<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>O. Bespalov).</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A new extended strategy of processing of statistical testing results⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lyudmila Kovalchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hanna Nelasa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Rodinko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Bespalov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>G.E. Pukhov Institute for Modelling in Energy Engineering</institution>
          ,
          <addr-line>General Naumov Str. 15, Kyiv, 03164</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>Svobody Sq. 4, Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>This article proposes The Strategy for processing of testing which may be applied for arbitrary tests suit in which tests are independent and based on limit distributions. Testing parameters, used in Strategy, may be chosen depending on different factors, such as sphere of application of generator, our confidence of its quality, terms between planned testings, existing of other quality checkings. We also may change the number of tests in suit, reducing their number for regular everyday testing and increase it for testing before generator adoption. The Strategy summarizes testing results in one decision about quality of (P)RNG and possibility of its usage in cryptographic applications.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;pseudorandom number generators</kwd>
        <kwd>statistical tests</kwd>
        <kwd>NIST STS</kwd>
        <kwd>cryptology1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>probability of exactly ½ for each of outcomes. Each coin flip is independent of the others: the
outcome of any previous coin flip does not influence future coin flips. Therefore, the value of the
next element in the sequence remains unpredictable, no matter how many elements have already
been generated.</p>
      <p>In modern cryptography, generating sequences of 1,000,000 to 10,000,000 bits is often required,
making the use of unbiased coins impractical for cryptographic purposes. Nonetheless, the
hypothetical output of an ideal true random bit sequence generator serves as a benchmark for
evaluating random and pseudorandom number generators.</p>
      <p>The RNG employs a non-deterministic source (entropy source) combined with a processing
function to generate randomness. This processing function is necessary to address any weaknesses
in the entropy source that may lead to non-random numbers, such as extended sequences of zeros
or ones.</p>
      <p>The outputs of an RNG can be used directly or as input for a PRNG. If the output is used
without further processing, it needs to satisfy strict randomness criteria, which is verified using
corresponding statistical tests. Be aware that certain physical sources (e.g., date/time vectors) can
be quite predictable. To address this issue, combining outputs from various types of sources can be
used as inputs for an RNG. However, this process may be too time-consuming, making it
impractical when a large amount of random bits is required.</p>
      <p>To produce large quantities of random bits, PRNGs are more preferable. A PRNG uses one or</p>
      <sec id="sec-1-1">
        <title>Inputs to PRNGs are known as seeds. When unpredictability is essential, the seed must be both random and unpredictable. Therefore, a PRNG should typically acquire its seeds from the outputs of an RNG, meaning a PRNG relies on an RNG.</title>
        <p>The outputs of a PRNG are usually deterministic functions of the seed, meaning all true
randomness is limited to seed generation. The deterministic nature of this process is what gives
rise to the term 'pseudorandom.'</p>
        <p>
          To verify the cryptographic quality of (P)RNG, the suit of statistical tests should be applied to
outputs of generator, which purpose, informally speaking, is to compare the output sequence to a
truly random sequence. The characteristics of a random sequence can be expressed through
probability. The expected results of statistical tests, when applied to a genuinely random sequence,
are known in advance and can serve as a basis for comparison. There exists a huge number of
different statistical tests and several test suites [
          <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-17</xref>
          ], but at the same time no specific finite tests
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>The results of statistical testing should be interpreted carefully and</title>
        <p>cautiously to prevent drawing incorrect conclusions about a particular generator.</p>
        <p>Typically, the testing procedure may be described as follows. We formulate some hypothesis,
usually defined as  0, that the sequence under testing is truly random. The alternative hypothesis
 1
some value, called statistics, which may be calculated from the sequence elements and which,
under the  0 assumption, has some known probability distribution. After that we set some small
value  ∈ (0,1) st
region of criterion such subset of the set of all possible values taken by statistics, which has
probability α. Therefore, the probability that for true random sequence the obtained statistics gets
to the critical region is very small (usually we choose α = 0.01 or smaller). Then we calculate
statistics for tested sequence and accept  0, if statistics is outside the critical region, and reject it in
opposite case. So the 1st type error is the probability to reject  0 if it is true. The probability of the
2nd type error, to accept  0 if it is not true, is impossible to calculate in case of composite
hypothesis  1.</p>
        <p>There are huge number of articles, which develop new tests, or test suits, of investigate and
analyse the results of testing. This paper also analyses some aspects of testing (P)RNGs, more
precisely the Strategy of processing of testing results (below Strategy). Here we are not
considering the questions about the structure of test suit or about creating new statistical tests.
