Research Article

Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology

Figure 8

Malicious attack data interception volume of different algorithms.