Privacy Preserving Using Extended Euclidean Algorithm Applied To RSA-Homomorphic Encryption Technique
D. Chandravathi1, P.V. Lakshmi2

1D. Chandravathi, GVP College for Degree and PG Courses (A), Rushikonda, Viakhapatnam-45.
2Prof. P.V. Lakshmi, GITAM University, Rushikonda, Viakhapatnam-45.

Manuscript received on 05 August 2019 | Revised Manuscript received on 09 August 2019 | Manuscript published on 30 August 2019 | PP: 3175-3179 | Volume-8 Issue-10, August 2019 | Retrieval Number: J12360881019/19©BEIESP | DOI: 10.35940/ijitee.J1236.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Communication of confidential information over Internet is the key aspect of security applications. Providing protection to sensitive information is of major concern. Many cryptographic algorithms have been in use for providing security of confidential information. Providing security for data has become major challenge in this era. Classical cryptography is playing a major role in providing security for applications. In modern days securing confidential information in the cloud is considered as an important challenge. Homomorphic Encryption technique is one of the best solutions that provide security in the cloud[1]. In this paper, Extended Euclidean Algorithm is used for generating keys. This technique follows RSA Homomorphic encryption technique. .RSA Homomorphic encryption using Extended Euclidean algorithm (RSA-HE-EEA) is secure when compared to RSA as it based on the generation of private key which makes the algorithm complex .This technique of using Extended Euclidean Algorithm(EEA) is fast and secure when compared to RSA homomorphic encryption technique. The encryption process utilizes modulo operator which gives security as well.The beauty of this algorithm is in generation of private key which uses Extended Euclidean Algorithm (EEA) that helps in avoiding brute force attacks. Also, this technique uses Homomorphic operations which gives enhance security to confidential information in the cloud.
Keywords: Classical Cryptography, Homomorphic Encryption, RSA, EEA, Private Key, Brute Force Attack.

Scope of the Article: Encryption Methods and Tools