DRAW RANDOMNESS IS ABSOLUTE, CERTIFIED AND IRREPROACHABLE

Kino Draws occur every 5' on a daily basis from 9:00am to 23:55pm. In each draw, 20 numbers are drawn from 1 to 80.

These numbers derive from a Random Number Generator (RNG) while the draw results are transmitted in dedicated screens within the agencies and are published in our website.

THE RANDOMNESS OF THE DRAWS IS CERTAIN, VERIFIED AND UNIMPEACHABLE

OPAP guarantees the 100% random occurrence of the 20 numbers of all 180 draws of KINO.

This is achieved through the strict process that is set globally for all systems that consider RNGs.

More specifically this process is as follows:

  • The 20 numbers of each draw derive from a system of an Independent body that is developed specifically for OPAP's KINO. This system is built and maintained from CTI (Computer Technology Institute & Publications) of Patras University and ensures the randomness of the draws and the integrity of the whole process.
  • It is composed of series of servers that guarantee its continuous operation. The RNG algorithm generating the winning numbers of each KINO draw is designed by CTI based on the latest developments concerning RNGs and is considered being a state of the art in the field of RNGs
  • In addition, CTI is obliged to follow the International developments in the RNG field and offer OPAP – on a quarterly basis – certifications from foreign Universities, verifying the consistent integrity of the system.
  • The access in the system of KINO draws is only granted to the CTI personnel and only under the presence of a member of the Independent Control Committee (law 2843/2000) that is – in turn – defined by the ministries of Culture and Economics.
  • After the expiry of the betting period of each draw, the file including all the participating slips of the draw is locked through an automatically generated hash-key. A member of the "Committee" verifies (on a daily basis) that the draw files have the correct hash-keys and that there has not been any kind of external breach in the system after the expiry of the betting period ("Security Process of the Participating Slips"*).
  • This process is also evident in the way the file of the winners is secured. As soon as the 20 numbers of the draw are confirmed, the winners file of each draw is locked through an automatically generated hash-key. The presence of the correct hash-key is inspected by a member of the Control Committee by the end of each day, that verifies that there has not been any breach in the winners' files of the draws ("Security process of the winning files").
  • By the end of each draw, the RNG system creates the winning numbers of the draw. The file with the winning numbers is uploaded in a server. The Data Processing Center of OPAP "reads" these numbers from the server. The communication between the server and OPAP's DPC is one-way, meaning that DPC can only read and not write on the server. In other words, the DPC of OPAP cannot communicate with CTI's RNG system and /or interfere with the files of the participating slips and files of the winners of each draw. Given the punctuality required from CTI's system to upload the draw numbers, the system's clock is GPS synchronized.
  • The continuous and smooth operation of the RNG system of KINO is a top priority for OPAP. Therefore, all servers are "redundant", meaning that in case the initial server is – for any reason – out of order, a secondary – identical – server is ready to take over and continue the process.
*"Security Process of the Participating Slips": By the expiry of the betting time of each draw the central system stops receiving any more slips for this draw and generates the hash-key that locks the data. This hash-key is the electronic lock of all participating slips from all terminals of the field. It is created through an algorithm that calculates the confirmed tickets and transactions occurred so far for the draw. Additionally, the hash-key generation, includes the presence of 2 keys inserted by respective members of the Control Committee. These keys are used upon modification, for all hash-keys generated from the central system. The presence of the correct hash-keys is confirmed only if the same 2 keys used for their generation is inserted here as well. The algorithm used for the hash-key generation is MD5 (Knuth) in a version that generates hash-keys of 64bits in length. The length of these hash-keys ensures a zero chance of a data corruption without noticing. When all conditions of the "hash-key" generation process" are, eventually, met, a hash-key is created to lock all participating slips inserted in the system so far. During the "hash-key generation process", another function of the central system informs – in a secure way – a remote process performed by two independent PCs located in the premises of the Control Committee. Each of these 2 PCs runs an application that stores the data coming from the central system and prints the respective hash-keys. This way the electronic signature of all participating slips of the central system is stored and printed in a remote, leveled and inaccessible area. The access in this area is granted only to CTI's personnel under the presence of a member of the Control Committee that carries the card/key for entering the area.
** "Security process of the winning files": After the confirmation of the winning numbers of each draw and the finalization of the sorting process from the central system, a hash-key is generated to lock the file including all winning columns. The process described above is also performed here in order to generate the hash-keys for the winners' files. The hash-key generation, includes the presence of 2 keys inserted by respective members of the Control Committee. These keys are used - upon modification -for all hash-keys generated from the central system. The presence of the correct hash-keys is confirmed only if the same 2 keys used for their generation is inserted here as well. During the "hash-key" generation process", another function of the central system informs – in a secure way – a remote process performed by two independent PCs located in the premises of the Control Committee. Each of these 2 PCs runs an application that stores the data coming from the central system and prints the respective hash-keys. This way the electronic signature of all winning columns of the central system is stored and printed in a remote leveled and inaccessible area. The access in this area is granted only to CTI's personnel under the presence of a member of the Control Committee that carries the card/key for entering the area.