Next Article in Journal
Identifying the Exact Value of the Metric Dimension and Edge Dimension of Unicyclic Graphs
Previous Article in Journal
Error Propagation Model Using Jacobian-Torsor Model Weighting for Assembly Quality Analysis on Complex Product
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product

School of Mathematics, Shandong University, Jinan 250100, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2022, 10(19), 3538; https://doi.org/10.3390/math10193538
Submission received: 3 September 2022 / Revised: 21 September 2022 / Accepted: 26 September 2022 / Published: 28 September 2022
(This article belongs to the Section Network Science)

Abstract

:
Nonlinear feedback shift registers (NFSRs) are the main components of stream ciphers and convolutional decoders. Recent years have seen an increase in the requirement for information security, which has sparked NFSR research. However, the NFSR study is very imperfect as a result of the lack of appropriate mathematical tools. Many scholars have discovered in recent years that the introduction of semi-tensor products (STP) of matrices can overcome this issue because STP can convert the NFSR into a quasi-linear form. As a result of STP, new NFSR research has emerged from a different angle. In view of this, in order to generalize the latest achievements of NFSRs based on STP and provide some directions for future development, the research results are summarized and sorted out, broadly including the modeling of NFSRs, the analysis of the structure of NFSRs, and the study of the properties of NFSRs.

1. Introduction

As the information age has progressed, the nation, society, and people have become more concerned with information security, and cryptography has emerged as a key tool for doing so. Symmetric and asymmetric cryptosystems are the two basic types of cryptography used today. Block ciphers and stream ciphers are examples of symmetric cryptosystems. Due to its benefits for quick encryption and decryption, easy hardware implementation, minimal error propagation, and simple application protocol, stream cipher is frequently employed in vital departments and various mobile communication systems for confidential communication. The feedback shift register (FSR) is a primary structural component of stream cipher.
FSR, as a finite state automaton that can be represented by difference equations of a set of Boolean functions, in addition to its application in stream ciphers, is also widely used in communication systems, digital circuits and other fields [1,2,3]. The research of FSRs has a history of more than 50 years. In 1967, the famous scholar Golomb [4] introduced the fundamental characteristics of FSRs and the generation mechanism of the shift sequences, and these two concepts serve as the foundation for FSR study today. Different from linear FSR (LFSR), nonlinear FSR (NFSR) has received more attention due to its higher level of security. In stream ciphers, NFSR, as a generator of pseudo-random sequences, has been researched by numerous scholars. Especially after the European eSTREAM project, many NFSR-based stream cipher algorithms emerged, such as the hardware finalists Grain [5], Trivium [6], and Mickey [7]. In convolutional codes, NFSR is the main building block of decoding algorithms such as threshold decoding [8,9]. In the threshold decoding algorithm, the syndrome sequence formed by the received information symbols and the received supervisory symbols is used as the input of the NFSR, and the output of the NFSR is used as the error estimation, so that the correct information symbols can be obtained.
Over the years, NFSRs have received extensive attention due to their wide range of application scenarios. According to the structure, NFSRs can be divided into Fibonacci NFSRs [10,11], Galois NFSRs [11,12], Grain-like cascade NFSRs [13,14], Trivium-like cascade NFSRs [15,16] and so on. According to whether there is input, NFSRs can be divided into autonomous NFSRs and non-autonomous NFSRs. According to the research problems, in addition to stream cipher algorithm designs [17,18,19,20,21] and attacks [22,23], the theoretical study can be summarized into three parts: (1) equivalence and decomposition [24,25,26], irreducible NFSRs [27,28] and affine sub-families [14,29]; (2) nonsingularity [10,30,31]; (3) period [32,33,34] and de Bruijn sequences [35,36,37,38] and so on. However, due to the lack of suitable mathematical means, the research on NFSR still has a long way to go.
In order to break the limitation of the dimension of the traditional matrix product, Cheng et al. [39,40] proposed a new matrix product—the semi-tensor product (STP), which allows the multiplication of two matrices of any dimension. There are numerous significant applications in this field, including the original Boolean network (BN) [41,42,43,44,45,46,47], game theory [48,49,50], multi-agent synchronization and queue control [51,52], finite automata [53,54,55,56,57], fault diagnosis and digital circuit design [58,59], and even network query and teleoperation [60], internal combustion engine [61], intelligent Home [62] and other engineering problems [63]. STP helps to solve many challenging issues in various fields. Professor Guo [64] of the Chinese Academy of Sciences gave a high evaluation of STP, saying that “the STP may become one of the new mathematical tools called for in the computer age to realize the purpose of discovering new phenomena and solving new problems based on calculation”.
Fortunately, in recent years, many scholars have discovered that STP can also be used to model and study NFSRs fairly efficiently. Because NFSRs and BNs are both composed of finite Boolean functions and finite states, this motivates many scholars to use STP to model NFSR into a quasi-linear form similar to BN, and this quasi-linear form will help to simplify many research problems. From this idea, many significant results were born. These results are more novel than previous conclusions and are very helpful for the design of practical stream cipher algorithms and decoding algorithms. According to the specific research object, the main achievements can be roughly divided into the modeling of NFSRs [65,66,67], the analysis of the structure of NFSRs [68,69,70,71,72,73,74,75,76,77,78,79,80,81], and the study of the properties of NFSRs [82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97]. This paper will give an overview of the latest achievements in NFSR research based on STP from these three aspects.
The content of this paper is organized as follows: First, the definition and properties of STP are introduced, and several types of NFSR are briefly introduced. Then, the latest results in NFSR research based on STP are introduced, mainly including modeling problems, structural problems, properties and relevant criteria. Finally, a prospect and a summary of this paper are given.

