Abstract: The study gives examples of encryption algorithms and their models in interpret the evolutionary method of data encryption. Considered 5 stages processing open text data unit for converting the closed text. Illustrated examples of the encoding and decoding algorithms. The application mutation of a descendant and the method of decoding messages after mutations with using Hamming codes.