Instead, we are concentrating on the question about how to process the results of testing and to
obtaining the justified conclusion about the quality of (P)RNG.</p>
        <p>
          We take the Strategy, proposed in NIST SP 800-22, Revision 1a [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], as the base for our
investigation. The proposed Strategy has no explanation and justification, which cause the
impossibility of analysis of its consistence. Because of this, the main purposes of our work are:
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>1. to analyse the Strategy and consider what rationale may be behind it;</title>
      </sec>
      <sec id="sec-1-4">
        <title>2. to create corresponding justifications for each step of the Strategy;</title>
      </sec>
      <sec id="sec-1-5">
        <title>3. to analyse possible incorrections and fix them;</title>
      </sec>
      <sec id="sec-1-6">
        <title>4. to modify the Strategy, according to the obtained results, and extend it, if necessary,</title>
        <p>with additional steps.</p>
        <p>
          The article is organized as follows. In the Section 1 we give relative work survey. In Section 2
we give brief overview of testing procedure and Strategy for the Statistical Analysis, proposed in
NIST. Then we explain main issues of the Strategy. In Section 3 we proof several Propositions,
needed for formulation and justification of new modified and extended Strategy. Then, in Section 4,
we formulate this Strategy step-by-step, omitting such trivial steps as sequences creation and
generation. Finally, we give the results of its application to certified (P)RNG DSTU 7624:2014. We
conclude with summery of our results.
2. Analysing issues in NIST Strategy of processing of testing results
The revised version of NIST Test Suite (2010) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] consists of the following 15 tests: the Frequency
(Monobit) Test; frequency Test within a Block; the Runs Test; Tests for the Longest-Run-of-Ones in
a Block; the Binary Matrix Rank Test; the Discrete Fourier Transform (Spectral) Test; the
Nonoverlapping Template Matching Test; the Overlapping Template Matching Test; Maurer's
"Universal Statistical" Test; the Linear Complexity Test; the Serial Test; the Approximate Entropy
Test; the Cumulative Sums (Cusums) Test; the Random Excursions Test; the Random Excursions
Variant Test. These tests were developed to test the randomness of binary sequences produced by
(P)RNG. They try to check different types of non-randomness that could exist in a sequence.
        </p>
        <p>Note that the initial version of NIST tests, developed in 2000, contains one more test
Ziv</p>
      </sec>
      <sec id="sec-1-7">
        <title>Lempel complexity test.</title>
        <p>For interpretation of testing results, NIST uses Strategies for the Statistical Analysis (section
4.1), which consists of 5 steps. The 1st step is (P)RNG Selection, the 2nd is generating sufficient
number of sequences of required length (not less than 300 sequences, but 1000 is more preferable),
and the 3rd step is testing all generated sequences with all tests from the suit. The Analysis itself
consists of the 4th step, where the uniform distribution of P-values is checked, The proposed
Strategy have some issues, the most important are:
•
•
•
•
•
absence of justification;
absence of explanations how credential intervals were chosen;
inconsistency of significance levels for required intervals;
significance level may not coincide with the probability for statistics of truly random
sequence to get into critical region;
the Strategy analyses only the results of separate tests, without their mutual results.</p>
        <p>In the next sections, we are going to give more details about these issues and to fix them, giving
modified and extended Strategy with comprehensive justification.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. Materials and Methods</title>
      <sec id="sec-2-1">
        <title>Strategy), proposed in NIST STS.</title>
        <p>significance level α
In this section we give and prove several statements, which are basic for formulation and
justification of improved version of testing Strategy for processing of testing results (below</p>
      </sec>
      <sec id="sec-2-2">
        <title>NIST</title>
        <p>e binary sequence with the test T.</p>
        <p>The outcome of the experiment is 0, if the hypothesis  0 for this sequence is rejected with the test,
(P)RNG which is indistinguishable from Truly RNG.
