Research Article
Mimic Encryption Box for Network Multimedia Data Security
Table 4
Implementation of each encryption algorithm and hash algorithm.
| Main algorithm | Algorithm structure | Highest frequency (MHz) | LUTs | REGs |
| AES128 | Serial, 23 clocks | 350 | 1060 | 402 | 3DES | 48-stage pipeline | 410 | 4436 | 5661 | SHA1 | 80-stage pipeline | 400 | 12336 | 23860 | SHA256 | 64-stage pipeline | 280 | 21472 | 24374 | CRC32_64 | 64-bit lookup table | 450 | 266 | 100 | CRC32_128 | 128-bit lookup table | 320 | 445 | 164 | LFSR | Lookup tables, state machine | 310 | 124 | 186 |
|
|