RETRACTED ARTICLE: An optimised homomorphic CRT-RSA algorithm for secure and efficient communication

Secure and reliable exchange of information between devices is crucial for any network in the current digital world. This information is maintained on storage devices, routing devices, and communication over the cloud. Cryptographic techniques are used to ensure the secure transmission of data, ensuring the user’s privacy by storing and transmitting data in a particular format. Using encryption, only the intended user possessing the key can access the information. During data or essential transmission, the channel should be secured by using robust encryption techniques. Homomorphic Encryption (HE) techniques have been used in the past for this purpose. However, one of the flaws of the conventional HE is seen either in its slow transmission or fast key decryption. Thus, this paper proposes an optimized Homomorphic Encryption Chinese Remainder Theorem with a Rivest-Shamir-Adleman (HE-CRT-RSA) algorithm to overcome this challenge. The proposed Technique, HE-CRT-RSA, utilizes multiple keys for efficient communication and security. In addition, the performance of the HE-CRT-RSA algorithm was evaluated in comparison with the classical RSA algorithm. The result of the proposed algorithm shows performance improvement with reduced decryption time. It is observed that the proposed HE-CRT-RSA is 3–4% faster than the classical Rivest-Shamir-Adleman (RSA). The result also suggests that HE-CRT-RSA effectively enhances security issues of the cloud and helps to decrease the involvement of intruders or any third party during communication or inside the data/server centers.


Introduction
With the proliferation of data and various communication devices all around, the security of data both while at rest and in motion has gained significance [5,6,17,19,36]. Data has become the world's most valuable asset, and its use, either positive or negative, can make a significant impact on individuals, businesses, organizations, and governments. Data security and privacy is the primary pillar for communication, either this communication is between humans, machines or human to machine [20,23,31]. Cryptographic algorithms are used to maintain a high level of secrecy for communication between individuals, among groups, and organizations. Cryptography is a method Cresantus Biamba cresantus.biamba@hig.se Extended author information available on the last page of the article. that offers protection of information by giving access to a closed group with encryption/decryption keys [27,28]. Researchers are seeking to find the most secure and complex cryptographic algorithms for clouds, networks, individuals [24]. In cryptography, transforming data or information from plain-text into some secret code (cipher-text) is known as encryption. This process is the most efficient and effective way of securing data.
With the advent of technologies in cloud computing, people can easily access and purchase cloud drive space to store their information and essential data. The cloud saves data in online database servers, which the cloud service providers manage, thus reducing the fear of data breaches. Cryptographic algorithms play a crucial role in the security of data or information [3], and thereby reduce or eliminate the fear of data breach. In other words, many optimized approaches are used by users for encryption to obtain security.
Security issues related to threat areas along the lines of external information storage, dependency on the "public"