2. Preliminaries

This section provides some notations, the definition and some properties of the STP. First of all, some notations used in this paper are listed as follows:
  • R m × n : set of real matrices of dimension m × n .
  • F 2 : Galois field of two elements.
  • F 2 n : set of all n-dimension vectors over F 2 .
  • I n : identity matrix of dimension n.
  • δ n i : the ith column of the identity matrix I n .
  • Δ 2 : = { δ 2 i | i = 1 , 2 } .
  • Δ 2 n : set of all n-dimension vectors over Δ p .
  • L n × r : set of n × r logical matrices satisfying C o l ( L ) Δ n . For L L n × r , write L = [ δ n i 1 δ n i 2 δ n i r ] or L = δ n [ i 1 i 2 i r ] for simplicity.
  • C o l i ( M ) : the i-th column of matrix M.
  • R o w i ( M ) : the i-th row of matrix M.
  • M ( i , j ) : the element on the i-th row, j-th column of matrix M.
  • s : the largest integer less than s.
  • | M | : the determinant of matrix M.
  • o r d ( M ) : the order of matrix M.
  • W [ m , n ] : swap matrix, where W [ m , n ] = [ δ n 1 δ m 1 , δ n 2 δ m 1 , , δ n n δ m 1 , , δ n 1 δ m m , δ n 2 δ m m , , δ n n δ m m ] .
Definition 1
([98]). Let A R m × n , B R p × q , the Kronecker product of matrices A and B is defined as
A B = A ( 1 , 1 ) B A ( 1 , 2 ) B A ( 1 , n ) B A ( 2 , 1 ) B A ( 2 , 2 ) B A ( 2 , n ) B A ( m , 1 ) B A ( m , 2 ) B A ( m , n ) B .
Definition 2
([99]). Let A R m × n and B R p × n . The Khatri–Rao product of matrices A and B is defined as an m p × n matrix, given by
A B = [ C o l 1 ( A ) C o l 1 ( B ) C o l 2 ( A ) C o l 2 ( B ) C o l n ( A ) C o l n ( B ) ] .
Definition 3
([39]). Let A R m × n , B R p × q . The STP of matrices A and B is defined as
A B : = ( A I s / n ) ( B I s / p ) ,
where s is the least common multiple of n and p.
Lemma 1
([39]). Any logical function y = f ( x 1 , x 2 , , x n ) with Boolean variables x i Δ 2 , i = 1 , 2 , , n , can be expressed as a multi-linear form as
y = f ( x 1 , x 2 , , x n ) = M f x 1 x 2 x n ,
where y Δ 2 , and M f L 2 × 2 n is unique, called the structural matrix of f.

3. Research Status of NFSRs Based on STP

The invention of the STP has brought new vitality into the research of NFSRs. This section will focus on the research status on applying STP to NFSRs.

3.1. Modeling Problems for NFSRs

This section will introduce several types of NFSRs and their algebraic forms established by STP. Identify 1 and 0 as δ 2 1 Δ 2 and δ 2 2 Δ 2 , respectively. In the sequel, we say a variable X F 2 is in a scalar form, and call the corresponding variable x Δ 2 is in a vector form. Without loss of generality, we usually omit “⋉" in the following for simplicity.

3.1.1. Fibonacci NFSRs

Fibonacci NFSR is often adopted to design stream ciphers [19,21]. An n-stage Fibonacci NFSR can be expressed as:
X 1 ( t + 1 ) = X 2 ( t ) , X 2 ( t + 1 ) = X 3 ( t ) , X n 1 ( t + 1 ) = X n ( t ) , X n ( t + 1 ) = f ( X 1 ( t ) , X 2 ( t ) , , X n ( t ) ) .
where the content of bit i is denoted as X i ( t ) , i = 1 , 2 , , n . The state of the NFSR at time t is denoted by X ( t ) = [ X 1 ( t ) X 2 ( t ) X n ( t ) ] , and f is a nonlinear feedback function. Figure 1 represents an n-stage Fibonacci NFSR.
Using Lemma 1 and the vector forms, for i = 1 , 2 , , n , there exists a structural matrix L i such that x i = L i x ( t ) , where x ( t ) = k = 1 n x k ( t ) Δ 2 n . Then, an equivalently linear form of Fibonacci NFSR [65] an be expressed as:
x ( t + 1 ) = L x ( t ) ,
where x ( t ) = k = 1 n x k ( t ) Δ 2 n , and L = L 1 L 2 L n L 2 n × 2 n is the state transition matrix of this NFSR.
More accurately, assume [ s 1 , s 2 , , s 2 n ] to be the truth table of f arranged in reverse alphabetical order and L = δ 2 n [ η 1 η 2 n 1 η 2 n 1 + 1 η 2 n ] , then [66]
η i = 2 i s i , η 2 n 1 + i = 2 i s 2 n 1 + i
for all i = 1 , 2 , , 2 n 1 .

3.1.2. Galois NFSRs

Compared to Fibonacci NFSRs, Galois NFSRs may decrease the propagation time and increase the throughput [25], so that they are employed in several stream cipher designs [100]. An n-stage Galois NFSR can be expressed as:
X 1 ( t + 1 ) = f 1 ( X 1 ( t ) , X 2 ( t ) , , X n ( t ) ) , X 2 ( t + 1 ) = f 2 ( X 1 ( t ) , X 2 ( t ) , , X n ( t ) ) , X n ( t + 1 ) = f n ( X 1 ( t ) , X 2 ( t ) , , X n ( t ) ) .
where f i are nonlinear feedback functions, i = 1 , 2 , , n .
The Galois NFSR can also be equivalently expressed as a linear form using STP:
x ( t + 1 ) = L x ( t ) ,
where x ( t ) = i = 1 n x i ( t ) Δ 2 n , and L L 2 n × 2 n is called the state transition matrix of the Galois NFSR. Figure 2 represents an n-stage Galois NFSR.

3.1.3. Grain-Like Cascade NFSRs

In a Grain-like cascade FSR, one LFSR is used to control another NFSR (see Figure 3). Let [ X 1 ( t ) X n ( t ) Y 1 ( t ) Y m ( t ) ] represents the state of the Grain-like cascade NFSR. Then they have the following relation:
Y 1 ( t + 1 ) = Y 2 ( t ) , Y m 1 ( t ) = Y m ( t ) , Y m ( t + 1 ) = g ( Y 1 ( t ) , , Y m ( t ) ) , X 1 ( t + 1 ) = X 2 ( t ) , X n 1 ( t + 1 ) = X n ( t ) , X n ( t + 1 ) = f ( X 1 ( t ) , X 2 ( t ) , , X n ( t ) ) Y 1 ( t ) .
Using Lemma 1, the multi-linear form of (9) can be obtained [86]:
y ( t + 1 ) = L 1 y ( t ) , x ( t + 1 ) = L 2 y 1 ( t ) x ( t ) .
Figure 3 represents an n-stage Fibonacci NFSR. In general, a Grain-like cascade NFSR can be considered as an NFSR with input, where the output of the LFSR is used as input of the NFSR. From this idea, the algebraic form (9) can be reduced to
x ( t + 1 ) = L u x ( t ) u ( t ) ,
where x ( t ) Δ 2 n is the state at time instant t, u ( t ) Δ 2 is the input at time instant t. More precisely, assume [ s 1 , s 2 , , s 2 n + 1 ] to be the truth table of f arranged in the reverse alphabet order and L = δ 2 n [ η 1 η 2 n η 2 n + 1 η 2 n + 1 ] , then [68]
η i = 2 i s i , η 2 n + i = 2 i s 2 n + i
for all i = 1 , 2 , , 2 n .

