Journal of Applied Sciences1812-56541812-5662orgz10.3923/jas.2008.3863.3870AbbadiMohammad122008821This study introduces a new implementation based on
DES block cipher technique and the major three functions used in MD5,
The idea is based on taking some outputs from every DES loop, applying
functions over them, then, finally applying chaining functions on the
ciphered message blocks. This study is aimed to introducing a new message
authentication technique that takes the output of DES Iterations as an
input, manipulates it through a zigzag and some other diffusion operations
to produce the basic of a MAC code. The proposed technique encompasses
an efficient performance and inherits the DES strength points. Moreover,
the technique surmounts most of the CBC MAC chaining weaknesses; this
is done by changing the K_{1} and K_{2} values for every
iteration.]]>Bellare, M., R. Canetti and H. Krawczyk,1996Bellare, M., P. Rogaway and D. Wagner,2004Black, J. and P. Rogaway, 2005Boneh, D., G. Di Crescenzo, R. Ostrovsky and G. Persiano,2004Cam-Winget, N., R. Housley, D. Wagner and J. Walker, 2003Cary, M. and R. Venkatesan, 2003Dworkin, M., 2005Ferguson, M., 2002Ferguson, M., D. Whiting, B. Schneier, J. Kelsey and T. Kohno, 2003IEEE, 1999Jutla, C., 2001Lee, A., 1999National Institute of Standards and Technology (NIST), 1985National Institute of Standards and Technology (NIST), 2001Rogaway, P., M. Bellare and J. Black,2001Rogaway, P. and D. Wagner,2003Rogaway, P. and T. Shrimpton,2006