cumulative distribution function.
Φ( ) for its
approximately has some definite distribution, like SND of  2, and the probability to pass the test
may be expressed using this distribution. Note that the majority of NIST tests are based on limit
distributions, but not all of them. For example, the well-known and widely used
18], formally speaking, is not based on limit distribution, because its
justification is partially empirical: the authors use Normal Distribution for approximation of sum of
dependent RVs (more details may be found in test description). For such tests correspondence
between significance level and critical region may be not precise.</p>
        <p>The next Propositions are strongly proved only for tests which are based on limit distributions,
because we will assume that the significance level is equal to the probability of sequence to get to
the critical region. But it need be noted that NIST Strategy is implicitly based on the similar
propositions and is applied for all tests without restrictions. It makes the Strategy partially
empirical, and also may cause the situation when P(P)RNG may be rejected. In such cases, when
recommended to define the significance levels for different statistics values using some
2</p>
        <p>Proposition 1. Let us do n independent experiments with test T for sequences obtained from</p>
      </sec>
      <sec id="sec-2-3">
        <title>P(P)RNG for some preset significance level α. Define k</title>
      </sec>
      <sec id="sec-2-4">
        <title>Then, for sufficiently large n and chosen  ∈ (0,1), the next equality holds:</title>
        <p></p>
        <p>S
 n



where   is defined from the equality Φ(  ) = 1 − .</p>
        <p />
        <p>Proof. Let  = {  } =1 be the sequence of independent equally distributed random variables
(RVs), where   ∈ {0,1},  = ̅1̅̅,̅̅ are defined as
  = {
1,  
   −  ℎ 
 ℎ</p>
        <p>1;

2</p>
        <p>Then, as experiments used the sequences from P(P)RNG, for all  = ̅1̅̅,̅̅ we get:
Eξi = P (ξi = 1) = 1 − α</p>
        <p>(σ)2 = Var (ξi ) = α  (1 − α) ,
for some  ∈ (0,1). Note that the second equality in (2) follows from the first one and from
assumption that   ∈ {0,1}.</p>
      </sec>
      <sec id="sec-2-5">
        <title>Define the new RV as</title>
        <p>0,
,
(1)
(2)
.</p>
        <p>(3)
(4)
Then, as   ,  = ̅1̅̅,̅̅, are independent and equally distributed,</p>
        <p>= ∑ =1   =  ∙ (1 −  ) and</p>
        <p>(  ) = ∑ =1</p>
        <p>(  ) =  ∙  ∙ (1 −  ).</p>
        <p />
        <p>In these designations, the RV is the number of experiments with outcome 1 among all n
experiments, and the value   is the proportion of experiments with such outcome.</p>
        <p>
          According to Central Limit Theorem [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], for sufficiently large n, the probability distribution of
RV
n = n
        </p>
        <p>S − n  (1 − )
n  (1 − ) </p>
        <p>S
= n
n − (1 − )
(1 − ) 
n
may be approximated with SND as</p>
        <p>P(n  x) = (1 − ( x)) + (−x) = 2 − 2   ( x)
For some quantile A define such   that 2 − 2 ∙ Φ(  ) =  , or Φ(  ) = 1 − .</p>
        <p>Then  (|  | ≥   ) =  , which may be rewritten as
</p>
        <p>S
 n



 = 0.99865, or  = 0.0027. It means that the probability that
the proportion of sequences is outside the interval is about 0.0027.</p>
        <p>
          Proposition 2. Let us have n outcomes of independent experiments with test T for sequences
obtained from P(P)RNG for some preset significance level α. Consider RV   =  ( ,  ) which
takes values which are equal to corresponding P-values, obtained in experiments. Then RV   is
uniformly distributed on [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ].