3.1.4. Multi-Valued NFSRs

It can be seen that the NFSRs introduced above are all binary, but in practical applications, in order to consider software implementation, some studies are based on multi-valued NFSRs. Consider a k-valued Fibonacci NFSR, whose form is the same as (4), except that the value of X i is from 0 to k 1 instead of {0,1}. Denote L = δ k n [ η 1 η 2 η k n ] be the state transition matrix of this NFSR, then [67]
η m = { [ ( m 1 ) m o d k n 1 ] + 1 } k s m , m = 1 , 2 , , k n .
Similarly, other types of NFSRs can also be correspondingly extended to multi-valued NFSRs, which will not be repeated here.

3.2. Structural Problems of NFSRs

This section will introduce some researches about structural problems of NFSRs that are studied by applying STP, including the equivalence, isomorphism, decomposition and period of NFSRs. In-depth study of the structural problems of NFSR can aid in the creation of stream cipher algorithms that are both more effective and safe.

3.2.1. The Equivalence Transition between Galois NFSRs and Fibonacci NFSRs

In Section 3.1, we introduced the structure of Galois NFSRs and Fibonacci NFSRs. Since both types have their own advantages and disadvantages, such as the period of output sequences in Fibonacci NFSR being equal to that of state sequences and Galois NFSR has higher speed of output sequences generation [25], it is necessary to study the equivalence of the two. If a Galois NFSR is euivalent to a Fibonacci NFSR, then this special Galois NFSR can have the advantages of Fibonacci NFSR in addition to its own advantages.
(1) Equivalence
Definition 4
([101]). Two NFSRs are equivalent if the sets of their output sequences are the same.
There are several studies on equivalence condition of Galois NFSR and Fibonacci NFSR using STP [74] was disclosed therein that if a Galois NFSR is equivalent to a Fibonacci NFSR, then its stage number is no less than that of the Fibonacci NFSR. The number of n-stage Galois NFSRs that are equivalent to a given n-stage Fibonacci NFSR is ( 2 n 1 ! ) 2 . The literature [75,76] gave a series of necessary and sufficient conditions for equivalence from the perspective of observability matrix and output tuple, respectively.
In addition, there are also some special cases of equivalence that have been studied. An n-stage τ -terminal-bit Galois NFSR is equivalent to an n-stage Fibonacci NFSR when the feedback functions of the Galois NFSR satisfy certain conditions. If the output sequence set of an n-stage Fibonacci NFSR equal to its complementary set, then there are 2 × ( 2 n 1 ! ) 2 Galois NFSRs are equivalent to this Fibonacci NFSR. For details, see [73].
A property closely related to equivalence is isomorphism. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic. Two state diagrams G = ( V , A ) and G ¯ = ( V ¯ , A ¯ ) are isomorphic means that there exists a bijection mapping ϕ : V V ¯ such that for any edge E A from state X to Y, there exists an edge E ¯ A ¯ from ϕ ( X ) to ϕ ( Y ) . About the relationship between isomorphism and equivalence, if an n-stage Fibonacci NFSR and an n-stage Galois NFSR are equivalent, then their state transition diagrams are isomorphic [70]. In more depth, the literature [73] explored the conditions that the feedback functions need to satisfy to make two NFSRs achieve anti-isomorphism, dual isomorphism and dual anti-isomorphism, respectively.
(2) Weak equivalence
Weak equivalence is a relation weaker than equivalence.
Definition 5
([80]). Fibonacci NFSR (5) is said to be weakly equivalent to Galois NFSR (8) if for any output sequence, denoted by Y of Fibonacci NFSR (5), there always exists an initial state denoted by z, such that the output sequence of Galois NFSR (8) with initial state z is the same as Y .
According to the definition of weak equivalence, (5) is weakly equivalent to (8) if the set of output sequences of (5) is a subset of that of (8). If Fibonacci NFSR (5) is weakly equivalent to Galois NFSR (8), then (5) is also equivalent to (8). Conversely, if Galois NFSR (8) is weakly equivalent to Fibonacci NFSR (5), then (8) is not necessarily equivalent to (5). Moreover [80], pointed out that given any n-stage Fibonacci NFSR, their method can construct ( 2 n 1 ) ! 2 1 weakly equivalent n-stage Galois NFSRs, and conversely, given any n-stage Galois NFSR, it is possible to construct a weakly equivalent m-stage Fibonacci NFSR where m < n .

3.2.2. The Equivalence and Decomposition between Cascade NFSRs

Stream cipher design can benefit from examining the features of two equivalent cascade NFSRs, for example, to choose a better NFSR based on its quality metrics [69] showed that for any given cascade connection of an m-stage NFSR1 into an n-stage NFSR2, there exists only another one equivalent cascade connection of an m-stage NFSR3 into an n-stage NFSR4.
Decomposability and equivalence go hand in hand for cascaded NFSR. An NFSR is said to be decomposable if it is equivalent to a cascade connection of to NFSRs. By multiplying the state transition matrix by the permutation matrix, Zhong and Lin [70] obtained a sufficient and necessary condition that a Fibonacci NFSR can be decomposed into a cascade NFSR.

3.2.3. Minimum Period and Maximum Period

Minimum period is a concept in Grain-like cascade NFSRs. In 2011, Hu and Gong [102] confirmed that the period of the sequence generated by a Grain-like cascade NFSR is a multiple of the period of the sequence generated by its LFSR if the initial state of the LFSR is nonzero, and meanwhile proposed an open question: for fixed feedback functions of an NFSR and an LFSR, determine whether the sequences generated by the NFSR in a Grain-like structure can achieve the minimum period, i.e., the period of the LFSR. This question has attracted some scholars to discuss. Zhong and Lin [68] converted this open question into a problem of solving an integer equation based on the framework of STP. They verified that for any given initial state of an n-stage NFSR and any given nonzero initial state of an m-stage LFSR, the probability that the sequence produced by the Grain-like cascade NFSR achieves the minimum period 2 m 1 is very small, which is at most 2 n .
As for maximum period, the sequences with maximum period can keep more cryptographical security than other sequences. The NFSR which can generate sequences with maximum period is usually called full-length NFSR. Literature [66,71] revealed that an n-stage NFSR is a full-length NFSR if and only if the state transition matrix L in (5) satisfies o r d ( L ) = 2 n , and for an n-stage full-length NFSR, | L | = 1 holds. The full-length NFSRs can be constructed through the cycles joining algorithm [65], and this algorithm can construct 2 2 n 2 1 different n-stage full-length NFSRs.
Other studies on cycles via STP include cycle reconstruction [78], cycle decomposition [82], etc.
For the convenience of readers, the relevant results are presented in Table 1 in the order of the year of publication of the mentioned literature.

3.3. Properties and Correlative Criteria of NFSRs

The property of NFSRs plays a crucial role in reflecting its performance. Studying the properties of NFSRs can provide reference for stream cipher designers. This subsection will introduce the research status of different properties of NFSRs in recent years.

