Purpose of research. Currently, various technologies and methods are used to control the integrity and authenticity of data transmitted through open communication channels. One of them is the technology for transmitting sequences of information packets connected to each other in chains using certain cryptographic algorithms. Similar approaches are used in the well-known blockchain technology and are focused on large volumes of transmitted and protected information and large sizes of additional service information fields. The purpose of this article is to study the characteristics of systems, transmission of small information packets in comparison with traditional size frames of TCP/IP stack, in which the broken packet sequence order is restored using the chain method, by analyzing hash sequences available in each of such packets.Methods. In this article, simulation modeling, system analysis method, method of systematization and ranking of the obtained results are used.Results. It is shown that increasing the size of the additional field with the hash of the previous message from 4 to 6 bits has a significant effect on reducing the probability of erroneous restore of the order of information packets. Further increasing the length of the hash field reduces the probability of error by only 2 to 5 % for each additional bit of the hash field for any length of the chain being restored. It is shown that the coefficient of the usage of the communication channel (the ratio of useful chain of packets to the volume of information transmitted through the communication channel) is maximum when the length of the hash field is 6 in the whole range of sizes of the field information part of the data packet.Conclusion. The paper shows that the chain method is applicable for restoring the original sequence of information packets transmitted from the source to the receiver in systems where the preservation of the sequence of packets is not guaranteed. The obtained values of the transmission system parameters allow us to ensure acceptable reliability of data transmission with a minimum amount of additional service information, and achieve information redundancy less than that in similar ones by 10-15.