        </p>
        <sec id="sec-2-5-1">
          <title>Proof. Let   ( ) be cumulative distribution function of test statistics   :</title>
          <p>P (U</p>
          <p>T (a, b)) = FT (b) − FT (a)</p>
          <p>
            Then for arbitrary ( ,  +  ) ⊂ [
            <xref ref-type="bibr" rid="ref1">0,1</xref>
            ]:
          </p>
          <p>P( PT ( x, x + )) = P(U</p>
          <p>T ( FT −1 ( x + ), FT −1 ( x))) =
= FT ( FT −1 ( x + )) − FT ( FT −1 ( x)) = x + − x = 
which means that   has uniform distribution.</p>
          <p>To verify uniform distribution of P-values for each test, NIST Strategy proposes to use 
2criterion (more precisely</p>
          <p>its modification with gamma-function) with significance level  =
10−4. Because of this, it is unclear why the Strategy proposes much more higher significance level,
A = 0.0027, for its previous step. To remove such unfairness, it`s better to use the same significance
level,  = 10−4, for both steps. In this case we get   = 4 instead of   = 3, and the corresponding
interval for proportion of sequences passed the test will be



1 − − 4 </p>
          <p>
            As we mentioned before, these two statements may be used to justify the NIST Strategy,
described in section 4.2.1 [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ], but only for such separate tests which are based on some limit
distributions. Below we give one more statement, which allows to extend NIST Strategy in a such
way, that take into account not only separate tests behaviour, but also the mutual behaviour of
them. In what follows we will use the notation of tests independence, introduced in [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] and then
developed in [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. The strict definition of tests independence is rather complicated and is detailly
described and may be found in [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ]. Informally speaking, the tests from some sets are considered to
be independent, if their decisions about acceptance/rejection of hypothesis are independent. It is
the same as RVs, which reflect tests decisions, are mutually independent. Note that [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ] also
approach to verifying tests independence.
          </p>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>In what follows, we will use Chernoff inequality in the form given in Corollary 5 of [20].</title>
        <sec id="sec-2-6-1">
          <title>Chernoff inequality. Let  1, . . . ,   are independent RVs taking values in {0,1}. Define</title>
        </sec>
      </sec>
      <sec id="sec-2-7">
        <title>Then for arbitrary  ∈ (0,1) the next inequality holds:</title>
        <p>= ∑ =1   and set 
P ( X −      )  2  e 3
=  .
− 2
.</p>
        <sec id="sec-2-7-1">
          <title>Proposition 3. Let independent statistical tests  1, . . . ,</title>
          <p>were applied for testing of n
sequences obtained from P(P)RNG for some preset significance level α (the same for each test).
