Research Article

Mimic Encryption Box for Network Multimedia Data Security

Table 4

Implementation of each encryption algorithm and hash algorithm.

Main algorithmAlgorithm structureHighest frequency (MHz)LUTsREGs

AES128Serial, 23 clocks3501060402
3DES48-stage pipeline41044365661
SHA180-stage pipeline4001233623860
SHA25664-stage pipeline2802147224374
CRC32_6464-bit lookup table450266100
CRC32_128128-bit lookup table320445164
LFSRLookup tables, state machine310124186