Use at your own risk! Special characters, symbols and whitespaces may give you different
results
than other hash generators and encryption tools.
Important! Always encrypt classified data (for example confidential military documents)
with
a long random generated password. There are many situations (for example, due to extortion) where you cannot
refuse to reveal the password.
NEVER remember or keep important password, divide and store at multiple different
locations!
Note! This secret sharing method is based on Shamir's threshold secret sharing scheme,
named
after its discoverer Adi Shamir. His 1979 landmark paper, "How to Share a Secret" [PDF],
provides the background for this threshold sharing scheme.
One of the most useful properties of Shamir's sharing scheme is that it is "information-theoretically
secure"
and "perfectly secure", in that less than the requisite number of shares provide no information about the
secret
(i.e. knowing less than the requisite number of shares is the same as knowing none of the shares).