3.3.1. Nonsingularity

Nonsingularity is a fundamental demand to guarantee that the NFSRs avoid generating equivalent keys in stream cipher designing. The definition of nonsingularity is as follows:
Definition 6
([103]). An NFSR is said to be nonsingular if its state transition diagram contains only cycles.
Lemma 2
([103]). An NFSR is nonsingular if and only if each state has only one successor and one predecessor.
Regarding nonsingularity, there are some classical theories, such as the proof in [4] that a binary NFSR is nonsingular if and only if its feedback function f ( x 1 , x 2 , , x n ) = x 1 f 0 ( x 2 , , x n ) , where f 0 is independent of the variable x 1 . However, the paper [82] pointed that this method cannot be applied directly with multi-valued NFSRs. Therefore [82], proposed another method to judge nonsingularity, that is, an n-stage k-valued NFSR is nonsingular if and only if | M i | 0 , i = 1 , 2 , , k n 1 , where M i L k × k satisfying L W [ k , k ] W [ k , k n 1 ] = [ M 1 M 2 M k n 1 ] and L is the state transition matrix of the NFSR obtained by STP.
For Grain-like cascade NFSR (10), Lu et al. [86] regarded it as an NFSR with input (11) and put forward some sufficient conditions for nonsingularity, for example, NFSR (11) is nonsingular if L u = [ L u 1 L u 2 ] with L u 1 and L u 2 are both nonsingular. Lu also pointed that if in NFSR (11) C o l ( L u ) Δ 2 n , then this NFSR is singular. Meanwhile, some other properties of L u are also given in this paper.

3.3.2. Stability and Driven Stability

During the decoding process of convolutional codes, decoding errors may occur due to channel attacks and other reasons, and decoding errors may propagate to cause more decoding errors. To limit error propagation, Massey [104] found that stability as well as driven stability helps a lot in this regard. Stability is a concept in autonomous NFSRs, indicating that NFSR has a kind of “reconvergence" ability, which can make NFSRs with decoding error return to correct decoding. Driven stability is a property weaker than stability, defined in non-autonomous NFSRs with input. Driven stability only requires that the states which can be reached from the equilibrium point driven by input can achieve reconvergence.
Definition 7
([84]). An n-stage autonomous NFSR is globally stable to the equilibrium state 0 ( δ 2 n 2 n ), if for any state X F 2 n ( x Δ 2 n ), there exists an integer N > 0 , such that F N ( X ) = 0 ( L N x = δ 2 n 2 n ).
Definition 8
([85]). An n-stage NFSR with input is driven stable to the equilibrium state 0 (state δ 2 n 2 n ), if for every state X (state x) that can be reached from 0 ( δ 2 n 2 n ) by driving the NFSR with an input sequence, there exists a positive integer N such that F N ( X ) = 0 ( L N x = δ 2 n 2 n ), where F and L are the state transition function and state transition matrix of the corresponding autonomous NFSR.
The stability of NFSRs can be evaluated by iteration of the state transition matrix L via STP [84].
Theorem 1
([84]). An n-stage Fibonacci NFSR (5) is globally stable if and only if there exists a positive integer N 2 n 1 such that each column of the matrix L N is equal to δ 2 n 2 n .
In addition to this, there are several works that studied the stability in special cases based on STP. Gao et al. [78] researched the stability of NFSRs with periodic input, including limited length and unlimited length. Lu and his team [87] focused on the stability in the case where NFSR is monotonous, which is called reliable NFSR. Their method for constructing reliable FSRs indicated that the number of reliable FSRs is 2 2 n 4 Φ ( n ) ( n > 5 ) times of that constructed by the previous method. The methods given in [91,92] can be applied to multi-valued NFSRs, and can construct stable NFSRs. Furthermore, the literature [93,95] addressed the stability issues of ( n , k ) NFSR and Grain-like cascade NFSRs, respectively.
As for the driven stability, the researchers found that it is only necessary to examine whether the state that the equilibrium point can reach can achieve reconvergence, which is also the origin of the driven stability [104]. We can turn the driven stability question into whether the reachable set of the equilibrium point is a subset of the basin [85] provided algorithms for finding the reachable set and the basin using STP, which reduces the computational complexity of the previous algorithms.
For the convenience of readers, the relevant results are presented in Table 2 in the order of the year of publication of the literature. These results are helpful to the theoretical analysis of NFSRs, and have reference significance for the design of decoding algorithm.

3.3.3. Observability

Observability is a fundamental property in control theory which can ensure that any two distinct initial states can be uniquely determined by their outputs. That is, starting from two distinct initial states, the NFSR does not produce two identical outputs.
Definition 9.
(1) ([105]) Two initial states x 0 x 0 Δ 2 n are said to be indistinguishable, if their corresponding output sequences are equal. Otherwise, the two distinct initial states are said to be distinguishable.
(2) An NFSR is said to be observable if every two distinct initial states are distinguishable.
In [76] the authors investigated the equivalence transformation between Galois NFSRs and Fibonacci NFSRs based on observability matrix based on STP. According to the definition of observability of sequence generators, the NFSR-based stream ciphers should avoid unobservable Galois NFSRs from the security viewpoint and select observable ones. In [90], the authors studied the observability of binary Galois NFSRs using a new observability matrix which is constructed by putting the output sequences generated by the initial states on the same branch and its concatenated cycles into a block via STP. Further, [97] researched the observability of multi-value Galois NFSRs and gave the relevant criterion using the state pair table method and the matrix method, respectively.
Theorem 2
([90]). Let N k be the number of distinct columns of the observability matrix O k of an n-stage Galois NFSR (8). Then (8) is observable if and only if N k + 1 N k 1 for all positive integer k satisfying N k < 2 n .

4. Summary and Prospect of NFSRs

With the help of STP, NFSR research is getting ever more complete and comprehensive, and the results on theoretical problems have significant reference value for the design of stream cipher algorithms and decoding algorithms. However, there are still many unresolved theoretical issues.
(1)
Reduce the computational complexity. Using STP to process these actual network models, the more network nodes, the higher the dimension of the system and the higher the computational performance requirements of the computer. How to reduce the computational complexity of the system is a big challenge in theoretical research of NFSR. At present, there are some methods to reduce computational complexity: approximation method [106], network aggregation method [107], logic matrix decomposition [108], pinning control [109], model order reduction [110] and block decoupling [111], etc. Based on these methods, it is a future research direction to continue to explore more effective methods to reduce computational complexity.
(2)
The existing related research is not perfect, and many issues have no exact result yet, such as the study of observability and driven stability in multi-valued NFSRs, the modeling of Trivium-like cascade NFSR and study of its related properties, the maximum and minimum period problems in multi-valued NFSRs. In addition, there are very few studies on non-autonomous NFSR, which can also provide a very valuable research idea to improve related research.
(3)
Explore more comprehensive theoretical issues of NFSRs, and provide theoretical support for the design of stream cipher algorithms and decoding algorithms. Thanks to the STP as a tool, many indicators can be easily studied. In addition to nonsingularity, observability, and stability, whether there are more indicators that can characterize the performance and security strength of NFSRs can also be used as follow-up research directions.
(4)
Based on the above theoretical analysis, it is the ultimate goal to give more effective stream cipher algorithms with higher security.
This paper reviews and summarizes the most recent developments in NFSR based on STP at this stage. The combination of STP and NFSR is still slowly maturing, and there are still a lot of problems to be solved. We believe this paper can provide researchers interested in STP and NFSR with a thinking direction.

