“…Nowadays, the interest of specialists in the field of information security, in particular, protection of electronic documents from forgery, focuses on the development of cryptography methods based on the use of deterministic-chaotic processes more and more often [3,4]. This class of processes is characterized by instability, which results in non-repeatability of the values of elements in a sequence of numbers with a representative bit grid.…”