Research Article
A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
Table 2
Encryption and decryption performance of this method.
| File size | Generate encryption key time/ms | Generate ciphertext time/ms | Time to generate decryption key/ms | Generating plaintext time/ms |
| 1 KB | 1 | 2 | 1 | 5 | 10 KB | 1 | 3 | 1 | 10 | 100 KB | 1 | 5 | 1 | 38 | 1 MB | 1 | 20 | 1 | 126 | 10 MB | 1 | 156 | 1 | 568 | 100 MB | 1 | 345 | 1 | 1052 | 200 MB | 1 | 1845 | 1 | 2064 | 1000 MB | 1 | 13584 | 1 | 10234 |
|
|