In most asymmetrical crypto system implementation, the only fact that is ensured is that you cannot find the private key from the public key. The other way round, finding the public key from the private key is trivial in most case.

For instance, in RSA, you can create public key from private key with:

```
openssl rsa -in private.pem -pubout -out public.pem
```

What is misleading is the terminology: “private key” refers to 2 different concepts whether you are speaking of the theory, or wether you are speaking of practical implementation:

- The
*theoretical*private key is the couple*(d, n)*which shares perfect symmetrical (mathematical) relation with*(e, n)*. If you are comparing these, one cannot be computed from the other. - The
*practical*private key (as in openssl implementation for example), refers to a file containing*(d, n)*but also several important intermediate values for decoding speed purpose. In addition to that, the theoretically “unknown” part of the public key*e*is often fixed to common values by convention (which is`0x10001`

by default in openssl and albeit it can be changed, it is strongly recommended to stick to only very specific values). So deducing the public key*(e, n)*from the private key is trivial for more than one reason.