Key Splitting Tool
Split secrets using Shamir's Secret Sharing scheme
Secret to Split
Split Configuration
5
Number of shares to generate
3
Minimum shares to reconstruct
3 of 5 shares required
How Shamir's Secret Sharing Works
1
Polynomial Creation
The secret becomes the constant term of a random polynomial of degree k-1
2
Share Generation
Each share is a point on this polynomial (x, f(x))
3
Reconstruction
Any k points can reconstruct the polynomial using Lagrange interpolation
Common Use Cases
Master Key Protection
Split encryption master keys among multiple administrators
Cryptocurrency Wallets
Secure seed phrases with multi-party access control
Corporate Secrets
Require multiple executives to access sensitive data
Estate Planning
Distribute access among family members with trust conditions