<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Using Chernoff bound to statistical tests independence checking</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lyudmila Kovalchuk</string-name>
          <email>lusi.kovalchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Rodinko</string-name>
          <email>m.rodinko@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Oliynykov</string-name>
          <email>roliynykov@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>G.E. Pukhov Institute for Modelling in Energy Engineering</institution>
          ,
          <addr-line>General Naumov Str. 15, Kyiv, 03164</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>Svobody Sq. 4, Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>and Tatiana Klymenko</institution>
        </aff>
      </contrib-group>
      <fpage>207</fpage>
      <lpage>216</lpage>
      <abstract>
        <p>In our work, we proposed, a strictly justified, method for testing independence verification and created a corresponding algorithm. We applied this algorithm to different test suits and obtained rather expected results, which indirectly confirms the correctness of our method. As we mentioned above, the proposed methods have several advantages: require fewer sequences, than the method based on approximation with normal distribution, may verify not only pairwise independence, in the most important cases, gives a more precise critical region, than the method based on Chebyshev inequality. Using this method, we show that statistical tests from the widely used suits are independent. In this connection, it is interesting to note that the older version of NIST tests (published in 1999), which consists of more tests than the recent version, turned out to be dependent. There are no explanations from the authors of the updated version, to why they removed some tests, but our very method explained this fairly.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;pseudorandom number generators</kwd>
        <kwd>statistical tests</kwd>
        <kwd>NIST STS</kwd>
        <kwd>cryptology1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        that are currently used for the analysis of crypto primitives and the generation of key data,
performs a comparative analysis of them, and provides recommendations for their application.
From this work, as well as similar works [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3-6</xref>
        ] we can draw the following conclusions.
1.
      </p>
      <p>
        Currently, for various tasks in the field of cryptology, only three main sets of statistical
tests are used in the world, which have practically not changed over the past 10-20 years:
NIST STS SP 800-22 (developed in the 2000s, the latest modification [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ]); Diehard test set [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ]
and its minor and few modifications (e.g., [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ]); a set of 5 easy-to-implement entropy tests
ENT [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ] and its modern modification ENT-string [
        <xref ref-type="bibr" rid="ref10">11</xref>
        ].
      </p>
      <p>
        One of the main issues on the way to optimizing the process of verifying the cryptographic
qualities of a crypto primitive is the optimization of the set of statistical tests itself, in
particular, increasing its speed [
        <xref ref-type="bibr" rid="ref4">4,5</xref>
        ]. As shown by the work [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ], the most effective way to
optimize an arbitrary set is to eliminate the so-called "redundant" tests from it (this was the
modification [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ], where the redundant test was removed). The best way to solve such
questions is to use the previously introduced notion of independence of statistical tests
[
        <xref ref-type="bibr" rid="ref11 ref12">12,13</xref>
        ], which has proven itself well in practical applications. The approach proposed in
our works to the issue of independence of tests is significantly more general than in the
work [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ], because, unlike this work, analyses the independence of tests in the aggregate,
and not pairwise, as in [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ].
      </p>
      <p>
        Another important issue is the choice of a set of tests that is best suited for a specific task.
So, for the testing of RNG/PRNG during admission to operation and first implementation,
the largest and most "demanding" set is required; for quality control of key data smaller,
but one that prevents directed sorting of keys; for constant control of the allowed
RNG/PRNG significantly smaller than during admission. These questions are raised in
[56] with an indication of their importance, but a concrete answer to them is not provided.
An important direction, which is not sufficiently covered in the scientific literature, is the