Define k the number of sequences which pass all the tests. Then, for sufficiently large n and chosen
 ∈ (0,1), the next equality holds:</p>
          <p>P(k  − A   ;  + A   )  1− A
where   = √3 ∙</p>
          <p>2 and  =  ∙ (1 −  ) .</p>
        </sec>
      </sec>
      <sec id="sec-2-8">
        <title>Proof. Introduce RVs</title>
      </sec>
      <sec id="sec-2-9">
        <title>Next, define RV</title>
        <p>( ) = {</p>
        <p>1,   ℎ  −  ℎ 
Note that  ( ) ∈ {0,1}. Using this fact and independence of RVs  

 ( ) = {
1,   ℎ  −  ℎ</p>
        <p>,
  ;</p>
        <p>;
( ), we get
m
i=1
0,
0,</p>
        <p>E ( j) =  Ei( j) = (1 − )m
Var ( j) = (1 − )m  (1 − (1 − )m )
,</p>
        <p>.</p>
        <p>n
 =  ( j)
j=1</p>
      </sec>
      <sec id="sec-2-10">
        <title>Finally, define the RV</title>
        <p>equal to the number of sequences passed all tests.</p>
        <p>Note that  = 
=  ∙ (1 −  ) and</p>
        <p>=  ∙ (1 −  ) ∙ (1 −  ∙ (1 −  ) ).</p>
        <p>Then apply Chernoff inequality to RV  and define  in a such way that the right part of the
equality be equal to A; obtain the inequality</p>
        <p>P(k  − A   ;  − A   )  A</p>
      </sec>
      <sec id="sec-2-11">
        <title>The Proposition is proved.</title>
        <p>4. New Strategy for processing of testing results and its justification
Above we gave three statements which allow to justify partially NIST Strategy, define its weakness
and incorrectness, and proposed to add some new step in the Strategy. Now we are going to
formulate Algorithm which realizes the New Extended Strategy.</p>
        <p>Input:
the number n of the tested sequences ( ≥ 300);
the set of sequences  ( ) = { 1( ), . . . ,  
investigated (P)RNG;
the significance level α (for testing);
the number m of tests in the suit;
the significance level A (for analysing testing results).</p>
        <p>( )} ,  = ̅1̅̅,̅̅, of sufficient length l, obtained from
obtain corresponding P-value</p>
        <p>( ).</p>
        <p>Step 1 (Testing). Test all sequences; for each test   ,  = ̅1̅̅,̅̅̅, and each sequence  ( ),  = ̅1̅̅,̅̅,
Step 2 (Calculated quantiles and auxiliary values). Calculate the next values:
the quantile   such that Φ(  ) = 1 − ;

2
the quantile  2 such that  ( 2) = 1 −  , where F(x) is cumulative distribution function
of  2-distribution with 9 degrees of freedom;
the edges of credential interval (for analyzing results of separate tests), corresponding to
the significance level A:</p>
        <p>I1 = 1 − − CA 
the edges of credential interval (for analyzing results of testing with tests suit),
corresponding to the significance level A:  1 =  −   ∙  and  2 =  +   ∙  .</p>
        <p>Step 3 (Checking uniform distribution of P-values for each separate test).
For each test   ,  = ̅1̅̅,̅̅̅, do the next sub-steps:
3.1. find the values   ,  = ̅0̅,̅9̅, equal to the number of P-values   ( ),  = ̅1̅̅,̅̅, which belong to
the interval [  ,  +1);
10</p>
        <p>10
3.2. calculate  2-statistics as
 i2 = 9  Fk − n 
</p>
        <p>
10 
k=0
n
10
-values obtained using test  
3.3. if  2 ≤  2</p>
        <p>-values obtained using test  
Step 4 (Checking proportion of sequence passing the test for each separate test).




2</p>
        <sec id="sec-2-11-1">
          <title>4.1. calculate the value   equal to the number of sequences passing the test; 4.2. if  1 &lt;</title>
          <p>&lt;  2
Step 5 (Checking proportion of sequence passing all tests).+</p>
        </sec>
      </sec>
      <sec id="sec-2-12">
        <title>5.1. calculate the value k equal to the number of sequences passed all the tests;</title>
        <p>lies inside the correct</p>
        <p>If on each step the algorithm gave positive answers, then we may consider the corresponding
(P)RNG as perfect.</p>
        <p>Results of Strategy application.</p>
        <p>
          We applied the Strategy to the set of sequences generated from the certified generator,
described in Appendix A in DSTU 9041:2020 [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. The input data were the next:
•
•
•
•
the number of the tested sequences n = 300;
the significance level (for testing) α = 0.01;
the number of tests in the suit m = 41 (with all subtests);
the significance level (for analysing testing results) A = 0.0001.
