Research Article
The Application of Data Encryption Technology in Computer Network Communication Security
Table 1
Linear table corresponding experimental data.
| No. | Size of clear text (bit) | Encryption index length (bit) | BR algorithm time (ms) |
| 1 | 1024 | 128 | 14.5 | 512 | 65.4 | 1024 | 115.6 |
| 2 | 512 | 128 | 13.2 | 512 | 60.2 | 1024 | 106.2 |
| 3 | 256 | 128 | 12.1 | 512 | 57.7 | 1024 | 100.4 |
| 4 | 128 | 128 | 11.1 | 512 | 54.3 | 1024 | 97.6 |
| 5 | 64 | 128 | 9.6 | 512 | 49.8 | 1024 | 90.5 |
|
|