Different approaches to using of transposition methods for data protection are examined in the article. The author has conducted comparative analysis of the approaches to increasing strength to protect the text from various attacks when its length and the data amount given per one symbol are raised. Basic criteria of evaluation of the offered methods are marked as well. The increase of the computational complexity in the described approaches is calculated.