Research Article

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

Table 1

Comparison between the traditional algorithm and the combination algorithm using 40 moduli.

Operation time (40 moduli)Time required for traditional algorithm (s)Time required for combination algorithm (s)
Encryption operationDecryption operationEncryption operationDecryption operation

The first time2.7542.8842.6942.794
The second time2.7542.9052.6942.884
The third time2.7542.9142.7842.884
The fourth time2.7642.9142.7042.794
The fifth time2.7542.8842.6842.886
The average time2.7652.8982.6942.894
The improved encryption efficiency on average1.09%
The improved decryption efficiency on average1.23%