Since this is also tagged Cryptography, this about more into the effectiveness of possible algorithms.
There is a way to compute the Euler Totient φ very fast if you know the prime factors of n. Let pi be distinct k primes factors of n then
φ(n) = (p1 -1) * (p2-1) * ... * (pk-1)
There is also a formula for prime powers, too. That is not necessary here since either RSA encryption/signature or Paillier encryption or Rabin signatures uses n = p*q with two distinct primes p and q.
As we see, effectively finding the φ(n) requires the knowledge of the factorization. It is proven that for RSA the knowledge of the φ(n) is equal to factorization of the n. Shortly see here;
or see in the original RSA paper;
If we turn to factoring (RSA), the current record achieved in 2020, CADO-NFS has factored an 828-bit n with "roughly 2700 core-years, using Intel Xeon Gold 6130 CPUs as a reference (2.1GHz)".
However, if you ever need to use RSA, you should use a modulus of size at least 2048-bits, see in keylength.com. This is safe from factoring at least for a reasonable time from classical factorization and Shor's quantum factoring algorithm.
As a result, there is no effective algorithm for finding the Euler's totient for large n if you don't know the factorization.