Since the original sequences are generated using deterministic algorithms, sometimes there is a high probability of distinguishing such sequences from truly random sequences. In this case, the encryption algorithm is vulnerable to many cryptographic attacks. The simplest way to implement such attacks is to perform a statistical analysis of the source sequences produced by the encryption algorithm. As a rule, the internal structure of the cipher is not taken into account in statistical testing. Therefore, this type of testing can be considered as black box testing because the internal structure, the initial data used to initialize the internal state, or the steps of initializing the internal state of the cipher are not taken into account [1][2][3][4].When testing the statistical properties of stream ciphers, the general approach is to create a large number of key streams and apply some statistical tests to them. If the test results do not meet the requirements of the test, it is not considered that such a cipher is not resistant to attacks full recovery of key data or plaintext, but for such an algorithm encryption can be accurately asserted that the key sequence differs in its properties from the truly random.When conducting statistical analysis, it is important to consider the relationship between the key, the initialization vector, the internal state, and the key stream, since if the cryptanalyst performs a key sequence analysis, he should not obtain any information about the generator's internal state or the secret key. Therefore, the encryption algorithm must form a key sequence of sufficiently long length (greater than the probable length of plaintext) and having pseudo-random sequence properties [1,2,4].Usually the statistical results of sequence testing are compared with the theoretical distributions of truly random sequences. If there is a systematic deviation from the distribution of a truly random sequence, then the decision is made about the danger of the algorithm and its vulnerability to cryptographic attacks. It is