<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-1-0-2</article-id><article-id pub-id-type="publisher-id">3402</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name><name xml:lang="en"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name></name-alternatives><email>egor2014ru@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Ilina</surname><given-names>Sofia Pavlovna</given-names></name><name xml:lang="en"><surname>Ilina</surname><given-names>Sofia Pavlovna</given-names></name></name-alternatives><email>sofi.ilina@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>mashechka-81@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/1/ИТ_НР_9.1_2.pdf" /><abstract xml:lang="ru"><p>This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most reliable and secure encryption algorithm. The article analyzes the characteristics of each of the ciphers, such as key length, durability and relevance, and also evaluates their popularity and application in modern cryptographic realities. As a result of the study, it was concluded that AES is the most excellent option. This is because DES and RSA have already been hacked and have known vulnerabilities, whereas AES continues to be secure and the best of the ciphers presented. The article is that AES is recommended for use in systems where reliable and impenetrable encryption is required.</p></abstract><trans-abstract xml:lang="en"><p>This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most reliable and secure encryption algorithm. The article analyzes the characteristics of each of the ciphers, such as key length, durability and relevance, and also evaluates their popularity and application in modern cryptographic realities. As a result of the study, it was concluded that AES is the most excellent option. This is because DES and RSA have already been hacked and have known vulnerabilities, whereas AES continues to be secure and the best of the ciphers presented. The article is that AES is recommended for use in systems where reliable and impenetrable encryption is required.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security</kwd><kwd>security</kwd><kwd>cybersecurity</kwd><kwd>code</kwd><kwd>programming</kwd><kwd>cryptography</kwd><kwd>encryption</kwd><kwd>RSA</kwd><kwd>DES</kwd><kwd>AES</kwd><kwd>ECB</kwd><kwd>CBC</kwd><kwd>cipher hacking</kwd><kwd>cipher security</kwd><kwd>quantum computers</kwd><kwd>quantum cryptography</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>security</kwd><kwd>cybersecurity</kwd><kwd>code</kwd><kwd>programming</kwd><kwd>cryptography</kwd><kwd>encryption</kwd><kwd>RSA</kwd><kwd>DES</kwd><kwd>AES</kwd><kwd>ECB</kwd><kwd>CBC</kwd><kwd>cipher hacking</kwd><kwd>cipher security</kwd><kwd>quantum computers</kwd><kwd>quantum cryptography</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Data Encryption Standard (DES) [Electronic resource]. URL: https://intuit.ru/studies/courses/552/408/lecture/9362?page=3</mixed-citation></ref><ref id="B2"><mixed-citation>DES encryption algorithm [Electronic resource]. URL: https://studme.org/239561/informatika/algoritm_shifrovaniya</mixed-citation></ref><ref id="B3"><mixed-citation>Creation of a plug-in in the des algorithm [Electronic resource]. URL: https://studfile.net/preview/2204125/page:4/</mixed-citation></ref><ref id="B4"><mixed-citation>Data Encryption Standard Data Encryption Standard [Electronic resource]. URL: https://protect.htmlweb.ru/des.htm</mixed-citation></ref><ref id="B5"><mixed-citation>The use of the RSA cryptosystem at the present time [Electronic resource]. URL: https://studfile.net/preview/299352/page:6/</mixed-citation></ref><ref id="B6"><mixed-citation>Chinese programmers hacked the RSA algorithm. This threatens the entire Internet [Electronic resource]. URL: https://4pda.to/2023/01/08/408266/kitajskie_programmisty_vzlomali_algoritm_rsa_eto_ugrozhaet_vsemu_internetu/</mixed-citation></ref><ref id="B7"><mixed-citation>Experts from China cracked RSA encryption using quantum computers [Electronic resource]. URL: https://www.anti-malware.ru/news/2023-01-06-1447/40255</mixed-citation></ref><ref id="B8"><mixed-citation>Chinese researchers have announced the successful cracking of RSA encryption [Electronic resource]. URL: https://cryptonews.net/ru/news/blockchain/18936323/</mixed-citation></ref><ref id="B9"><mixed-citation>Factoring integers with sublinear resources on a superconducting quantum processor [Electronic resource]. URL: https://arxiv.org/pdf/2212.12372.pdf</mixed-citation></ref><ref id="B10"><mixed-citation>How AES (Advanced Encryption Standard) works [Electronic resource]. URL: https://vc.ru/dev/656195-kak-rabotaet-aes-advanced-encryption-standard-obyasnenie-dlya-gumanitariev-tipa-menya</mixed-citation></ref><ref id="B11"><mixed-citation>Explanation of AES encryption [Electronic resource]. URL: https://blog.kraden.com/ru/aes-256-encryption</mixed-citation></ref><ref id="B12"><mixed-citation>Advanced Encryption Standard (AES) [Electronic resource]. URL: https://www.geeksforgeeks.org/advanced-encryption-standard-aes/</mixed-citation></ref><ref id="B13"><mixed-citation>What is the Advanced Encryption Standard (AES)? [Electronic resource]. URL: https://www.zenarmor.com/docs/network-security-tutorials/what-is-advanced-encryption-standard-aes</mixed-citation></ref><ref id="B14"><mixed-citation>Multiple AES encryption modes [Electronic resource]. URL: https://russianblogs.com/article/2418837814/</mixed-citation></ref><ref id="B15"><mixed-citation>How to choose an AES encryption mode (CBC ECB CTR OCB CFB)? [Electronic resource]. URL: https://stackoverflow.com/questions/1220751/how-to-choose-an-aes-encryption-mode-cbc-ecb-ctr-ocb-cfb</mixed-citation></ref><ref id="B16"><mixed-citation>Kostikov V.A. The need to compress encrypted data using LZW and Huffman coding algorithms / V.A.&amp;nbsp;Kostikov, M.A. Maslova // Theory and practice of project education. &amp;ndash; 2021. &amp;ndash; No. 3(19). &amp;ndash; pp. 62-64.</mixed-citation></ref><ref id="B17"><mixed-citation>Implementation of ESG principles in the strategy for sustainable development of the Russian economy / N.G. Vovchenko, N.G. Kuznetsov, E.N. Makarenko [at al.]. &amp;ndash; Rostov-on-Don: Rostov State Economic University &amp;ldquo;RINH&amp;rdquo;, 2022. &amp;ndash; 508 p.</mixed-citation></ref></ref-list></back></article>