A R T I C L E
internet, loss of control, multi-tenancy, and integration with inner security have been compared to conventional technology. It was noted that the cloud has many unique features, including its huge scale belonging to cloud carriers were distributed, heterogeneous, and virtualized [8]. Therefore, traditional security mechanisms consisting of identity, authentication, and authorization are insufficient for clouds in their present-day form.
The architecture of the cloud has challenges as well as successes. The cloud storage issues can be classified in personal or management: integrity, confidentiality, backups, data access, authenticity, and authority. The breach of security may be ethical in (Fig. 1) some cloud classification issues based on private or public [18]. Furthermore, cloud computing might also present exclusive dangers to a business enterprise than conventional IT answers. Unfortunately, integrating protection into those answers is frequently perceived as making them extra rigid.
Many devices perform well using RSA and the Chinese Remainder Theorem (CRT) when the fault part attacks the network. In most of the scenarios, the combination of the two algorithms is targeted. So, to prevent Fault Attacks, many generic techniques were implemented in the cloud security sector and proved to be a realistic approach. Construction of the combination of RSA and CRT cloud or data can be protected from attacks and shows a robust analysis [1]. Based on the latest optimized algorithm, different methodologies of computing the CRT RSA approach most securely exist. Hence, research shows an optimized approach which neither decreases execution time nor increases implementation time.
The author [35] provides that an effective technique for encryption named the HE technique helps to save cloud security from different fault threats. This scheme helps to encrypt and decrypt data without third-party disturbance. The experiment with numerous cryptographic algorithms on the cloud is used to keep the security and process of the encryption on data. It permitted complex numerical activities to be performed on encoded Fig. 1 Storage issues in cloud computing information without trading off the encryption. Generally, Homomorphic Encryption is relied upon to significantly impact distributed computing, permitting organizations to store encrypted information in an open cloud and exploit the cloud supplier's logical administrations.
The performance of the HE technique resolves the issues of cloud security, confidentiality, and privacy of data [7] and is a type of encryption procedure that shows the result as plain text after the operation or computation. HE is of two types (i.e., (1) Partial Homomorphic Encryption (PHE) and (2) Fully Homomorphic Encryption (FHE)). The latter is considered the most secured and efficient during the computation of third-party intervention. Based on the research done in past years, identification of the problem and future directions are discussed [39]. The RSA algorithm's efficient working with the key lengths of 1024 and 2048 bit was experimented to get the result of a faster speed of RSA encryption and slow decryption. Considering the security requirements of RSA with a key length of 2048 was selected as the working model of the hybrid cipher scheme, and the effectiveness and efficiency of the optimized cipher algorithm technique were tested. Therefore, by experimenting several times on the practical online interface, the encryption of data connected with the decryption of data [13].
Encryption is one of the best ways to guarantee the security of delicate data. It gives the instrument in data privacy, yet also worked with computerized signature, confirmation, mystery sub-keeping, framework security. Accordingly, the motivation behind adjusting the encryption method guarantees the data's classification, trustworthiness, and assurance, keeping data from altering, fraud, and falsifying. The two primary kinds of cryptographic calculations are a Symmetric Key cryptography and Asymmetric Key cryptography and a few models in each sort. The RSA algorithm already has a vast experimental aura as two integer values, less speedy or less secure than a single algorithm. When we combine two different techniques, the selected theorem and algorithm make the best combination and multiple key lengths and input values. Combining the Chinese Remainder Theorem and RSA technique (CRT-RSA algorithm) is currently actualized with homomorphic encryption/decryption calculation for better and greater security. Another contribution is the discussion of Homomorphic encryption/decryption with the proposed CRT-RSA to take the cloud and data security to the next level. This calculation depends on keeping up harmony among the security and speed of a calculation.
This proposed research implemented a homomorphic encryption technique along with CRT-RSA, where this method helps to multiply Cipher-Text (as value) and get the result when we decrypt it. The research's main objective is a detailed overview of Homomorphic

Problem statement
There are a plethora of cryptographic techniques and algorithms practically implemented to secure wireless communication in the classical channel. According to a recent survey in 2019, RSA algorithm is the strongest of all. However, it is likely to experience prolonged data sending and low communication factors where it is robust in security. This research aims at discussing the most successful data compression techniques along with the Homomorphic RSA algorithm to make cryptographic calculations more secure compared to the previous one.

Contributions
-Propose a novel approach named HE-CRT-RSA that optimizes the CRT-RSA algorithm by using multiple keys to make the transmission secure. -Provide a comparison between the classical RSA algorithm, single Key CRT-RSA with HE-CRT-RSA. -The results suggest that the HE-CRT-RSA endeavor to redesign the execution of the RSA cryptosystem through a system that improves the speed on the RSA encryption side by using the CRT and upgrade the security of the data by using two key factors rather than a single critical factor in comparison with existing techniques.

Organization
This research study is based on an advanced cryptography algorithm to enhance security in networking or wireless communication. The paper consists of different sections. The detailed background of cryptography is discussed in Section 2, literature review is discussed in Section 3 and a detailed overview of the RSA algorithm is discussed where the pros and cons will be discussed in Section 4. Section 5 provides the optimised RSA algorithm. After that, Theorem CRT is discussed in detail in Section 6. The proposed solution where detailed discussion on advanced RSA algorithm is discussed with practical implementation, results, and analysis in Section 7. Lastly, the research will be concluding with future findings and scope in Section 8.

