Shamir Secret Sharing (SSS)

A browser-only implementation of Adi Shamir's 1979 secret-sharing scheme. Choose how many shares to produce (N up to 255) and how many are needed to reconstruct (K, the threshold). Distribute the shares across people, devices, or safe-deposit boxes. As long as K of them survive, the secret can be recovered; with fewer than K, the secret is mathematically indistinguishable from random.

How to use

1
Choose N and K

Pick N (how many shares to make) and K (how many you need to recover). Common choices: 2-of-3 for personal, 3-of-5 for small team, 5-of-7 for high-value escrow.

2
Type the secret

Master password, seed phrase, encryption key — anything up to a few hundred bytes works.

3
Distribute the shares

Give each share to a different person, location, or device. Write them on paper, print them, or save in separate password managers.

4
Recover when needed

When you need the secret, gather K of the shares, paste them into the Combine tab, and the secret is reconstructed.

Split a master password or seed phrase into N pieces — any K of them recover it, fewer reveal nothing

You will receive N shares. Any K of them reconstruct the secret. Fewer than K reveal nothing — not even partial information.

What Shamir Secret Sharing does

  • Information-theoretic security: with fewer than K shares, an attacker learns NOTHING about the secret — not even its length.
  • Each share is the same length as the secret plus a 1-byte index. No password, no key, no entropy lost in sharing.
  • Uses the standard byte-wise scheme over GF(2^8) — the same algebra as AES, well-vetted across decades.
  • Distribute shares across people, devices, geographic locations. Recovery only needs K of them.
  • This implementation does NOT add any password layer on top — the shares ARE the protection. If a share leaks, you have lost one fraction of your safety margin.
Copied
Don't know what to try?
380 free tools — open a surprise
🎲 Surprise me

Features

Information-theoretic security GF(2⁸) byte-wise Up to 255 shares Combine and verify Crypto-secure randomness Local only

FAQ

How is this different from encrypting and giving everyone the password?

Encryption splits the secret into ciphertext + key — anyone with both has full access. Shamir splits the secret directly into N pieces; you need K of them, and K−1 shares reveal nothing mathematically (not just computationally).

What is a good (K, N)?

2-of-3 is the popular default for individuals (two locations, you, partner, lawyer). 3-of-5 for small teams. Higher K reduces risk of compromise; higher N improves survivability against loss.

Can I trust the implementation?

The code is in your browser — inspect it via View Source. It uses standard byte-wise SSS over GF(2⁸) with the AES Rijndael field, which is the most widely-implemented and vetted SSS construction.

What if a share is lost?

As long as at least K shares remain, the secret can be recovered. Distribute N > K to add redundancy — a 3-of-5 scheme survives losing 2 shares.

What if a share is leaked to an attacker?

If fewer than K are leaked, your secret is still safe. You should rotate the secret and redistribute new shares; the old ones can no longer recover anything because the underlying secret has changed.

Is this compatible with other SSS tools?

It uses the canonical byte-wise scheme over GF(2⁸) with the standard 0x1b reduction polynomial. Compatible with most libraries that implement "Shamir over GF(256)" in the same byte format.

💡 Want us to improve this tool just for you?

We can — and it's free! Just send us a quick message with your idea. If you'd like to discuss it in detail, leave your email and we'll get back to you. You can stay anonymous.

How do you rate this tool?

Thank you for your rating!
Want to share more? Leave a comment!
Thank you! Your comment will appear after moderation.
Published Updated