Research Article
[Retracted] Application of Data Encryption Technology in Computer Network Information Security
Table 2
Comparison between the traditional algorithm and the combination algorithm using 80 moduli.
| Operation time (80 moduli) | Time required for traditional algorithm (s) | Time required for combination algorithm (s) | Encryption operation | Decryption operation | Encryption operation | Decryption operation |
| The first time | 17.895 | 18.513 | 17.635 | 18.49 | The second time | 17.958 | 18.503 | 17.815 | 18.496 | The third time | 17.881 | 18.582 | 17.831 | 18.492 | The fourth time | 17.705 | 18.503 | 17.759 | 18.492 | The fifth time | 17.928 | 18.572 | 17.822 | 18.482 | The average time | 17.862 | 18.533 | 17.762 | 18.493 | The improved encryption efficiency on average | 1.326% | The improved decryption efficiency on average | 1.32% |
|
|