Background
Cryptography is a way that permits people to defend data and communications with the assistance of codes. Cryptocurrencies, which include Bitcoin and Ethereum are interchangeable digital approach uses cryptography to check asset transfer, manage the introduction of extra units, and secure transactions. Cryptography brings a similar level of protection to the cloud by protecting information saved with encryption. It is worthy to note that cryptography can protect sensitive cloud information without delaying the transmission of data. Various organizations discuss cryptographic protocols for cloud computing to preserve stability, safety, and efficiency. Physical manipulation over cloud databases is impossible. The most effective way to stabilize a bit is to defend it with cryptography using cryptographic keys. There are diverse forms of cryptographic keys needed for cloud safety.

Symmetric key cryptography
Symmetric cryptography is the algorithm that utilizes the way into the encryption procedure and is equivalent to the key for the decoding procedure. The symmetric cryptography algorithm is separated into two classes: -Flow algorithm (Stream Ciphers) -Block algorithms (Block Ciphers) The upside of this symmetric cryptography algorithm is the procedure time for encryption and decryption that is moderately quick because of the effect of the key generator. Since the procedure is generally quick, this calculation is reasonable for advanced correspondence framework progressively like GSM. Nevertheless, sending messages to various clients takes an unexpected key in comparison to the past one. So the number of catches will be legitimately corresponding to the number of clients. The flow for the symmetric key generation's working is shown in Fig. 2.
Different points of interest of utilizing symmetric key calculations are higher working velocity when contrasted and deviated key calculation albeit legitimately corresponding with the expansion of document size, for example, speed of encryption and decoding process relies upon record size; the greater the document size, the additional time required for encryption and decryption. Be that as it may, there is likewise the weakness of this symmetric key calculation: for every conveyance of messages with various client required various keys, so there will be challenges in key administration [15]. A few calculations utilizing symmetric key calculation: 1. Data Encryption Standard (DES) is a mainstream square figure calculation since it fills in as a standard  Fig. 2 Symmetric key cryptography balance encryption key calculation, even though the new AES calculation has now supplanted it since DES is hazardous. DES has a place with a cryptographic arrangement of balance and has a place with a square figure type. DES works on a 64-piece square size. DES portrays 64 bits of plain text to 64 bits of cipher-text by utilizing 56 bits of inner key (interior key) or sub-key. The inner key is produced from an outer key 64-piece length. 2. RC6 is a cryptographic calculation that is remembered for the asymmetric key. This calculation is the improvement of the RC5 calculation remembered for Advanced Encryption Standard (AES). RC6 utilizes the center of the data-dependent pivot. RC6 is a calculation that utilizes obstruct to 128 bits, with key sizes utilized changing between 128, 192, and 256 bits. RC6 isolates the 128-piece hinder into four 32-piece squares and keeps the six essential working principles: number, subtraction, selective OR, whole number increase, sliding bits to one side, and bowing bits to one sidethe fundamental procedure right now the key planning and unscrambling of encryption.

Asymmetric key cryptography
In the mid-1970s Whitfield Diffie and Martin Hellman developed the Asymmetric algorithm. This encryption method upset the universe of cryptography. An Asymmetric key is a couple of cryptographic keys utilized for the encryption procedure and the other for unscrambling. Any individual who gets an open key can utilize it to encode messages, while just a single individual has a specific mystery private key to dismantle the secret phrase sent to him Fig. 3: However, this Asymmetric Encryption system has a shortcoming; for example, the encryption procedure is much slower than the symmetric key. Along these lines, for the most part, the message is not encoded with an unbalanced key, yet just symmetric keys are encrypted with a lopsided key. At the point when a message is sent after it is encoded with a symmetric key.
Rivest-Shamir-Adleman (RSA) calculation is the primary calculation appropriate for computerized marks and encryption and one of the most developed in the field of open key cryptography since first depicted in 1977. The RSA calculation includes a few stages, for example, key age, encryption, and decoding.
At present, the most popular and most broadly utilized open key framework is RSA, which was first proposed in the paper "A technique for getting computerized marks and open key cryptosystems" by RL Rivest et al. in 1978. An unbalanced (open key) cryptosystem depends on the number hypothesis, a square figure framework. Its security depends on the trouble of the vast number of prime factorization, which is a significant numerical issue that has no viable arrangement [32]. RSA open key cryptosystem is one of the most average ways to utilize open key cryptography in encryption and computerized signature guidelines.

