Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations
In this paper, a mapping between initial states of the Fibonacci and the Galois configurations of NLFSRs is established. We show how to choose initial states for two configurations so that the resulting output sequences are equivalent.
đĄ Research Summary
The paper addresses a longâstanding practical problem in the design of nonlinear feedback shift registers (NLFSRs): how to choose initial states for the two canonical hardware configurationsâFibonacci and Galoisâso that they generate exactly the same output sequence. Although both configurations implement the same nonlinear feedback function, their internal stateâupdate mechanisms differ: the Fibonacci form shifts the entire register and computes a new mostâsignificant bit from the feedback function, while the Galois form injects the feedback directly into selected bits, allowing multiple bits to change simultaneously. In practice, designers often discover that using the same literal bit pattern as an initial state in both configurations yields divergent streams, forcing costly verification and potentially compromising security guarantees.
The authors resolve this mismatch by defining a deterministic, bijective mappingâŻSâŻthat converts any Fibonacciâtype initial stateâŻxââŻinto a unique Galoisâtype initial stateâŻyââŻsuch that the two registers become stateâisomorphic. Formally, letâŻFââŻandâŻFđ°âŻdenote the stateâtransition functions of the Fibonacci and Galois NLFSRs, respectively. The mappingâŻSâŻsatisfies the conjugacy relation
ââSâŻââŻFââŻ=âŻFđ°âŻââŻS
for all possible states. Consequently, for any time stepâŻt, the output bits produced by the two machines are identical:âŻzâ(t)âŻ=âŻzđ°(t). The paper proves thatâŻSâŻexists, is unique, and can be computed efficiently from the feedback polynomialâŻfâŻand the register lengthâŻn.
The construction ofâŻSâŻrelies on representing the nonlinear feedback function as a multivariate Boolean polynomial. By extracting the contribution of each monomial to individual register bits, the authors build a âfeedback influence matrixââŻM_fâŻthat captures how a change in any bit propagates through one transition of the Fibonacci machine. The mappingâŻSâŻis then expressed as a composition of a linear transformation defined byâŻM_fâŻand a set of nonlinear correction terms that compensate for the differing update rules. The authors provide an explicit recursive algorithm: starting from the mostâsignificant bit ofâŻxâ, they iteratively compute the corresponding bits ofâŻyââŻby evaluating the relevant monomials and applying XORâbased adjustments. The algorithmâs computational complexity isâŻO(n¡d), whereâŻdâŻis the highest degree ofâŻf, making it practical even for registers of 256 bits or more.
To validate the theory, the authors implement three representative NLFSRs: (1) a 128âbit register with a cubic feedback polynomial, (2) a 256âbit register with a quartic polynomial, and (3) a 160âbit register commonly used in streamâcipher constructions. For each case they instantiate both configurations, generate a random Fibonacci initial state, compute the corresponding Galois state usingâŻS, and then compare the output streams. The results show perfect alignment: the period, linear complexity, and statistical properties (NIST SPâŻ800â22 test suite) are identical. Moreover, the hardware cost of the Galois version after applyingâŻSâŻis reduced by roughly 12âŻ% in gate count because the Galois architecture eliminates the need for a large shiftâregister chain.
Beyond the immediate engineering benefit, the paper highlights several broader implications. First, designers can freely choose the architecture that best fits area, power, or timing constraints without sacrificing functional equivalence, simply by applying the mappingâŻSâŻduring system initialization. Second, security analyses that previously had to treat the two configurations as distinct can now be unified, simplifying proofs of cryptographic properties such as resistance to correlation attacks. Third, the deterministic nature ofâŻSâŻeliminates a source of sideâchannel leakage: an attacker who observes power consumption during initialization cannot infer which architecture is being used, because the observable state transition pattern is the same after the mapping.
The conclusion emphasizes that the mappingâŻSâŻprovides a rigorous foundation for NLFSR equivalence, closing a gap between theory and practice that has persisted since the early adoption of Galoisâtype NLFSRs in hardware cryptography. The authors suggest future work on extending the approach to composite NLFSRs with multiple feedback functions, to dynamically reconfigurable registers, and to postâquantumâresistant designs where the feedback polynomial may be chosen from a larger algebraic class. By offering a concrete, lowâcomplexity method for aligning initial states, the paper paves the way for more flexible, efficient, and provably secure NLFSRâbased primitives.