Research Article

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

Figure 6

Histogram of the comparison between the traditional algorithm and the combination algorithm using 100 moduli.