diff --git a/xml/System.Security.Cryptography/RSAParameters.xml b/xml/System.Security.Cryptography/RSAParameters.xml index 7bf63de125e..4a6408d460b 100644 --- a/xml/System.Security.Cryptography/RSAParameters.xml +++ b/xml/System.Security.Cryptography/RSAParameters.xml @@ -78,9 +78,7 @@ ||p|prime1| ||q|prime2| - The security of RSA derives from the fact that, given the public key { e, n }, it is computationally infeasible to calculate d, either directly or by factoring n into p and q. Therefore, any part of the key related to d, p, or q must be kept secret. If you call - - and ask for only the public key information, this is why you will receive only and . The other fields are available only if you have access to the private key, and you request it. + The security of RSA derives from the fact that, given the public key { e, n }, it is computationally infeasible to calculate d, either directly or by factoring n into p and q. Therefore, any part of the key related to d, p, or q must be kept secret. If you call and ask for only the public key information, this is why you will receive only and . The other fields are available only if you have access to the private key, and you request it. is not encrypted in any way, so you must be careful when you use it with the private key information. In fact, none of the fields that contain private key information can be serialized. If you try to serialize an structure with a remoting call or by using one of the serializers, you will receive only public key information. If you want to pass private key information, you will have to manually send that data. In all cases, if anyone can derive the parameters, the key that you transmit becomes useless.