Related work
Cloud computing is an articulation used to depict a set of enlisting minds that include innumerable associated through a non-stop correspondence framework, for instance, the Internet [33]. It could be tough to get information protection in the cloud because it travels through the Internet. Cloud safety and implementation are the primary trouble at some

R E T R A C T E D
A R T I C L E point in implementation. Because of this advantage, each organization that desires to use these facilities anticipating the ability issuer has to guard their information against unauthorized users. To keep the cloud infers stable, the meds (calculations) and limit (databases advocated with the aid of using the Cloud issuer) [9]. According to [22] cryptography means to make cloud data safe and secure. Cryptography is based on mathematical calculations and algorithms to make the data storing platform safe and secure. It can be thought of as the security toolkit of the cloud, servers, data, and communication. Authors in [26] indicate the strategies which might be beneficial for real-time encryption. All encryption techniques have been established to have their successes and failures as well as features established to be suitable for special applications. The assessment among Symmetric and Asymmetric algorithms indicates that Symmetric algorithms are quicker than their Asymmetric counterparts. Through the primary research and the result of the assessment, authors in [40] discover that the maximum dependable set of rules is AES in the period of velocity encryption, decoding, complexity, the duration of the key, shape, and flexibility.
The author [25] effectively implemented asymmetric key from the RSA algorithm. The results show that the RSA algorithm is efficiently proven to resist the false attempts to penetrate the information despatched via the community and tampering with this information. The extra safety is primarily based totally on the factorization of the big prime integers selected to generate the key [16]. To save an attacker's discovery of the cipher-text, it is best to choose a huge prime number to range within the RSA algorithm. According to [38], the encrypted plain-text with the aid of using the RSA algorithm is regularly utilized in combination with different encryption schemes to switch the information securely. To make RSA more efficient, a plain-text will typically be encrypted first with an asymmetric set of rules, and another time using the RSA algorithm to encode or encrypt the cipher-text the usage of the asymmetric key. The last use of the symmetric key is within the scope decryption of the cipher-text and to better the authentic plain text.
According to [14], the research has three kinds of encryption that were mixed to make the most the benefits of everyone to construct a secure system. According to [4,34], AES is used to encrypt dispatched information, exploiting its excessive encryption pace and its low RAM necessities. RSA is used to guard the encryption key against getting stolen by producing keys (personal and public). MAC is used to secure the encrypted key or information. The key and encrypted information are dispatched to the receiver and get decrypted through personal use. The typical encryption run is easy and speedy with low computational demands and gives high device secrecy.
Authors in [1] introduced changed RSA technique based on multi keys and Chinese remainder theorem (CRT) with RSA algorithm as uneven key encryption technique. The motivation of this Technique is to offer stable transmission of records among any networks. Network protection was the focus and designed to offer the utilization, safety, and integrity of the network and records [29]. The goal of their paper was to enhance the overall performance of RSA.
Authors in [21] proposed an RSA algorithm using more than one public key pairs with Homomorphic Encryption (HE). The concept is to generate a key pair from more than one key through RSA HE, which is in part HE in nature instead of an unpaired key pair. This approach utilizes one key for enciphering and a different one for deciphering. This scheme's splendor is that a single key pair is chosen from more than one key pair communicating with different parties. According to [12], the approach of more than one keys era utilizes a few mathematical logic for acquiring public keys directly, as opposed to the RSA scheme with a single key. By so doing, the attacks for locating the non-public key are minimized.
In the context of a Ciphertext Policy Attribute-based Code Encryption (CP-ABE), the statistics proprietors are allowed to add their statistics into cloud forms and open them with customers owning different credentials or characteristics, and for that reason, have a beneficial approach with a view to assure statistics safety in a cloud servers scenario [30]. However, a CP-ABE scheme cipher-text calls for a comfortable shape of access, which might also leak any records of the privileged recipients or expose the cipher-text underlying message. In this work, a homomorphic, primarily based CP-ABE version is carried out to enhance the cloud statistics' study safety. According to [11], the RSA algorithm inclined to factorize attacks is dependent on the worth "n", which showed an open key and could be breakable.
The authors in [2] proposed that e th roots modulo n with non-insignificant likelihood can be utilized to factor n. Currently, the attack is the primary shortcoming of the RSA algorithm dependent on the "e" and "n", which are the open keys utilized for encryption. The examination means to adjust an RSA algorithm dependent on the key age of new estimation of the open key to used or expanded the protection from factorization attack [10].  Fig. 4, the workflow or structure of the RSA algorithm can be seen. It is more defensive against attack. There are three stages: Generation of Key, encoding, and decoding. If the two prime numbers are taken simultaneously, it upgrades security. However, it requires the execution of Exponentiation by squaring calculation and square and duplicate calculation for viable encryption and unscrambling. For effortlessness, the program is planned with moderately little prime numbers.

