Research Article

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

Table 3

Comparison between the traditional algorithm and the combination algorithm using 100 moduli.

Operation time (100 moduli)Time required for traditional algorithm (s)Time required for combination algorithm (s)
Encryption operationDecryption operationEncryption operationDecryption operation

The first time35.47439.65835.46839.588
The second time35.42439.78234.58939.536
The third time35.48539.69834.98639.552
The fourth time35.49239.72434.76539.568
The fifth time35.48539.75635.26939.562
The average time35.47639.73135.08339.569
The improved encryption efficiency on average1.86%
The improved decryption efficiency on average1.19%