Author Contributions

Conceptualization, Z.G. and J.-e.F.; methodology, Z.G.; validation, Z.G.; formal analysis, Z.G.; investigation, Z.G.; resources, Z.G.; writing—original draft preparation, Z.G.; writing—review and editing, Z.G.; visualization, Z.G.; supervision, J.-e.F.; project administration, J.-e.F.; funding acquisition, J.-e.F. All authors have read and agreed to the published version of the manuscript.

Funding

This document is the results of the research project funded by the National Natural Science Foundation (NNSF) of China under Grant 61877036.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Meier, W.; Staffelbach, O. Fast correlation attacks on certain stream ciphers. J. Cryptol. 1989, 1, 159–176. [Google Scholar] [CrossRef]
  2. Morrissey, T. Analysis of decoders for convolutional codes by stochastic sequential machine methods. IEEE Trans. Inf. Theory 1970, 16, 460–469. [Google Scholar] [CrossRef]
  3. Hellebrand, S.; Rajski, J.; Tarnick, S.; Venkataraman, S.; Courtois, B. Built-in test for circuits with scan based on reseeding of multiple-polynomial linear feedback shift registers. IEEE Trans. Comput. 1995, 44, 223–233. [Google Scholar] [CrossRef]
  4. Solomon, G.W. Shift Register Sequence; Holden-Day: Laguna Hills, CA, USA, 1967. [Google Scholar]
  5. Hell, M.; Johansson, T.; Meier, W. Grain: A stream cipher for constrained environments. In eSTREAM, ECRYPT Stream Cipher Project; Report 2005/010; Inderscience Enterprises Ltd.: Geneva, Switzerland, 2005. [Google Scholar] [CrossRef]
  6. Cannière, D.C.; Preneel, B. Trivium specifications. In eSTREAM, ECRYPT Stream Cipher Project; Report 2005/030; Inderscience Enterprises Ltd.: Geneva, Switzerland, 2005. [Google Scholar]
  7. Babbage, S.; Dodd, M. The stream cipher MICKEY(version 1). In eSTREAM, ECRYPT Stream Cipher Project; Report 2005/015; Inderscience Enterprises Ltd.: Geneva, Switzerland, 2005. [Google Scholar]
  8. Massey, J. Threshold Decoding; The MIT Press: Cambridge, MA, USA, 1963. [Google Scholar]
  9. Massey, J. Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 1969, 15, 122–127. [Google Scholar] [CrossRef]
  10. Wang, X.; Tian, T.; Qi, W. A generic method for investigating nonsingular Galois NFSRs. Des. Codes Cryptogr. 2022, 77, 387–408. [Google Scholar] [CrossRef]
  11. Wang, X.; Tian, T.; Qi, W. A necessary and sufficient condition for a class of nonsingular Galois NFSRs. Finite Fields Their Appl. 2022, 77, 101952. [Google Scholar] [CrossRef]
  12. Pan, Y.; Zhong, J.; Lin, D. On Galois NFSRs with terminal bits. In Proceedings of the 2021 IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 12–20 July 2021; pp. 3062–3067. [Google Scholar] [CrossRef]
  13. Jiang, Y. Weak Grain-like structures. IEEE Trans. Inf. Theory 2020, 66, 7717–7723. [Google Scholar] [CrossRef]
  14. Zhang, J.; Tian, T.; Qi, W.; Zheng, Q. A new method for finding affine sub-families of NFSR sequences. IEEE Trans. Inf. Theory 2019, 65, 1249–1257. [Google Scholar] [CrossRef]
  15. Simpson, L.; Boztas, S. State cycles, initialization and the Trivium stream cipher. Des. Codes Cryptogr. 2012, 4, 245–258. [Google Scholar] [CrossRef]
  16. Zhang, S.; Chen, G. New results on the state cycles of Trivium. Des. Codes Cryptogr. 2019, 87, 149–162. [Google Scholar] [CrossRef]
  17. Deepthi, P.P.; Sathidevi, P.S. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Comput. Secur. 2009, 28, 229–241. [Google Scholar] [CrossRef]
  18. Tian, Y.; Chen, G.; Li, J. Quavium—A new stream cipher inspired by Trivium. J. Comput. 2012, 7, 1278–1283. [Google Scholar] [CrossRef]
  19. Armknecht, F.; Mikhalev, V. On lightweight stream ciphers with shorter internal states. In Proceedings of the Fast Software Encryption, Istanbul, Turkey, 8–11 March 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 451–470. [Google Scholar] [CrossRef]
  20. Hamann, M.; Krause, M.; Meier, W. LIZARD—A lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017, 3, 45–79. [Google Scholar] [CrossRef]
  21. Mikhalev, V.; Armknecht, F.; Müller, C. On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol. 2017. [Google Scholar] [CrossRef]
  22. Aumasson, J.P.; Dinur, I.; Meier, W.; Shamir, A. Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In Proceedings of the Fast Software Encryption, 16th International Workshop, Leuven, Belgium, 22–25 February 2009; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
  23. Hu, Y.; Gao, J.; Liu, Q.; Zhang, Y. Fault analysis of Trivium. Des. Codes Cryptogr. 2012, 62, 289–311. [Google Scholar] [CrossRef]
  24. Zhang, J.; Qi, W.; Tian, T.; Wang, Z. Further results on the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. IEEE Trans. Inf. Theory 2015, 61, 645–654. [Google Scholar] [CrossRef]
  25. Dubrova, E. A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory 2009, 55, 5263–5271. [Google Scholar] [CrossRef]
  26. Ma, Z.; Qi, W.; Tian, T. On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex. 2013, 29, 173–181. [Google Scholar] [CrossRef]
  27. Wang, H.; Zheng, Q.; Wang, Z.; Zhao, X.; Qi, W. A new result on irreducible NFSRs with respect to cascade connection. Finite Fields Their Appl. 2021, 73, 101859. [Google Scholar] [CrossRef]
  28. Tian, T.; Qi, W. On the density of irreducible NFSRs. IEEE Trans. Inf. Theory 2013, 59, 4006–4012. [Google Scholar] [CrossRef]
  29. Jiang, Y.; Lin, D. On affine sub-families of Grain-like structures. Des. Codes Cryptogr. 2017, 82, 531–542. [Google Scholar] [CrossRef]
  30. Li, C.; Xie, D. Criterion for the nonsingularity of feedback shift registers. J. Electron. Inf. Technol. 1995, 17, 500–505. [Google Scholar] [CrossRef]