use of statistical tests to check the independence of the sequence of internal states of a
crypto primitive and its output sequences. Such a correlation significantly reduces the
property of unpredictability of the original sequence and makes the algorithm vulnerable to
statistical attacks. The method of conducting such a correlation analysis was proposed by
us for the first time in [
        <xref ref-type="bibr" rid="ref13">14</xref>
        ], it can be expanded and generalized for wider use.
      </p>
      <p>From all of the above, it is clear that, on the one hand, the issue of creating an effective (from
the point of view of quality and speed) set of statistical tests for evaluating the cryptographic
qualities of RNG/PRNG and their individual sequences is very relevant and is widely studied in
modern scientific publications of a high scientific level; on the other hand, there are still many
unanswered questions; one of these issues is the verification of the independence of statistical tests
and the recognition of "redundant" tests that increase the time of testing but practically do not
affect its results.</p>
      <p>Intuition. For a better understanding of the problem statement, consider the following
example. Let a certain package of statistical tests be used to check the cryptographic qualities of
RNG/PRNG, well, for example, the NIST package consisting of 15 tests (not including subtests).
consuming. Suppose that, while studying the results of testing a large set of sequences, we notice
that one of the tests never makes independent decisions. Formally, this means the following: if we
remove this test from the set, the set of sequences that passed all tests will not change. That is, if
we create a new package, P2, by removing such a redundant test, then the set of sequences that
pass all tests from set P1 coincides with the set of sequences that pass all tests from set P2. That is,
by removing the test, we did not deteriorate the quality of testing, but significantly reduced its
time.</p>
      <p>Generalizing this example, we can consider a situation where the test "almost" does not make
independent decisions. Or if some subset of tests from that set has tests that are redundant to that
subset.</p>
      <p>It is impossible to "manually" go through all possible subsets and try to remove unnecessary
tests from them. And here the methods of statistical analysis come to the rescue. Because all the
situations described above are partial cases of what can be called the dependence of tests in the
aggregate, and the tools of mathematical statistics can be used to detect such dependence.</p>
      <p>
        Our impact. The results obtained in this work improve the methods proposed in the
works [
        <xref ref-type="bibr" rid="ref11 ref12">12,13</xref>
        ]. For example, in the work [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ], a method for checking the independence of statistical
tests was proposed, which uses the asymptotic approximation of the probability distribution of a
certain sum of random variables by the standard normal distribution. The disadvantage of this
method is that there is no estimate of the rate of convergence of the distribution to normal, except
for the Barry-Essen formula [
        <xref ref-type="bibr" rid="ref14">15</xref>
        ], which is considered a rather rough estimate. Therefore, to
guarantee the use of such an approximation, it is necessary to take a very large number of
sequences
      </p>
      <p>
        about 100,000, which requires a very long testing time and a large computing resource.
And if, instead of approximation, Chebyshev's inequality is used, as done in the work [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ], then the
critical area is significantly narrowed, since this inequality is a rather rough estimate. Moreover, in
some cases this method can even give trivial estimates and become unusable. In this paper, we
propose another method using Chernov's inequality. It does not require as many sequences as the
first named, and in some cases gives a more accurate critical region than the second. By comparing
these two methods (based on the Chebyshev and Chernov inequalities), we will analyse in which
cases which method gives more accurate estimates.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and Methods</title>
      <p>In what follows, we will use the terms Random Number Generator (RNG) and Pseudorandom
Number Generator (PRNG) for such types of number generators, which use some physical source
during their work (for RNG) and use only random seed and then works deterministically. Often, we
will formulate statements of definitions, which may be applied to both these types. In such cases,
{ ( )}
 =1</p>
      <p>, where  ( ) = { 1( ), … ,  
test suit, obtained from some (P)RNG G.</p>
      <p>Let us have some set T of statistical tests,  = { 1, … ,   }, and some set of sequences,  =
( )} ,  = ̅1̅̅,̅̅, is a binary sequence with the lengths l fit for this</p>
      <p>For a test   and some sequence  ( ), taken from the corresponding suits, we define the event