        </p>
        <p>Now we give the step-by-step results of New Strategy application, according to Algorithm,
given in Section 4.</p>
        <p>
          Step 1 (Testing). After testing each of these 300 sequences using 41 tests from [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], with
significance level α = 0.01 for each test, we obtain the matrix of 300x41 size.
        </p>
        <p>Step 2 (Calculated quantiles and auxiliary values). For chosen significance level (for
analysing testing results) A = 0.0001 we find, using Standard Normal distribution table, the
corresponding quantile   such that Φ(  ) = 1 −
4.
2
 = 1 − 0.00005 = 0.99995, and obtain   =</p>
        <p>For chosen significance level (for analysing testing results) A = 0.0001 we find, using 
2distribution table, the corresponding quantile  2 such that  ( 2) = 1 −  = 1 − 0.0001 =
0.9999, where F(x) is cumulative distribution function of  2-distribution with 9 degrees of freedom
(because the number of intervals, for which we calculate the number of P-values, was chosen as
10):  2 = 33,7199484.
which pass each test as</p>
        <p>Next, for chosen α = 0.01, A = 0.0001, given number of sequences n = 300 and obtained value
  = 4 we calculate the critical region (outside the interval ( 1,  2)) for the proportion of sequences
I1 = 1− − CA 
Then we calculate auxiliary values  =  ∙ (1 −  )




calculate the critical region (outside the interval ( 1,  2)) for the number of sequences which pass
all the tests as  1 =  −   ∙  = 121.9 and  2 =  +   ∙  = 275.5.</p>
        <p>Step 3 (Checking uniform distribution of P-values for each separate test).</p>
        <p>For each test   ,  = ̅1̅̅,̅̅̅, we calculate the number of P-values, which lie in each of 10 intervals,
and applied Pearson criterion for obtained values, to check uniformity of their distribution. For all
tests, the corresponding statistics were not larger than 22.4, which is smaller than limit statistic
 2 = 33,7199484. Then the distribution of P-values may be considered uniform (for each test),
and the first requirement of Strategy is met.
Step 4 (Checking proportion of sequence passing the test for each separate test).</p>
        <p>For each test   ,  = ̅1̅̅,̅̅̅, we calculate the value   equal to the number of sequences passing
the test. The maximal value of   , obtained on this step, is equal to 5, which corresponds to the
proportion 0.983, which lies inside the interval ( 1,  2) = (0.96, 1). So, the second requirement of</p>
      </sec>
      <sec id="sec-2-13">
        <title>Strategy is met.</title>
        <p>Step 5 (Checking proportion of sequence passing all tests).</p>
        <p>We calculate the value k which is equal to the number of sequences passed all the tests: k = 239.
This value lies inside the interval ( 1,  2) = (121.9, 275.5), so the third requirement of Strategy is
met. We can conclude that the tested PRNG is perfect.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>
        The Strategy for processing of testing results, proposed in the article, is extended and fully justified
modification of the Strategy proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It may be applied for arbitrary tests suit in which tests
about properties of generator, based on results of testing, is correct.
      </p>
      <p>We may choose testing parameters, used in Strategy, depending on different factors, such as
sphere of application of generator, our confidence of its quality, terms between planned testings,
existing of other quality checkings. We also may change the number of tests in suit, reducing their
number for regular everyday testing and increase it for testing before generator adoption. The
Strategy summarizes testing results in one decision about quality of (P)RNG and possibility of its
usage in cryptographic applications. But the perfectness of generator does not guarantee that all its
even in case when we use perfect generator in cryptographic applications, we still should test each
separate sequences before using it for key data creation.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgements</title>
      <p>The results of this work were obtained within the project 2023.04/0020 Development of methods
and layout of the "DEMETRA" ARM for constant and periodic control of the functioning of
cryptographic applications using statistical methods.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <sec id="sec-5-1">
        <title>The authors have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.E.</given-names>
            <surname>Bassham</surname>
          </string-name>
          <string-name>
            <given-names>III</given-names>
            ,
            <surname>A.L. Rukhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Soto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.R.</given-names>
            <surname>Nechvatal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.E.</given-names>
            <surname>Smid</surname>
          </string-name>
          , E.B.
