<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-8-1-0-3</article-id><article-id pub-id-type="publisher-id">3031</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF SYMMETRIC ENCRYPTION METHODS, PROBLEMS AND WAYS OF THEIR POSSIBLE SOLUTION&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF SYMMETRIC ENCRYPTION METHODS, PROBLEMS AND WAYS OF THEIR POSSIBLE SOLUTION&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name><name xml:lang="en"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name></name-alternatives><email>egor2014ru@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2023</year></pub-date><volume>8</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2023/1/ИТ_НР_81_3_4mpIO02.pdf" /><abstract xml:lang="ru"><p>Person needs to constantly communicate, and he does this on the street with friends, acquaintances, making phone calls, chatting in instant messengers, writing letters to the post office. All this is information that is transmitted over transmission channels and can be subject to various kinds of theft and risk situations that must be properly protected, which is what information security does. In the era of quantum computers, of course, basic ciphers are being questioned, but no one forbids combining different ciphers in order to protect themselves as much as possible. The paper will present encryption methods, analyze several of them, namely symmetric text encryption, identify their main problems and propose ways to eliminate them.</p></abstract><trans-abstract xml:lang="en"><p>Person needs to constantly communicate, and he does this on the street with friends, acquaintances, making phone calls, chatting in instant messengers, writing letters to the post office. All this is information that is transmitted over transmission channels and can be subject to various kinds of theft and risk situations that must be properly protected, which is what information security does. In the era of quantum computers, of course, basic ciphers are being questioned, but no one forbids combining different ciphers in order to protect themselves as much as possible. The paper will present encryption methods, analyze several of them, namely symmetric text encryption, identify their main problems and propose ways to eliminate them.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>encryption</kwd><kwd>cryptography</kwd><kwd>cipher</kwd><kwd>text</kwd><kwd>text security</kwd><kwd>Caesar cipher</kwd><kwd>Atbash cipher</kwd><kwd>cipher problem</kwd><kwd>information security</kwd><kwd>leak channels</kwd></kwd-group><kwd-group xml:lang="en"><kwd>encryption</kwd><kwd>cryptography</kwd><kwd>cipher</kwd><kwd>text</kwd><kwd>text security</kwd><kwd>Caesar cipher</kwd><kwd>Atbash cipher</kwd><kwd>cipher problem</kwd><kwd>information security</kwd><kwd>leak channels</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Roldugina M.A. Encryption methods used to protect information / M.A. Roldugina // Scientific community of students of the XXI century. Engineering sciences: collection of articles based on the materials of the CII student international scientific and practical conference, Novosibirsk, June 10, 2021. Volume 6 (101). - Novosibirsk: Limited Liability Company &amp;quot;Siberian Academic Book&amp;quot;, 2021. - P. 46-51. &amp;ndash; EDN HUHHGS.</mixed-citation></ref><ref id="B2"><mixed-citation>Cryptography and the main methods of information encryption [Electronic resource]. URL: https://proglib.io/p/methods-of-encryption</mixed-citation></ref><ref id="B3"><mixed-citation>Volkova P.L. Encryption methods / P.L. Volkova // Science of the Present and Future. - 2020. - T. 1. &amp;ndash; P.&amp;nbsp;220-222. &amp;ndash; EDN XMDBNU.</mixed-citation></ref><ref id="B4"><mixed-citation>Kostikov V.A. The need to compress encrypted data using LZW and Huffman coding algorithms / V.A.&amp;nbsp;Kostikov, M.A. Maslova // Theory and practice of project education. - 2021. - No. 3(19). &amp;ndash; P. 62-64. &amp;ndash; EDN JASTQT.</mixed-citation></ref><ref id="B5"><mixed-citation>The project of encryption of the Caesar method [Electronic resource]. URL: https://clck.ru/ZL5ff</mixed-citation></ref><ref id="B6"><mixed-citation>Cryptography. Basic methods and problems [Electronic resource]. URL: https://moluch.ru/conf/tech/archive/163/8782/</mixed-citation></ref><ref id="B7"><mixed-citation>Moldovyan A.A. Cryptography. speed ciphers. &amp;ndash; BHV-Petersburg, 2002. URL: https://clck.ru/ZL5fD</mixed-citation></ref><ref id="B8"><mixed-citation>Avdoshin S.M., Savelyeva A.A. Cryptanalysis: current state and development prospects // Information technologies. &amp;ndash; 2007. &amp;ndash; No. S3. &amp;ndash; P. 1-32. URL: https://clck.ru/ZL5ea</mixed-citation></ref><ref id="B9"><mixed-citation>Karnuta D.S. Quantum cryptographic encryption methods as an actual and effective means of ensuring information security in IoT networks / D.S. Karnuta // Information security issues. &amp;ndash; 2021. &amp;ndash; No. 2(133). &amp;ndash; P. 3-7. &amp;ndash; DOI 10.52190/2073-2600_2021_2_3. &amp;ndash; EDN XAAADK.</mixed-citation></ref></ref-list></back></article>