 ( ) =  {
 ( ) 
 ℎ 
  }. For some fixed   , we can consider the sequences  
( )
as the realization of some random variable (RV)   , which describes the behavior of the test   on
the sequence obtained from the generator G.</p>
      <sec id="sec-2-1">
        <title>Definition 1.</title>
        <p>are statistically independent.</p>
        <p>
          In other words, the independence of the test means that the result of the application of the test
Note that, according to Definition 1, the conclusion of tests independence may be different for
different generators. In what follows, we also assume that the (P)RNG that we use is perfect, i.e.
indistinguishable from the true random generator. There exists a lot of such generators, for
example, BBS [
          <xref ref-type="bibr" rid="ref15">16</xref>
          ], or standardized generators, described in [
          <xref ref-type="bibr" rid="ref16">17</xref>
          ] and [
          <xref ref-type="bibr" rid="ref17">18</xref>
          ]. The case of the creation
of tests suit, which are independent w.r.t. perfect generators, is of the most interest because only
perfect generators are used in
        </p>
        <p>cryptographic applications. Two perfect generators are
undistinguished, so the tests which are independent w.r.t one of such generators are independent
w.r.t. to any other.</p>
        <p>G), if   ,</p>
      </sec>
      <sec id="sec-2-2">
        <title>Chernoff inequality [19].</title>
        <p>Let  1, … ,   be independent random variables, which take binary values. Define
Then for arbitrary  ∈ (0,1) the next inequality holds:</p>
        <p>= ∑ =1   and set</p>
        <p>P ( X −      )  2  e 3
The proof of the next Proposition is based on Chernoff inequality.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Proposition 1.</title>
        <sec id="sec-2-3-1">
          <title>Let statistical tests  1, … ,</title>
          <p>sequences from the set { ( )}</p>
          <p>=1
(the same for all tests). Then, for arbitrary  ∈ (0,1), the next equality holds:</p>
          <p>are independent. Define  the RV, equal to the number of
, which passed all the tests, for some preset significance level</p>
          <p>P(  −    )  
Similarly, we can define a mutual tests independence.</p>
          <p>Definition 2. Tests from suite  = { 1, … ,   } are called independent (w.r.t. some fixed
generator G) if the corresponding RVs are mutually independent.</p>
          <p>Let m be the number of tests in a suite,   ,  = ̅1̅̅,̅̅̅ be the significance levels of the relevant
test; n
 0 be a hypothesis
that all tests from the suit are mutually independent;  be the probability to reject  0 under the
condition that it is correct. The alternative hypothesis is complicated and may be formulated as</p>
          <p>In what follows, we will use Chernoff bound to find the edges of critical region. There exist a lot
of different versions of Chernoff inequality, among which we choose the one in the form given in</p>
          <p>Introduce RVs
Next, define RV
Finally, define the RV
2 and  =  ∙ (1 −  ) .</p>
          <p>( ) = {</p>
          <p>1,   ℎ  −  ℎ 