Optimised RSA algorithm
A plan is being introduced where the data is packed utilizing compression algorithms and afterward scrambled by utilizing RSA calculation. The encoded message is then sent employing the Internet to the beneficiary. After accepting the message, it must be unscrambled first. At that point, the unscrambled message must be decompressed to get the first data. Then again, RSA works gradually when the size of its bit increments afterward 1024 bits, so as to improve the speed on RSA decryption side utilizing CRT (Chinese Remainder Theorem) by which the plan is semantically protected. The main idea of the proposed research upgrades the exhibition by utilizing Chinese Remainder Theorem and expand the security by utilizing two open keys in the decrypting. By proposing a CRT algorithm with RSA algorithm, a combination will help make fast communication and compress large data. The proposed model for the Optimized RSA algorithm is in Fig. 5.
The proposed framework is endeavoring to redesign the execution of the RSA cryptosystem through a system that has to improve the speed on the RSA encryption side by using the Chinese Remainder Theorem (CRT) and upgrade the security of the data by using two key factors rather than a single key factor. Using the sporadic whole number at whatever point encoded a comparable message more than one time it will look different. The general idea of this strategy is to advance the execution of the figuring and make it progressively secure and decrease the unraveling In steps for encryption and decryption, a, b, c, and d are prime numbers. For factorization, n and z integer values, whereas x denote for the cipher-text. During all steps of prime numbers are generated p and q and then calculate the modulus n. similarly, e for encryption of plain-text and d for the decryption of the cipher-text.
In RSA, with the aid of using the multi keys' method used prime numbers to generate more than one public keys and personal key, which this method offers more excellent protection compared with RSA set of rules and RSA CRT. In RSA, using the multi keys method, we used public and personal keys. This makes an individual more secure because he is not constantly attacked or robbed using unauthorized parties and enhancing protection and performance in information sharing over the network. However, much less pace evaluates to RSA set of rules and CRT-RSA. Since the usual RSA used high numbers to generate one public key and one non-public key to encrypt and decrypt, this makes it much less steady, which it is miles without problems decomposed. RSA takes more time with the aid of using multi keys to encrypt and decrypt than CRT-RSA using the use CRT in the decryption of RSA set of rules it calls for much less processing time and a smaller quantity of reminiscence for the very last decoded result as compared with RSA with the aid of using multi keys.

