Key Splitting Tool

Split secrets using Shamir's Secret Sharing scheme

Secret to Split

Split Configuration

5

Number of shares to generate

3

Minimum shares to reconstruct

3 of 5 shares required

How Shamir's Secret Sharing Works

1

Polynomial Creation

The secret becomes the constant term of a random polynomial of degree k-1

2

Share Generation

Each share is a point on this polynomial (x, f(x))

3

Reconstruction

Any k points can reconstruct the polynomial using Lagrange interpolation

Common Use Cases

Master Key Protection

Split encryption master keys among multiple administrators

Cryptocurrency Wallets

Secure seed phrases with multi-party access control

Corporate Secrets

Require multiple executives to access sensitive data

Estate Planning

Distribute access among family members with trust conditions