 ( ) = {</p>
          <p>1,   ℎ  −  ℎ 
Note that  ( ) ∈ {0,1}. Using this fact and independence of RVs  
( ), we get</p>
          <p>E ( j) =  Ei( j) = (1 − )m
Var ( j) = (1 − )m  (1 − (1 − )m )
,
 =  ( j)</p>
          <p>j=1
equal to the number of sequences passed all tests.
Note that  = 
=  ∙ (1 −  ) and</p>
          <p>=  ∙ (1 −  ) ∙ (1 −  ∙ (1 −  ) ).</p>
          <p>Then apply Chernoff inequality to RV  and define  in a such way that the right part of the
equality be equal to A; obtain the inequality
for   = √3 ∙</p>
          <p>P (   −    ;  +     )  </p>
          <p>Based on Proposal 1, we can create the next algorithm for tests mutually independence.</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Chernoff inequality.</title>
        <p>Input: number of tests m;
number of tests n;
set of tests  = { 1, … ,   };
set of sequences { ( )}
 =1</p>
        <p>;
significance level α for testing sequences;
significance level β for verifying hypothesis  0.</p>
        <p>Step 1. Calculate and  =  ∙ (1 −  ) and   = √3 ∙  

2
.</p>
        <p>Step 2. Calculate  =   ∙  .</p>
        <p>Step 3. Applying tests from the suit to input sequences, find the number k of sequences, which
passed all tests.</p>
        <p>Step 4. Calculate credential interval as</p>
        <p>( I1, I2 ) = ( − C,  + C ) .</p>
        <p>Step 5. If  ∈ ( 1,  2), then  0 is accepted, otherwise it is rejected.</p>
        <p>Output:</p>
        <p>
          Example 1. Verification tests independence for NIST using PRNG defined in [
          <xref ref-type="bibr" rid="ref19">20</xref>
          ] and in
Appendix A in DSTU 9041:2020 [
          <xref ref-type="bibr" rid="ref17">18</xref>
          ].
        </p>
        <p>The input data were chosen as:
•
•
•
•
the number of the sequences is n = 300;
the significance level (for each test) is α = 0.01;
the number of tests in the suit is m = 41 (counting all subtests);
the significance level for hypothesis  0 verification is β = 0.0001.</p>
        <p>For this data, according to the Algorithm 1, we calculate the credential interval:
suit are mutually independent.
considered mutually independent.</p>
      </sec>
      <sec id="sec-2-5">
        <title>Example 2.</title>
        <p>
          ( I1, I2 ) = (121.9, 275.5)
It is essentially smaller than the previous one, but even for such a significance level tests may be
Verification tests independence for the set of 6 simple tests described in [
          <xref ref-type="bibr" rid="ref12">13</xref>
          ]. These tests are:
- frequency monobit text;
- frequency bigram test;
- number of series test;
- the maximal series length test;
- the sum of places of symbols test;
- inverse test.
the number of the sequences is n = 300;
the significance levels (the same level for all tests) are: α = 0.001; α = 0.005; α = 0.01; α =
0.05;
the number of tests in the suit is m = 6 (counting all subtests);
the significance level for hypothesis  0 verification is β = 0.01.
        </p>
        <p>For this data, according to the Algorithm 1, we obtained the next results.
1. For α = 0.001.</p>
        <p>In this case  = 298.2 and     = 68.9 , so the credential interval is</p>
        <p>( I1, I2 ) = (229.3, 300) .</p>
        <p>The number of sequences, which passed all tests, is 300. We can conclude that the tests from the
suit are mutually independent.</p>
        <p>2. For α = 0.005.</p>
        <p>In this case  = 291.1 and     = 68 , so the credential interval is</p>
        <p>( I1, I2 ) = (223.1, 300) .</p>
        <p>The number of sequences, which passed all tests, is 298. We can conclude that the tests from the
suit are mutually independent.</p>
        <p>3. For α = 0.01.</p>
        <p>In this case  = 282.4 and     = 67 , so the credential interval is</p>
        <p>( I1, I2 ) = (215.4, 300) .</p>
        <p>The number of sequences, which passed all tests, is 295. We can conclude that the tests from the
suit are mutually independent.</p>
        <p>4. For α = 0.05.</p>
        <p>In this case  = 221 and     = 59.3 , so the credential interval is</p>
        <p>( I1, I2 ) = (161.7, 280) .</p>
        <p>The number of sequences, which passed all tests, is 249. We can conclude that the tests from the
suit are mutually independent.</p>
        <p>As we see, tests may be considered as independent even for relatively large value of . Indeed,
the number of tests is relatively small, and in such cases tests usually are independent. So in these
examples we obtained expected results, which indirectly confirms the correctness of the method
and corresponding algorithm.</p>
        <p>
          Now we are going to show that the proposed method of test independence verification may give
tighter credential intervals, than a similar method based on Chebyshev inequality [
          <xref ref-type="bibr" rid="ref12">13</xref>
          ].
        </p>
        <p>In our designations, if  ≤ 0.05 and the values α and m are such that (1 −  ) &lt; 0.442, then
the critical region, obtained using Chernoff inequality, is larger, than using Chebyshev one.</p>
      </sec>
      <sec id="sec-2-6">
        <title>Proposition 2.</title>
        <p>According to Proposition 1, the hypothesis  0 is accepted if
where  1 =  ∙  ,  =  ∙ (1 −  ) , and   = √3 ∙  

2
.</p>
        <sec id="sec-2-6-1">
          <title>We may rewrite  1 as</title>
          <p>If we use Chebyshev inequality instead of Chernoff inequality, we get the other credential
k ( − С1,  + С )</p>
          <p>1 ,
С =
1
3  ln

2
</p>
          <p>  = 3   ln
k  ( − С2,  + С )
2 ,
2
 .</p>
          <p>
(1 − (1 − )m )