Procedure of encryption
Under the encryption process, messages are encrypted with a code referred to as a public key, shared openly. Due to the RSA algorithm's few awesome mathematical residences, as soon as a message has been encrypted with the public keys. To encode the message, M steps are as per the following:

A R T I C L E
After generating more than one public and personal key inside the procedure of key generation, now encrypted the message with the general public keys. Thus, the encryption procedure made times, the reliability is has become extra compared to the same old RSA algorithm. We will take the message (M) and the primary public key (e), then make the procedure of encryption and discover C1 = Me mod (n). Using C1 and the second one, the public key (g) could be determined the cipher textual content in the encryption procedure: C = Cg1 mod (z).

Procedure of decryption
In the decryption system, the authentic message is decrypted with the aid of using non-public keys d, t. The cipher-text could be decrypted with the primary non-public key (d) with this formula: m1 = C t mod (z), then can get the authentic message with second non-public key (t) with this formula: M = MD 1 mod (n).

Multiple keys in CRT-RSA
CRT-RSA provides better security when compared to the standard RSA. This calculation utilized four prime numbers to create numerous open keys and many private keys.
In this CRT-RSA algorithm, two open and private keys, which makes it more secure since it will not be attacked or looted by unapproved individuals and enhancing safety and efficiency in information distribution over the system, however low-speed contrasts with RSA calculation. Meanwhile, the classical RSA utilized two prime numbers to create one open and private key to do encryption. Decryption provides a little less security, which effectively deteriorates. Here, in Fig. 6, the flow chart for optimizing the RSA algorithm is shown.
In CRT-RSA, applying the multi-key method and utilizing two open and private keys makes it more secure since it cannot be attacked or burgled by unapproved Fig. 6 Proposed optimized RSA algorithm individuals and refining security and efficiency information distribution over the system. However, low-speed contrasts with RSA calculation and CRT-RSA. Hence, the classical RSA utilized two prime numbers to produce one open key and one private key to encode and decode, provide little less security, which effectively deteriorates. RSA, by using multi keys, set aside some effort to encode and decode much more than classical RSA by utilizing CRT to decode RSA calculation, consumes or takes less handling time, and littler measure of memory for final decoded result contrasted and RSA by multi keys.
The following is the step-by-step procedure for the working of the proposed CRT-RSA algorithm in the form of Pseudocode by using Python language: Select input values a, b, c, d (by using RSA built-in library), then encrypt the key, a, b, c, d prime numbers generated, then decrypt the key (by using CRT-RSA), And then finally print the output.

Optimised homomorphic CRT-RSA algorithm
Our proposed HE-CRT-RSA algorithm is currently actualized with homomorphic encryption/decryption calculation for better and greater security. This calculation depends on keeping up harmony among the security and speed of a calculation. Currently, stacks are taken, such as the first stack holds the data about Sequence Counter (CS), and the other stack keeps up the record for the information on which encryption must be performed. The decoding process is the

A R T I C L E
opposite of the encryption process. The correct Sequence Counters (CS) are recognized from the succession Counter table for the decrypting strategy.

Encryption process CRT-RSA using homomorphic technique
Fundamental favorable position of the altered calculation is no key common over the system while keeping up the information scrambled over the system. Absolute security of the information regardless of which organization used to get to the information. No information respectability was lost. The process of creating key and encryption of text is almost similar to the process of classical RSA except that the procedure for the generation of private key is in the form of i.e., a, b, mod n and m for message.
Whereas: By including the element of homomorphic encryption, speeds up, security, and throughput. The work flow of the Proposed Homomorphic RSA encryption Procedure shown in Fig. 7.

Decryption process of CRT-RSA using homomorphic encryption
Decryption process is actually the converse of encryption process. The best possible sequence counters (CS) are distinguished from the SC table for decrypting methodology. The work flow of the Proposed Homomorphic RSA decryption Procedure is shown in Fig. 8.
Information cannot be decrypted by any procedural technique for no data will be made accessible about the key. This adjusted CRT-RSA calculation gives greater security as a contrast with RSA calculation by performing mathematical procedures on encoded information.