          <article-title>Barker and others, A statistical test suite for random and pseudorandom number generators for cryptographic applications</article-title>
          ,
          <source>NIST Special Publication</source>
          <volume>800</volume>
          -22,
          <string-name>
            <surname>Revision</surname>
            <given-names>1a</given-names>
          </string-name>
          , (
          <year>2010</year>
          ). URL: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-
          <fpage>22r1a</fpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Almaraz</surname>
          </string-name>
          <string-name>
            <surname>Luengo</surname>
          </string-name>
          ,
          <article-title>Statistical tests suites analysis methods</article-title>
          .
          <source>Cryptographic recommendations, Cryptologia</source>
          <volume>48</volume>
          (
          <issue>3</issue>
          ) (
          <year>2023</year>
          )
          <fpage>219</fpage>
          251. doi:
          <volume>10</volume>
          .1080/01611194.
          <year>2022</year>
          .
          <volume>2155093</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Almaraz Luengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Román</given-names>
            <surname>Villaizán</surname>
          </string-name>
          ,
          <article-title>Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test Suite</article-title>
          ,
          <source>Mathematics</source>
          <volume>11</volume>
          (
          <issue>23</issue>
          ):
          <volume>4812</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/math11234812
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sýs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. R.S.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Matyas</surname>
          </string-name>
          , P. Schaumont, (Eds.), Security, Privacy, and Applied Cryptography Engineering.
          <source>SPACE</source>
          <year>2014</year>
          , volume
          <volume>8804</volume>
          of Lecture Notes in Computer Science, Springer, Cham,
          <year>2014</year>
          , pp.
          <fpage>272</fpage>
          <lpage>284</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -12060-7_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Luengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.A.</given-names>
            <surname>Olivares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. J. G.</given-names>
            <surname>Villalba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hernandez-Castro</surname>
          </string-name>
          ,
          <article-title>Further analysis of the statistical independence of the NIST SP 800-22 randomness tests</article-title>
          ,
          <source>Applied Mathematics and Computation 459</source>
          <volume>128222</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/J.AMC.
          <year>2023</year>
          .128222
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.A.</given-names>
            <surname>Luengo</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.J.G. Villalba,</surname>
          </string-name>
          <article-title>Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>54</volume>
          ,
          <issue>4</issue>
          ,
          <string-name>
            <surname>Article 80</surname>
          </string-name>
          (
          <year>2021</year>
          ). pp.
          <fpage>1</fpage>
          -
          <lpage>34</lpage>
          . doi:
          <volume>10</volume>
          .1145/3447773
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Marsaglia</surname>
          </string-name>
          ,
          <article-title>The Marsaglia random number CDROM including the diehard battery of tests of randomness</article-title>
          , (
          <year>2008</year>
          ). http://www. stat. fsu. edu/pub/diehard/.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.G.</given-names>
            <surname>Brown</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Eddelbuettel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bauer</surname>
          </string-name>
          , Dieharder. Duke University Physics Department Durham NC 27708-
          <fpage>0305</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Walker</surname>
          </string-name>
          ,
          <article-title>A pseudorandom number sequence test program</article-title>
          , (
          <year>2008</year>
          ). https://www.fourmilab.ch/random/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Almaraz Luengo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. Alaña</given-names>
            <surname>Olivares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.J. García</given-names>
            <surname>Villalba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hernandez-Castro</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>HurleySmith, StringENT test suite: ENT battery revisited for efficient P value computation</article-title>
          ,
          <source>Journal of Cryptographic Engineering</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2023</year>
          )
          <fpage>235</fpage>
          -
          <lpage>249</lpage>
          . doi:
          <volume>10</volume>
          .1007/s13389-023-00313-5
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bezditnyi</surname>
          </string-name>
          ,
          <article-title>Inspection of statistical tests independence intended for PRNG cryptographic qualities evaluation</article-title>
          ,
          <source>Ukrainian Information Security Research Journal</source>
          <volume>2</volume>
          (
          <issue>29</issue>
          ) (
          <year>2006</year>
          )
          <fpage>18</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kochana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuchynska</surname>
          </string-name>
          , Statistical Tests Independence Verification Methods, Procedia Computer Science Volume
          <volume>192</volume>
          (
          <year>2021</year>
          ).