.
interval:
where (using (1))</p>
          <p>C =
2</p>
          <p>Var =

  1 −


 </p>
          <p>
n  =
n  (1 − )m  (1 − (1 − )m )
.</p>
          <p>In these designations to prove that critical region with  1 is larger than with  2 is the same as
to prove that  1 &lt;  2, or that the next inequality holds:
3  ln</p>
          <p>
2


2

ln
2

2

  ln 40
40</p>
          <p>First, note that for  ≥  the function ln  decreases if x increases. Then, for  ≤  ≤  (for some
 ∈  ) we have ln  ≤</p>
          <p>ln  .</p>
          <p>In our conditions,  ≤ 0.05, then for  = 2 ≥ 40 we have:
and</p>
          <p>On the other hand,
(1 − (1 − )m )


1 − (1 − )

=


 0.558  
according to the proposition assumption, and the Proposition is proved.</p>
          <p>Example 3: the conditions of the Proposition 2 hold in such cases:
the value of
preferable.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>As common recommendations, we may say that the method based on Chernoff inequality
works better for the cases when we have a small value of and/or relatively large (w.r.t. )
and/or
large number m of tests. Note that in the overwhelming majority of applications, the value of
is
chosen as 0.001 or even smaller, which is just the case for applying the proposed method. But in
case when the number of tests is relatively small (less than 10, for example), and at the same time
is not large than 0.01, the method which uses Chebyshev inequality is more
Tests independence is a very important and useful property. First, by avoiding using redundant
tests, we may significantly reduce testing time, so may create key data for users more efficiently.
Secondly, if the tests being applied are independent, we may, with some insignificant error, predict,
what proportion of sequences will be rejected, and, therefore, understand how many sequences we
need to generate to have the required volume of key data. For example, if we need to have 1000 key
sequences, and know that the tests which are used are independent, then, if the significance level is
, the proportion of rejected sequences is, on average,  = 1 − (1 −  ) , where m is the number
of tests. Then to get k sequences for key data, we need to generate about

