Research Article

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

Figure 4

Histogram of the comparison between the traditional algorithm and the combination algorithm using 40 moduli.