PractRand 0.96 Validation
TrueEntropy hybrid output was tested against PractRand 0.96 - a rigorous statistical battery widely regarded as the gold standard for PRNG quality testing. The output passed all 157 tests across 32 GB with zero anomalies detected.
What is PractRand?
PractRand (Practically Random) is an open-source C++ statistical testing suite for random number generators. It is considered more demanding than NIST SP800-22 because it scales continuously - running more tests at each power-of-two data boundary and detecting weaknesses that only emerge at large volumes. A weak PRNG will typically fail between 1 MB and 16 MB. Cryptographic-grade generators are expected to pass well beyond 32 GB.
Test Methodology
Entropy source
10,485,760 bytes (10 MB) of true quantum random numbers generated via IBM Quantum hardware (ibm_fez, 156-qubit system) using 8-qubit Hadamard circuits, verified 7/7 by NIST SP800-22.
Hybrid expansion
The quantum dataset seeds a ChaCha20 stream cipher (key = first 32 bytes, nonce = bytes 33–44), mirroring the production hybrid architecture. The quantum bytes are prepended to the keystream to produce the full test stream.
Test command
Results
| Stream Length | Tests Run | Anomalies | Status |
|---|---|---|---|
| 128 MB | 102 | 0 | Pass |
| 256 MB | 110 | 0 | Pass |
| 512 MB | 118 | 0 | Pass |
| 1 GB | 125 | 0 | Pass |
| 2 GB | 132 | 0 | Pass |
| 4 GB | 139 | 0 | Pass |
| 8 GB | 145 | 0 | Pass |
| 16 GB | 151 | 0 | Pass |
| 32 GB | 157 | 0 | Pass |
Full output
Context & Comparison
| Test Suite | Tests | Scale | TrueEntropy Result |
|---|---|---|---|
| NIST SP800-22 | 15 tests | ~1 MB | 15/15 Pass |
| PractRand 0.96 | 157 tests | 32 GB | 157/157 Pass |
| Typical commercial CSPRNG | varies | 1–4 GB | industry baseline |
Caveats
These results are statistical evidence, not a cryptographic proof. PractRand tests detect structural patterns and biases; they do not evaluate key security or resistance to cryptanalysis. The quantum seed (IBM Fez hardware) is the irreducible entropy source - the ChaCha20 expansion is computationally secure, not information-theoretically secure. Results are reproducible given the same quantum seed material.