Research Article

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

Figure 5

Histogram of the comparison between the traditional algorithm and the combination algorithm using 80 moduli.