(1− ) sequences.</p>
      <p>
        Note that in the NIST document [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ] one can find some considerations about the importance of
considered as sounded: it consists of calculating P-values for each pair test/sequence, then creating
a matrix of these P-values (one row corresponds to one test) and checking the linear independence
of the rows. This approach has no justification, and it seems very unlikely that for dependent tests
such rows will be linearly dependent.
      </p>
      <p>
        In our work, we proposed, a strictly justified, method for testing independence verification and
created a corresponding algorithm. We applied this algorithm to different test suits and obtained
rather expected results, which indirectly confirms the correctness of our method. As we mentioned
above, the proposed methods have several advantages:
•
•
•
require fewer sequences, than the method based on approximation with normal
distribution [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ];
some ideas from [
        <xref ref-type="bibr" rid="ref21">22</xref>
        ];
may verify not only pairwise independence, as methods, proposed in [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ] and based on
in the most important cases, gives a more precise critical region, than the method based
on Chebyshev inequality [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ].
      </p>
      <p>Using this method, we show that statistical tests from the widely used suits are independent. In
this connection, it is interesting to note that the older version of NIST tests (published in 1999),
which consists of more tests than the recent version, turned out to be dependent. There are no
explanations from the authors of the updated version, to why they removed some tests, but our
very method explained this fairly.</p>
      <p>
        Also note that we could not obtain the corresponding numerical examples for DIEHARD
suit [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ]. The matter is that the tests in this suit are created in other way, which gives no
opportunity to get one result for one sequence. For such suit the method of results processing
should be completely different.
      </p>
      <p>As we mentioned in Definition 1, the notion of test independence may depend on the type of
generator, more precisely
on the type and properties of probability distribution on its outputs.
Though we develop the methodic for most common use case, such as perfect generator testing, the
similar approaches may be developed for other cases of output distribution. Generally speaking, for
different types of output distributions we may obtain different sets of independent tests. But our
experimental results, which we provided for generators with different types of output distributions
(we did not include extend version of such investigation because of volume restriction) shows that
two test suits, described above, turned out to be independent for several non-perfect types of
generators, which output distribution was artificially biased from equiprobable. Of course, such
independence, but show that the test suit may be the same for different cases of generators.</p>
      <p>The other interesting question, directly connected with the topic of presented research, is the
next: when the test suit turned out to contain dependent tests, what tests should be considered as
redundant and removed from the suit? Informally speaking, our answer is: such tests, that make
passing all tests will not change essentially, so the mutual first type error will remain the same too.
Usually, the number of the tests in suit allows to check all tests decisions and to remove redundant</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgements</title>
      <p>The results of this work were obtained within the project 2023.04/0020 Development of methods
and layout of the "DEMETRA" ARM for constant and periodic control of the functioning of
cryptographic applications using statistical methods.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] Cabinet of Ministers of Ukraine. (
          <year>2021</year>
          ).
          <article-title>Cybersecurity Strategy of Ukraine. Secure Cyberspace is the Key to the Successful Development of the Country</article-title>
          . [Online]. Retrieved from https://zakon.rada.gov.ua/laws/show/447/2021#n12
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Almaraz</surname>
          </string-name>
          <string-name>
            <surname>Luengo</surname>
          </string-name>
          ,
          <article-title>Statistical tests suites analysis methods</article-title>
          .
          <source>Cryptographic recommendations, Cryptologia</source>
          <volume>48</volume>
          (
          <issue>3</issue>
          ) (
          <year>2023</year>
          )
          <fpage>219</fpage>
          251. doi:
          <volume>10</volume>
          .1080/01611194.
          <year>2022</year>
          .
          <volume>2155093</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Almaraz Luengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Román</given-names>
            <surname>Villaizán</surname>
          </string-name>
          ,
          <article-title>Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test Suite</article-title>
          ,
          <source>Mathematics</source>
          <volume>11</volume>
          (
          <issue>23</issue>
          ):
          <volume>4812</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/math11234812 Chakraborty,
          <string-name>
            <given-names>V.</given-names>
            <surname>Matyas</surname>
          </string-name>
          , P. Schaumont, (Eds.), Security, Privacy, and Applied Cryptography Engineering.
          <source>SPACE</source>
          <year>2014</year>
          , volume
          <volume>8804</volume>
          of Lecture Notes in Computer Science, Springer, Cham,
          <year>2014</year>
          , pp.
          <fpage>272</fpage>
          <lpage>284</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -12060-7_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Luengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.A.</given-names>
            <surname>Olivares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. J. G.</given-names>
            <surname>Villalba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hernandez-Castro</surname>
          </string-name>
          ,
          <article-title>Further analysis of the statistical independence of the NIST SP 800-22 randomness tests</article-title>
          ,
          <source>Applied Mathematics and Computation 459</source>
          <volume>128222</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/J.AMC.
          <year>2023</year>
          .128222
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.A.</given-names>
            <surname>Luengo</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.J.G. Villalba,</surname>
          </string-name>
          <article-title>Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>54</volume>
          ,
          <issue>4</issue>
          ,
          <string-name>
            <surname>Article 80</surname>
          </string-name>
          (
          <year>2021</year>
          ). pp.
          <fpage>1</fpage>
          -
          <lpage>34</lpage>
          . doi:
          <volume>10</volume>
          .1145/3447773
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.E.</given-names>
