kn Secrets

Type a Secret, Make n User-Friendly Secure Shares
With a Recovery Threshold of k

kn Secrets works purely in your browser. There is no browser code at kn Secrets that is to transmit any secrets or Secure Shares thereof back to servers.

kn Secrets is presented according to the warranty disclaimer that can be read on the legal page.
Reset this page by reloading it.

Step 0

You must read and follow the security guidelines whenever you use kn Secrets for real secrets. Otherwise, it's ok to proceed if you just use non-secret example input. You may also read the FAQ to learn more about Secure Secret Sharing.

Step 1

Click the input field that corresponds to the type of secret you want to provide — The default is BIP39 mnemonics. Then enter the secret itself.

BIP39
Use input field to type groups of BIP39 mnemonics, finalize each group by hitting enter.
BIP39 mnemonics entered will appear here.
decimal
hexadecimal
free text
Unicode characters are supported in free text. However, line breaks will probably
not be preserved due to limitations in many common browsers.

Step 2

Provide your k, the number of Secure Shares used to recover the secret, and your n, the total number of Secure Shares. The maximum for n at kn Secrets is 255. — So that there is always a relationship of 2 ≤ k ≤ n ≤ . Please note that, as you increase or decrease k or n, both may move together to keep this relationship.

Step 3

Step 4

Review secret to be transformed into Secure Shares:

Secret to be transformed into Secure Shares will appear here.

?, ?

Step 5 - optional

kn Secrets requires randomness to generate Secure Shares. To this end, kn Secrets employs industry-standard, cryptographically secure randomness built into your browser. Nevertheless, we still provide the option of augmenting randomness by way of human input. If you desire to provide human input, then please activate the quadratic field shown below by clicking it, then move your mouse cursor over this field. The quadratic field will show points that track your mouse movements. Monitor the point count shown beneath the quadratic field. You need to continue until the number of new points is equal to the number of points required. New points will all be used exactly once — but still in combination with browser-based randomness — to compute Secure Shares. The way in which both sources of randomness are combined is also cryptographically secure. Read the FAQ to learn more about how randomness is treated at kn Secrets.


Step 6

Secure Shares will appear here in Step 7. Step 8 will help you with testing recovery. Step 9 will allow you to generate PDF pages for printing Secure Shares.