Research Article

The Application of Data Encryption Technology in Computer Network Communication Security

Figure 2

Quantization comparison of key length and data length of AES algorithm.