Research Article

Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security

Table 1

The relationship between the number of conversion rounds Nr, Nb, and Nk.

Nr

121416
141416
161616