Research Article
[Retracted] Application of Data Encryption Technology in Computer Network Information Security
Table 1
Comparison between the traditional algorithm and the combination algorithm using 40 moduli.
| Operation time (40 moduli) | Time required for traditional algorithm (s) | Time required for combination algorithm (s) | Encryption operation | Decryption operation | Encryption operation | Decryption operation |
| The first time | 2.754 | 2.884 | 2.694 | 2.794 | The second time | 2.754 | 2.905 | 2.694 | 2.884 | The third time | 2.754 | 2.914 | 2.784 | 2.884 | The fourth time | 2.764 | 2.914 | 2.704 | 2.794 | The fifth time | 2.754 | 2.884 | 2.684 | 2.886 | The average time | 2.765 | 2.898 | 2.694 | 2.894 | The improved encryption efficiency on average | 1.09% | The improved decryption efficiency on average | 1.23% |
|
|