  31. Gary, M.L. Permutation polynomials and nonsingular feedback shift registers over finite fields. IEEE Trans. Inf. Theory 1989, 35, 900–902. [Google Scholar] [CrossRef]
  32. Liang, W.; Xu, Y.; Zeng, X. The periods of a class of nonlinear feedback shift register sequences. Chin. J. Electron. 2016, 25, 8. [Google Scholar] [CrossRef]
  33. Yang, Y.; Zeng, X.; Xu, Y. Periods on the cascade connection of an LFSR and an NFSR. Chin. J. Electron. 2019, 28, 301–308. [Google Scholar] [CrossRef]
  34. Zheng, Q.; Zhao, X.; Feng, X. Grain-like structures with minimal and maximal period sequences. Des. Codes Cryptogr. 2021, 89, 679–693. [Google Scholar] [CrossRef]
  35. Zhou, L.; Tian, T.; Qi, W.; Wang, Z. Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR. Finite Fields Their Appl. 2019, 60, 101574. [Google Scholar] [CrossRef]
  36. Yang, B.; Mandal, K.; Aagaard, M.D.; Gong, G. Efficient composited de Bruijn sequence generators. IEEE Trans. Comput. 2017, 66, 1354–1368. [Google Scholar] [CrossRef]
  37. Sawada, J.; Williams, A.; Wong, D. A surprisingly simple de Bruijn sequence construction. Discret. Math. 2016, 339, 127–131. [Google Scholar] [CrossRef]
  38. Li, M.; Lin, D. De Bruijn sequences, adjacency graphs, and cyclotomy. IEEE Trans. Inf. Theory 2018, 64, 2941–2952. [Google Scholar] [CrossRef]
  39. Cheng, D.; Qi, H.; Li, Z. Analysis and Control of Boolean Networks; Springer-Verlag: London, UK, 2011. [Google Scholar]
  40. Cheng, D.; Qi, H.; Zhao, Y. An Introduction to Semi-Tensor Product of Matrices and Its Applications; World Scientific: Singapore, 2012. [Google Scholar]
  41. Zhao, Y.; Kim, J.; Filippone, M. Aggregation algorithm towards large-scale Boolean network analysis. IEEE Trans. Autom. Control 2013, 58, 1976–1985. [Google Scholar] [CrossRef]
  42. Li, R.; Yang, M.; Chu, T. State feedback stabilization for Boolean control networks. IEEE Trans. Autom. Control 2013, 58, 1853–1857. [Google Scholar] [CrossRef]
  43. Li, H.; Wang, Y. Output feedback stabilization control design for Boolean control networks. Automatica 2013, 49, 3641–3645. [Google Scholar] [CrossRef]
  44. Gao, B.; Li, L.; Peng, H.; Kurths, J.; Zhang, W.; Yang, Y. Principle for performing attractor transits with single control in Boolean networks. Phys. Rev. E 2013, 88, 062706. [Google Scholar] [CrossRef]
  45. Lu, J.; Zhong, J.; Huang, C.; Cao, J. On pinning controllability of Boolean control networks. IEEE Trans. Autom. Control 2016, 61, 1658–1663. [Google Scholar] [CrossRef]
  46. Zheng, Y.; Feng, J. Output tracking of delayed logical control networks with multi-constraint. Front. Inf. Technol. Electron. Eng. 2020, 21, 316–323. [Google Scholar] [CrossRef] [Green Version]
  47. Zhang, Q.; Wang, B.; Feng, J. Solution and stability of continuous-time cross-dimensional linear systems. Front. Inf. Technol. Electron. Eng. 2021, 22, 210–221. [Google Scholar] [CrossRef]
  48. Guo, P.; Wang, Y.; Li, H. Algebraic formulation and strategy optimization for a class of evolutionary networked games via semi-tensor product method. Automatica 2013, 49, 3384–3389. [Google Scholar] [CrossRef]
  49. Cheng, D. On finite potential games. Automatica 2014, 50, 1793–1801. [Google Scholar] [CrossRef]
  50. Cheng, D.; He, F.; Qi, H.; Xu, T. Modeling, analysis and control of networked evolutionary games. IEEE Trans. Autom. Control 2015, 60, 2402–2415. [Google Scholar] [CrossRef]
  51. Wang, Y.; Zheng, C.; Liu, Z. A matrix approach to graph maximum stable set and coloring problems with application to multi-agent systems. Automatica 2012, 48, 1227–1236. [Google Scholar] [CrossRef]
  52. Li, R.; Chu, T. Complete synchronization of Boolean networks. IEEE Trans. Neural Networks Learn. Syst. 2012, 23, 840–846. [Google Scholar] [CrossRef]
  53. Xu, X.; Hong, Y. Observability analysis and observer design for finite automata via matrix approach. IET Control Theory Appl. 2013, 7, 1609–1615. [Google Scholar] [CrossRef]
  54. Yan, Y.; Chen, Z.; Liu, Z. Semi-tensor product approach to controllability and stabilizability of finite automata. J. Syst. Eng. Electron. 2015, 26, 134–141. [Google Scholar] [CrossRef]
  55. Zhang, K.; Zhang, L. Observability of Boolean control networks: A unified approach based on finite automata. IEEE Trans. Autom. Control 2016, 61, 2733–2738. [Google Scholar] [CrossRef]
  56. Wang, B.; Feng, J.; Meng, M. Matrix approach to model matching of composite asynchronous sequential machines. IET Control Theory Appl. 2017, 11, 2122–2130. [Google Scholar] [CrossRef]
  57. Gao, Z.; Wang, B.; Feng, J.; Li, T. Finite automata approach to reconstructibility of switched Boolean control networks. Neurocomputing 2021, 454, 34–44. [Google Scholar] [CrossRef]
  58. Li, H.; Wang, Y. Boolean derivative calculation with application to fault detection of combinational circuits via the semi-tensor product method. Automatica 2012, 48, 688–693. [Google Scholar] [CrossRef]
  59. Ouyang, C.; Jiang, J. Reliability estimation of sequential circuit based on probabilistic transfer matrices. Acta Electron. Sin. 2013, 41, 171–177. [Google Scholar] [CrossRef]
  60. Chen, Y.; Xi, N.; Miao, L.; Li, H.; Wang, Y. Applications of the semi-tensor product to the Internet-based tele-operation systems. Robot 2012, 34, 50–55. [Google Scholar] [CrossRef]
  61. Wu, Y.; Shen, T. A logical dynamical systems approach to modeling and control of residual gas fraction in IC engines. In IFAC Proceedings Volumes, Proceedings of the 7th IFAC Symposium on Advances in Automotive Control, Tokyo, Japan, 4–7 September 2013; Elsevier B.V.: Amsterdam, The Netherlands, 2013; Volume 46, pp. 495–500. [Google Scholar] [CrossRef]
