TY - JOUR AU - Fastovets, Valentyna PY - 2021/11/30 Y2 - 2024/03/29 TI - Analysis and software implementation of the modified cryptographic Vernam cipher and the Caesar cipher JF - Vehicle and electronics. Innovative technologies JA - VEIT VL - IS - 20 SE - INFORMATION TECHNOLOGY DO - 10.30977/VEIT.2021.20.0.07 UR - http://veit.khadi.kharkov.ua/article/view/244143 SP - 62-67 AB - <p><strong><em>Problem.</em></strong><em> Modern cryptography is a very important part of cybersecurity and confidentiality of many operations. It covers almost all parts of our lives, from e-commerce to specialized education of students. <strong>Goal</strong>. The advantage of symmetric key cryptography is that working with this method is very easy for users, as one key is used for encryption, as well as for decryption purposes, and this key must be secret and should be known only to the sender and recipient and no one else. On the other hand, public key cryptography has two keys. Unfortunately, this exposes the inherent security flaws, as the integrity of the encryption depends entirely on the password. It was decided to consider the implementation of a modified symmetric Vernam cipher that avoids these problems, and its modification and experimental studies should further strengthen data protection. <strong>Methodology.</strong> Higher mathematics, linear algebra are very important subjects. But if we want to encourage students with cryptography, we need to use all aspects of the IT cluster more effectively. Ideal for this is the implementation of algorithms and programs using programming languages. It is very important and useful for students studying Cybersecurity to illustrate where and how it is possible to create software implementations of encryption / decryption methods. <strong>Results.</strong> The article presents the analysis and implementation of the modified cryptographic Vernam cipher and Caesar cipher using a concept that combines modern programming languages and the principles of cryptography, which students study in subject-oriented specialties. <strong>Originality.</strong> An original approach to teaching Cybersecurity students by implementing ciphers using applied programming is described. <strong>Practical value</strong>. Using cryptography as a learning tool will help students develop their programming skills and effectively understand the concept of cybersecurity in real-world examples.</em></p> ER -