Shamir's Secret Sharing

Split secrets into shares — any threshold can reconstruct the original. Cryptographically secure using GF(256) arithmetic.

Secret

0 characters0 bytes

Configuration

3
2 (minimum)5 (all required)
5
3 (threshold)20 (maximum)
3-of-5 scheme: Any 3 shares can recover the secret. 2 shares can be lost without data loss.

Shamir's Secret Sharing uses polynomial interpolation over GF(256). Each share reveals zero information about the secret. Cryptographically secure — nothing leaves your device.

No shares generated yet

Enter a secret and configure the scheme to generate shares

How It Works

Perfect Secrecy

Any k−1 shares reveal zero information about the secret. Information-theoretically secure.

Polynomial Math

Uses polynomial interpolation over GF(256) — a finite field with 256 elements.

Client-Side Only

All cryptographic operations happen in your browser. No data is transmitted to any server.