          <fpage>2678</fpage>
          -
          <lpage>2688</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.procs.
          <year>2021</year>
          .
          <volume>09</volume>
          .038.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bhattacharjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Das</surname>
          </string-name>
          ,
          <article-title>A search for good pseudo-random number generators: Survey and empirical studies</article-title>
          , Computer Science Review,
          <volume>45</volume>
          (
          <year>2022</year>
          ) 100471 doi:10.1016/j.cosrev.
          <year>2022</year>
          .100471
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.H.</given-names>
            <surname>AbdELHaleem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Abd-El-Hafiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.G.</given-names>
            <surname>Radwan</surname>
          </string-name>
          ,
          <article-title>Analysis and Guidelines for Different Designs of Pseudo Random Number Generators</article-title>
          ,
          <source>in IEEE Access</source>
          <volume>12</volume>
          (
          <year>2024</year>
          ).
          <fpage>115697</fpage>
          -
          <lpage>115715</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .
          <volume>3445277</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sigit</surname>
          </string-name>
          ,
          <article-title>To what extent are multiple pendulum systems viable in pseudo-random number generation?</article-title>
          ,
          <source>arXiv preprint 2404.16860</source>
          (
          <year>2024</year>
          ). URL:https://arxiv.org/pdf/2404.16860. doi:
          <volume>10</volume>
          .48550/arXiv.2404.16860
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>R.B. Naik</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          <article-title>Review on Applications of Chaotic Maps in Pseudo-Random Number Generators and Encryption</article-title>
          ,
          <source>Annals of Data Science</source>
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2024</year>
          ).
          <fpage>25</fpage>
          <lpage>50</lpage>
          . doi:
          <volume>10</volume>
          .1007/s40745- 021-00364-7
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.V.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.V.</given-names>
            <surname>Koriakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.N.</given-names>
            <surname>Alekseychuk</surname>
          </string-name>
          ,
          <article-title>Krip: High-Speed Hardware-Oriented Stream Cipher Based on a Non-Autonomous Nonlinear Shift Register</article-title>
          ,
          <source>Cybernetics and Systems Analysis</source>
          <volume>59</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          ).
          <fpage>16</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10559-023-00538-6
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>U.M.</given-names>
            <surname>Maurer</surname>
          </string-name>
          .
          <article-title>A universal statistical test for random bit generators</article-title>
          .
          <source>Cryptology (5)</source>
          (
          <year>1992</year>
          ) 89
          <fpage>105</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>W.</given-names>
            <surname>Feller</surname>
          </string-name>
          .
          <article-title>An introduction to probability theory and its applications</article-title>
          , Vol.
          <volume>2</volume>
          (Vol.
          <volume>81</volume>
          ). John Wiley &amp; Sons. (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>C.</given-names>
            <surname>Grosu</surname>
          </string-name>
          .
          <article-title>Some applications of Chernoff bounds</article-title>
          .
          <source>Mathematical Modeling in Civil Engineering</source>
          , (
          <volume>3</volume>
          ) (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <article-title>Information technologies</article-title>
          .
          <article-title>Cryptographic protection information. Short message encryption algorithm based on Edwards twisted elliptic curves</article-title>
          ,
          <source>DSTU</source>
          <volume>9041</volume>
          :
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>