            <surname>Bassham</surname>
          </string-name>
          <string-name>
            <given-names>III</given-names>
            ,
            <surname>A.L. Rukhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Soto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.R.</given-names>
            <surname>Nechvatal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.E.</given-names>
            <surname>Smid</surname>
          </string-name>
          , E.B.
          <article-title>Barker and others, A statistical test suite for random and pseudorandom number generators for cryptographic applications</article-title>
          ,
          <source>NIST Special Publication</source>
          <volume>800</volume>
          -22,
          <string-name>
            <surname>Revision</surname>
            <given-names>1a</given-names>
          </string-name>
          , (
          <year>2010</year>
          ). URL: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-
          <fpage>22r1a</fpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Marsaglia</surname>
          </string-name>
          ,
          <article-title>The Marsaglia random number CDROM including the diehard battery of tests of randomness</article-title>
          , (
          <year>2008</year>
          ). http://www. stat. fsu. edu/pub/diehard/.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.G.</given-names>
            <surname>Brown</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Eddelbuettel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bauer</surname>
          </string-name>
          , Dieharder. Duke University Physics Department Durham NC 27708-
          <fpage>0305</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Walker</surname>
          </string-name>
          ,
          <article-title>A pseudorandom number sequence test program</article-title>
          , (
          <year>2008</year>
          ). https://www.fourmilab.ch/random/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Almaraz Luengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. Alaña</given-names>
            <surname>Olivares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.J. García</given-names>
            <surname>Villalba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hernandez-Castro</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>HurleySmith, StringENT test suite: ENT battery revisited for efficient P value computation</article-title>
          ,
          <source>Journal of Cryptographic Engineering</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2023</year>
          )
          <fpage>235</fpage>
          -
          <lpage>249</lpage>
          . doi:
          <volume>10</volume>
          .1007/s13389-023-00313-5
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bezditnyi</surname>
          </string-name>
          ,
          <article-title>A statistical tests independence checking intended for cryptographic properties of RNG estimation</article-title>
          ,
          <source>Ukrainian Information Security Research Journal</source>
          <volume>2</volume>
          (
          <issue>29</issue>
          ) (
          <year>2006</year>
          )
          <fpage>18</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kochana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuchynska</surname>
          </string-name>
          , Statistical Tests Independence Verification Methods, Procedia Computer Science Volume
          <volume>192</volume>
          (
          <year>2021</year>
          ).
          <fpage>2678</fpage>
          -
          <lpage>2688</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.procs.
          <year>2021</year>
          .
          <volume>09</volume>
          .038.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.V.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.V.</given-names>
            <surname>Koriakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.N.</given-names>
            <surname>Alekseychuk</surname>
          </string-name>
          ,
          <article-title>Krip: High-Speed Hardware-Oriented Stream Cipher Based on a Non-Autonomous Nonlinear Shift Register</article-title>
          ,
          <source>Cybernetics and Systems Analysis</source>
          <volume>59</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          ).
          <fpage>16</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10559-023-00538-6
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>W.</given-names>
            <surname>Feller</surname>
          </string-name>
          .
          <article-title>An introduction to probability theory and its applications</article-title>
          , Vol.
          <volume>2</volume>
          (Vol.
          <volume>81</volume>
          ). John Wiley &amp; Sons. (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Pareek</surname>
          </string-name>
          ,
          <article-title>An overview of cryptographically secure pseudorandom number generators and BBS."</article-title>
          <source>International Journal of Computer Applications (IJCA)(0975 8887)</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <article-title>Information technologies</article-title>
          .
          <article-title>Cryptographic protection of information. A digital signature based on elliptic curves. Formation and verification</article-title>
          , DSTU 4145-
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <article-title>Information technologies</article-title>
          .
          <article-title>Cryptographic protection information. Short message encryption algorithm based on Edwards twisted elliptic curves</article-title>
          ,
          <source>DSTU</source>
          <volume>9041</volume>
          :
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Goemans</surname>
          </string-name>
          , Chernoff bounds,
          <source>and some applications, 18.310 lecture notes February</source>
          <volume>21</volume>
          ,
          <year>2015</year>
          . URL: https://math.mit.edu/~goemans/18310S15/chernoff-notes.pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <article-title>Information technologies</article-title>
          .
          <article-title>Cryptographic protection of information. Algorithm of symmetric block transformation</article-title>
          ,
          <source>DSTU</source>
          <volume>7624</volume>
          :
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Kovalchuk</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davydenko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bespalov</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <article-title>New statistical criteria for checking independence of bit random variables and sequences</article-title>
          .
          <source>In Advances in Information-Control Systems and Technologies, ODESA</source>
          ,
          <year>2024</year>
          , p.
          <fpage>344</fpage>
          -
          <lpage>362</lpage>
          . ISBN 978-617-7857-33-3.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <surname>T.W. Anderson</surname>
          </string-name>
          ,
          <article-title>An Introduction to Multivariate Statistical Analysis</article-title>
          ,
          <source>3rd Edition</source>
          , Wiley, (
          <year>2003</year>
          )
          <fpage>380</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>