Research Article

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

Figure 3

Flow chart of generating large prime numbers.