  62. Kabir, M.H.; Hoque, M.R.; Seo, H.; Yang, S.H. Boolean control network based modeling for context-aware system in smart home. Int. J. Smart Home 2016, 10, 65–76. [Google Scholar] [CrossRef]
  63. Li, H.; Zhao, G.; Meng, M.; Feng, J. A survey on applications of semi-tensor product method in engineering. Sci. China Inf. Sci. 2017, 61, 1–17. [Google Scholar] [CrossRef]
  64. Guo, L. Comments on “Semi-tensor product of matrices-A convenient new tool". Chin. Sci. Bull. 2011, 56, 2662–2663. [Google Scholar]
  65. Zhao, D.; Peng, H.; Li, L.; Hui, S.; Yang, Y. Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci. 2014, 57, 1–14. [Google Scholar] [CrossRef]
  66. Zhong, J.; Lin, D. A new linearization method for nonlinear feedback shift registers. J. Comput. Syst. Sci. 2015, 81, 783–796. [Google Scholar] [CrossRef]
  67. Wang, H.; Zhong, J.; Lin, D. Linearization of multi-valued nonlinear feedback shift registers. J. Syst. Sci. Complex. 2017, 30, 494–509. [Google Scholar] [CrossRef]
  68. Zhong, J.; Lin, D. On minimum period of nonlinear feedback shift registers in Grain-like structure. IEEE Trans. Inf. Theory 2018, 64, 6429–6442. [Google Scholar] [CrossRef]
  69. Zhong, J.; Lin, D. On equivalence of cascade connections of two nonlinear feedback shift registers. Comput. J. 2019, 62, 1793–1804. [Google Scholar] [CrossRef]
  70. Zhong, J.; Lin, D. Decomposition of nonlinear feedback shift registers based on Boolean networks. Sci. China Inf. Sci. 2019, 62, 1–3. [Google Scholar] [CrossRef]
  71. Zhong, J.; Lin, D. On maximum length nonlinear feedback shift registers using a Boolean network approach. In Proceedings of the 33rd Chinese Control Conference, Nanjing, China, 28–30 July 2014; pp. 2502–2507. [Google Scholar] [CrossRef]
  72. Lu, J.; Li, M.; Huang, T.; Liu, Y.; Cao, J. The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices. Automatica 2018, 96, 393–397. [Google Scholar] [CrossRef]
  73. Kong, W.; Zhong, J.; Lin, D. Isomorphism and equivalence of Galois nonlinear feedback shift registers. In Proceedings of the Inscrypt 2021: Information Security and Cryptology, Virtual Event, 12–14 August 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 301–315. [Google Scholar] [CrossRef]
  74. Zhong, J.; Pan, Y.; Lin, D. On Galois NFSRs equivalent to Fibonacci ones. In Proceedings of the Information Security and Cryptology, Vienna, Austria, 6–10 December 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 433–449. [Google Scholar] [CrossRef]
  75. Zhong, J.; Pan, Y.; Kong, W.; Lin, D. Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium. Cryptology ePrint Archive, Paper 2021/928. 2021. Available online: https://eprint.iacr.org/2021/928 (accessed on 28 June 2022).
  76. Zhao, X.; Wang, B.; Yan, Y.; Feng, J. The equivalence transformation between Galois NFSRs and Fibonacci NFSRs. Asian J. Control 2020, 23, 2865–2873. [Google Scholar] [CrossRef]
  77. Zhao, X. Research on nonlinear feedback shift register via semi-tensor product. Master’s Thesis, Shandong University, Jinan, China, 2021. [Google Scholar] [CrossRef]
  78. Gao, B.; Liu, X.; Lan, Z.; Fu, R. A novel method for reconstructing period with single input in NFSR. Chaos Solitons Fractals 2018, 109, 36–40. [Google Scholar] [CrossRef]
  79. Zhao, X.; Wang, B.; Zhu, S.; Feng, J. On degeneracy problem of NFSRs via semi-tensor product. In Proceedings of the 2020 39th Chinese Control Conference (CCC), Shenyang, China, 27–29 July 2020; pp. 146–151. [Google Scholar] [CrossRef]
  80. Li, B.; Zhu, S.; Li, J. Improved transformation between Fibonacci FSRs and Galois FSRs based on semi-tensor product. J. Frankl. Inst. 2022, 359, 224–239. [Google Scholar] [CrossRef]
  81. Li, B. Boolean-Network-Based Analysis and Synthesis of Pseudo-Random Sequence Generators. Ph.D. Thesis, Southeast University, Nanjing, China, 2022. [Google Scholar] [CrossRef]
  82. Liu, Z.; Wang, Y.; Cheng, D. Nonsingularity of feedback shift registers. Automatica 2015, 55, 247–253. [Google Scholar] [CrossRef]
  83. Liu, Z. Control and Application of Mix-Valued Logical Networks via the Semi-Tensor Product Method. Ph.D. Thesis, Shandong University, Jinan, China, 2014. [Google Scholar]
  84. Zhong, J.; Lin, D. Stability of nonlinear feedback shift registers. Sci. China Inf. Sci. 2016, 59, 197–208. [Google Scholar] [CrossRef]
  85. Zhong, J.; Lin, D. Driven stability of nonlinear feedback shift registers with inputs. IEEE Trans. Commun. 2016, 64, 2274–2284. [Google Scholar] [CrossRef]
  86. Lu, J.; Li, M.; Liu, Y.; Ho, D.W.; Kurths, J. Nonsingularity of Grain-like cascade FSRs via semi-tensor product. Sci. China Inf. Sci. 2018, 61, 010204. [Google Scholar] [CrossRef]
  87. Lu, J.; Li, B.; Zhong, J. A novel synthesis method for reliable feedback shift registers via Boolean networks. Sci. China Inf. Sci. 2021, 64, 1–14. [Google Scholar] [CrossRef]
  88. Gao, B.; Liu, X.; Wu, X.; Li, S.; Lan, Z.; Lu, H.; Liu, B. Stability of nonlinear feedback shift registers with periodic input. Comput. Mater. Contin. 2020, 62, 833–847. [Google Scholar] [CrossRef]
  89. Gao, B. Research on Encryption Algorithm Based on Semi-Tensor Product. Ph.D. Thesis, Beijing Jiaotong University, Beijing, China, 2014. [Google Scholar]
  90. Kong, W.; Zhong, J.; Lin, D. Observability of Galois nonlinear feedback shift registers. Sci. China Inf. Sci. 2021. [Google Scholar] [CrossRef]
  91. Wang, H.; Zhong, J.; Lin, D. Stability of multi-valued nonlinear feedback shift registers. In Proceedings of the 2016 IEEE International Conference on Information and Automation (ICIA), Ningbo, China, 1–3 August 2016; pp. 1764–1769. [Google Scholar] [CrossRef]
  92. Wang, H.; Lin, Q.; Chen, J.; Li, J.; Zhong, J.; Lin, D.; Wang, J.; Ma, L. On stability of multi-valued nonlinear feedback shift registers. Complexity 2019, 2019, 1–11. [Google Scholar] [CrossRef]
