@article{MAKHILLAJIT201615136227, title = {Evolutionary Data Encryption as a Primitive Cryptography}, journal = {Asian Journal of Information Technology}, volume = {15}, number = {13}, pages = {2248-2251}, year = {2016}, issn = {1682-3915}, doi = {ajit.2016.2248.2251}, url = {https://makhillpublications.co/view-article.php?issn=1682-3915&doi=ajit.2016.2248.2251}, author = {Aleksey I.,Nikolai I.,Vladimir V. and}, keywords = {Evolutionary method,mutation,Hamming code,parent,descendant,encoding,decoding}, abstract = {The study gives examples of encryption algorithms and their models in interpret the evolutionary method of data encryption. Considered 5 stages processing open text data unit for converting the closed text. Illustrated examples of the encoding and decoding algorithms. The application mutation of a descendant and the method of decoding messages after mutations with using Hamming codes.} }