Figure 8: Time consumption during the encryption process.