  93. Li, M.; Lu, J.; Zhong, J. Stability of (n,k) nonlinear feedback shift registers. In Proceedings of the 2017 13th IEEE Conference on Automation Science and Engineering (CASE), Xi’an, China, 20–23 August 2017; pp. 166–170. [Google Scholar] [CrossRef]
  94. Li, M. Research on Several Nonlinear Feedback Shift Registers Based on Semi-Tensor Product of Matrix. Master’s Thesis, Southeast University, Nanjing, China, 2018. [Google Scholar]
  95. Ren, B.; Liu, Y.; Lu, J.; Cao, J. A novel analysis method for Grain-like cascade FSRs. In Proceedings of the 2020 12th International Conference on Advanced Computational Intelligence (ICACI), Dali, China, 14–16 August 2020; pp. 597–601. [Google Scholar] [CrossRef]
  96. Ren, B. Analysis of Grain-Like Cascade Feedback Shift Registers. Master’s Thesis, Zhejiang Normal University, Jinhua, China, 2020. [Google Scholar] [CrossRef]
  97. Gao, Z.; Feng, J.; Yu, Y.; Cui, Y. On observability of Galois NFSRs over finite fields. Front. Inf. Technol. Electron. Eng. 2022, 1–13. [Google Scholar] [CrossRef]
  98. Roger, A.; Johnson, C.R. Topics in Matrix Analysis; Cambridge University Press: Cambridege, UK, 1991. [Google Scholar] [CrossRef]
  99. Ljung, L.; Söderström, T. Theory and Practice of Recursive Identification; MIT Press: Cambridge, MA, USA, 1983. [Google Scholar]
  100. Dubrova, E.; Hell, M. Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun. 2017, 9, 273–289. [Google Scholar] [CrossRef]
  101. Dubrova, E. Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations. IEEE Trans. Inf. Theory 2010, 56, 2961–2966. [Google Scholar] [CrossRef]
  102. Hu, H.; Gong, G. Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. Int. J. Found. Comput. Sci. 2011, 22, 1317–1329. [Google Scholar] [CrossRef] [Green Version]
  103. Lai, X. Condition for the nonsingularity of a feedback shift-register over a general finite field (Corresp.). IEEE Trans. Inf. Theory 1987, 33, 747–749. [Google Scholar] [CrossRef]
  104. Massey, J.; Liu, R. Application of Lyapunov’s direct method to the error-propagation effect in convolutional codes (Corresp.). IEEE Trans. Inf. Theory 1964, 10, 248–250. [Google Scholar] [CrossRef]
  105. Fornasini, E.; Valcher, M.E. Observability, reconstructibility and state observers of Boolean control networks. IEEE Trans. Autom. Control 2013, 58, 1390–1401. [Google Scholar] [CrossRef]
  106. Cheng, D.; Zhao, Y.; Kim, J.; Zhao, Y. Approximation of Boolean networks. In Proceedings of the 10th World Congress on Intelligent Control and Automation, Beijing, China, 6–8 July 2012; pp. 2280–2285. [Google Scholar] [CrossRef]
  107. Zhao, Y.; Ghosh, B.K.; Cheng, D. Control of large-scale Boolean networks via network aggregation. IEEE Trans. Neural Networks Learn. Syst. 2016, 27, 1527–1536. [Google Scholar] [CrossRef]
  108. Li, H.; Wang, Y. Logical matrix factorization with application to topological structure analysis of Boolean network. IEEE Trans. Autom. Control 2015, 60, 1380–1385. [Google Scholar] [CrossRef]
  109. Zhong, J.; Ho, D.W.C.; Lu, J. A new approach to pinning control of Boolean networks. IEEE Trans. Control Netw. Syst. 2022, 9, 415–426. [Google Scholar] [CrossRef]
  110. Meng, M.; Lam, J.; Feng, J.; Li, X. l1-gain analysis and model reduction problem for Boolean control networks. Inf. Sci. 2016, 348, 68–83. [Google Scholar] [CrossRef]
  111. Yu, Y.; Feng, J.; Pan, J.; Cheng, D. Block decoupling of Boolean control networks. IEEE Trans. Autom. Control 2019, 64, 3129–3140. [Google Scholar] [CrossRef]
Figure 1. An n-stage Fibonacci NFSR.
Figure 1. An n-stage Fibonacci NFSR.
Mathematics 10 03538 g001
Figure 2. An n-stage Galois NFSR.
Figure 2. An n-stage Galois NFSR.
Mathematics 10 03538 g002
Figure 3. An m + n -stage Grain-like cascade NFSR.
Figure 3. An m + n -stage Grain-like cascade NFSR.
Mathematics 10 03538 g003
Table 1. The existing results on period of NFSRs based on STP.
Table 1. The existing results on period of NFSRs based on STP.
YearLiteratureInnovation PointsObject
2014[65]cycles joining algorithmmaximum period
2015[66,71] o r d ( L ) = 2 n iff the NFSR is full-lengthmaximum period
2015[82]multi-valued NFSRscycle decomposition
2018[78]NFSRs with single inputcycle reconstruction
2018[68]the probability to achieve minimum period 2 n minimum period
Table 2. The existing results on stability of NFSRs based on STP.
Table 2. The existing results on stability of NFSRs based on STP.
YearLiteratureInnovation PointsObject
2016[84]NFSRs, iteration method shown in Theorem 1stability
2016[85]NFSRs, reduce the computational complexitydriven stability
2017[93] ( n , k ) NFSRsstability
2018[78]NFSRs with periodic inputstability
2019[91,92]multi-valued NFSRs, construct stable NFSRsstability
2020[95]Grain-like cascade NFSRsstability
2021[87]monotonous FSRs, construct reliable FSRsstability
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gao, Z.; Feng, J.-e. Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product. Mathematics 2022, 10, 3538. https://doi.org/10.3390/math10193538

AMA Style

Gao Z, Feng J-e. Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product. Mathematics. 2022; 10(19):3538. https://doi.org/10.3390/math10193538

Chicago/Turabian Style

Gao, Zhe, and Jun-e Feng. 2022. "Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product" Mathematics 10, no. 19: 3538. https://doi.org/10.3390/math10193538

APA Style

Gao, Z., & Feng, J. -e. (2022). Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product. Mathematics, 10(19), 3538. https://doi.org/10.3390/math10193538

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop