. Based on this observation, in this paper, we present a necessary and sufficient condition for the nonsingularity of a class of Galois NFSRs such that every component of its simplified feedback is linear or has a common nonlinear term.
Chapter
Nonlinear feedback shift registers (NFSRs) have been used in many recent stream ciphers. They are generally classified as Fibonacci NFSRs and Galois NFSRs in terms of their implementation configurations. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and two NFSRs are equivalent if their sets of output sequences are equal. Equivalent NFSRs must be isomorphic NFSRs, but not the vice versa. Previous work has been done on the isomorphism and equivalence of Fibonacci NFSRs. This paper continues this research for Galois NFSRs. It first gives some characterizations for several kinds of isomorphic Galois NFSRs, which improves and generalizes the previous corresponding results for Fibonacci NFSRs. It then presents some characterizations for two kinds of equivalent Galois NFSRs, helpful to the design of NFSR-based stream ciphers.
Article
Boolean networks (BNs) are discrete-time systems, where nodes are interconnected (here, we call such connection rule among nodes as a network structure), and the dynamics of each gene node is determined by logical functions. In this article, we propose a new approach on pinning control design for global stabilization of BNs based on BNs’ network structure, named as network-structure-based distributed pinning control. Compared with the existing literature, the design of pinning control is not based on the state transition matrix of BNs. Hence, the computational complexity in this article is reduced from $O(2^{2n})$ to $O(n^2+n2^K)$ , where $n$ is the number of nodes and $K\leq n$ is the largest number of in-neighbors of nodes. In addition, without using the state transition matrix, global state information is no longer needed; the design of pinning control is just based on neighbors’ local information, which is easier to implement. The proposed method is well demonstrated by several biological networks with different sizes. The results are shown to be simple and concise, while the traditional pinning control cannot be applied for BNs with such a large dimension.
Article
This paper investigates the reconstructibility of switched Boolean control networks (SBCNs). Several new types of definition about reconstructibility are proposed where the existence and arbitrariness of the switching signal and the input sequence are inconsistent. A weighted pair graph describing all pairs of states which are indistinguished is defined. A deterministic finite automata method is applied into the reconstructibility analysis. Accordingly, several algorithms are designed to determine these types of reconstructibility. Moreover, for a given reconstructible SBCN, an algorithm for determining the current state is provided. Finally, an example is provided to demonstrate the effectiveness of the proposed algorithms and results.
Article
Feedback shift registers (FSRs), which have two configurations: Fibonacci and Galois, are a primitive building block in stream ciphers. In this paper, a transformation between Fibonacci FSRs and Galois FSRs is proposed based on semi-tensor product (STP) of matrices. It is verified that a weakly equivalent Galois FSR with fewer stages cannot be found for a Fibonacci FSR with n stages, not vice versa. Furthermore, for a given Fibonacci FSR with n stages, there are totally (2n−1)!2−1 weakly equivalent Galois FSRs. Additionally, an effective algorithm is developed to reduce the number of variables of the Galois FSRs while keeping it weakly equivalent to the given Fibonacci FSR. Finally, the feasibility of the proposed strategies is demonstrated by numerical examples.
Article
Nonlinear feedback shift registers (NFSRs) are widely used in stream cipher design as building blocks. The cascade connection of NFSRs, known as an important architecture, has been adopted in Grain family of stream ciphers. In this paper, a new sufficient condition under which an NFSR cannot be decomposed into the cascade connection of two smaller NFSRs is presented, which is easy to be verified from the algebraic normal form (ANF) of the characteristic function. In fact, our results are also applicable to nonsingular Boolean functions, which actually improve a previous research of Rhodes [6] where the characteristic functions of NFSRs cannot be contained.