Loading

Interbit Exchange and Merge (IBEM) Pattern of Blowfish Algorithm
S. Sweetlin Susilabai1, D.S. Mahendran2, S. John Peter3

1S. Sweetlin Susilabai, Research Scholar, Manonmaniam Sundaranar University, Tirunelveli (Tamil Nadu), India.
2Dr. D.S. Mahendran, The Principal, Aditanar College of Arts & Science, Tiuchendur, (Tamil Nadu), India.
3Dr. S. John Peter, Associate Professor & Head, Department of Computer Science, St. Xaviers College, Tirunelveli, (Tamil Nadu), India.
Manuscript received on 05 February 2019 | Revised Manuscript received on 18 February 2019 | Manuscript Published on 04 March 2019 | PP: 129-132 | Volume-7 Issue-5S2 January 2019 | Retrieval Number: ES2018017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nowadays security plays important role whenever there is communication between sender and receiver. To triumph over the issues of security intruders, various cryptographic algorithms are used. In this paper, authors have attempted to improve the security level of blowfish with proposed Inter bit exchange and merge (IBEM) pattern of data before applied which is fed into S-Boxes. Inter bit Exchange and Merge (IBEM) pattern of data allows the intruders cannot easily find key mechanism what the user actually send. The results of all the tests conducted which leads to a common conclusion that the security of the Inter bit Exchange and Merge process provides data in great secure manner when compared to original blowfish algorithm.
Keywords: AES, DES, Blowfish, Cryptography.
Scope of the Article: Algorithm Engineering