Research Article
[Retracted] Application of Data Encryption Technology in Computer Network Information Security
Table 3
Comparison between the traditional algorithm and the combination algorithm using 100 moduli.
| Operation time (100 moduli) | Time required for traditional algorithm (s) | Time required for combination algorithm (s) | Encryption operation | Decryption operation | Encryption operation | Decryption operation |
| The first time | 35.474 | 39.658 | 35.468 | 39.588 | The second time | 35.424 | 39.782 | 34.589 | 39.536 | The third time | 35.485 | 39.698 | 34.986 | 39.552 | The fourth time | 35.492 | 39.724 | 34.765 | 39.568 | The fifth time | 35.485 | 39.756 | 35.269 | 39.562 | The average time | 35.476 | 39.731 | 35.083 | 39.569 | The improved encryption efficiency on average | 1.86% | | | | The improved decryption efficiency on average | 1.19% | | | |
|
|