Result and discussion
For the practical implementation of HE-CRT-RSA, an online python interface was used for the test and experiments. In this proposed research, Homomorphic encryption techniques was used along with CRT-RSA, where this method helps to multiply Cipher-Text (as value) and get the result when decrypted as shown in Fig. 9.
In this experiment, a CRT-RSA was used to multiply two value, and get the result of by decrypting them.  and C3 = C1× C2 = a (mod N)×b (mod N) = a×b (mod N). Then C3 = (ab) (mod N) C3 = (ab) (mod N).

Comparison between existing RSA and proposed homomorphic CRT-RSA
Execution of RSA-CRT decoding is done from java-based code in numerous past looks. A few experiments are dependent on various situations, including diverse message lengths and distinctive key sizes for message decoding. These experiments are utilized to test the presentation and security elements of CRT-RSA. Encryption time is a period that a calculation takes to encode the plain content. As key length builds, encryption time is taken by both calculation increments continuously. Figure 10 uncovers that RSA-CRT encryption time is very nearly multiple times quicker when contrasted with RSA encryption time.
Decrypting time is a period that a calculation takes to decrypt the Cipher-Text content. As key length builds, decrypting time taken by both calculation increments continuously. Figure 11 uncovers that CRT-RSA unscrambling time is very nearly multiple times quicker when contrasted with RSA decoding time.   Table 1 demonstrates the four unique sizes of documents and relating decoding execution time taken by straightforward RSA calculation and CRT-RSA utilizing Homomorphic encryption in KB/Seconds in a moment or two. By breaking down Table 1, we reason that the decoding time taken by CRT-RSA utilizing Homomorphic encryption is little in contrast with RSA. The decrypting time is taken by primary RSA and CRT-RSA utilizing Homomorphic encryption and four distinctive information records. By examining Table 1, we notice that the throughput time (millisecond) taken by CRT-RSA utilizing Homomorphic encryption is enormous compared to RSA. The Table 2 show the relation and comparison between the classical RSA algorithm, single Key CRT-RSA, and our proposed HE-CRT-RSA approach.
The proposed algorithm and techniques save the cloud from various malicious attacks and the third party. In Table 3, the comparison of different security algorithms with classical RSA technique. Comparison is based on the system memory, Bytes of encryption, and optimal Byte for encoding through the survey. Table 4 shows the comparative analysis of classical RSA and proposed HE-CRT-RSA. After the practical implementation of both algorithms the decryption time in bytes along with key length shown. The results show the efficiency and fast application of the key length 1024, 2048, 3072 and 4096.
The proposed method is progressively secure when contrasted with classical RSA calculation and CRT-RSA. Also, it improved the working, the calculation in

A R T I C L E
unscrambling because it utilized the CRT in decoding, in this manner the proposed strategy quicker than RSA by multi keys. It diminishes the expense of calculation. Even though it requires some investment to perform it when contrasted with unique RSA.

Conclusion
A combination of the Chinese Remainder Theorem (CRT) algorithm has been proposed with the RSA algorithm to make fast communication and compress large data. The proposed framework is endeavoring to redesign the execution of the RSA cryptosystem that improves the speed on the RSA encryption side by using the CRT and upgrade the security of the data by using two key factors rather than a single key factor. In this proposed research, the CRT-RSA cryptographic algorithm is used to make fast, efficient, and secure wireless communication between two parties. Along with this, the proposed CRT-RSA algorithm is trying to merge with the homomorphic Technique for better and secure communication. This research objective includes a detailed overview of the most successful classical cryptographic Technique, where RSA is the best of all. The research proposed an RSA with the Chinese Remainder Theorem using multiple keys and large input values in a Matlab framework that helps optimize the cryptographic algorithm. Another contribution is the discussion of using homomorphic encryption/decryption with proposed CRT-RSA to take the security to the next level. Future work will discuss the practical implementation of the Advanced Homomorphic CRT-RSA algorithm and cloud issues and security threats.
Funding Open access funding provided by University of Gävle.

Conflict of interest The authors declare no competing interests.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.