This document analyzes the security implications of sharing the same RSA modulus n between two users. It presents three algorithms that an attacker could use to break RSA encryption if the public keys for two users share the same n value. Algorithm 1 works if the public exponents are relatively prime. Algorithm 2 works for small public exponents by factoring n. Algorithm 3 directly factors n from the private exponent. The conclusion is that RSA is breakable if n is not unique per user.