# Shamira # Implements [Shamir's secret sharing algorithm](https://en.wikipedia.org/wiki/Shamir's_Secret_Sharing). Splits a string or a byte sequence byte-per-byte into _n_<255 shares, with any _k_ of them sufficient for reconstruction of the original input. Outputs the shares as hexadecimal, Base32 or Base64 encoded strings. ## Installation ## ### From pip Run `pip install shamira`. ### From the source Can be run straight from the cloned repository by executing the package with `python -m shamira` or simply installed with `python setup.py build`, `python setup.py install`. Then imported in your code with `import shamira` or run from the command line with `shamira`. ## Usage ### As a CLI application Run `shamira split ...` for splitting and `shamira join ...` for joining the shares back. Appending `--help` will show you the documentation. ### As a library `from shamira import generate, generate_raw, reconstruct, reconstruct_raw` `help(function)` will show the documentation. ## Issue tracker Please report your issues to https://trac.19x19.cz/shamira/report ## Performance ## As it is, the code is not very fast. Let's assume we have a secret of length _m_. For each byte, the splitting takes _n_ evaluations of a polynomial of order _k_ over Galois field 256, leading to _O(n\*k\*m)_ finite field multiplications. Reconstruction of the constant parameters during joining takes _O(k\*k + k\*m)_ multiplications. Benchmark results, all values mean _seconds per byte_ of the secret length:
k / n parameters | Split | Join |
---|---|---|
2 / 3 (a Raspberry Pi 3) | 6.08e-05 | 0.000435 |
2 / 3 (a laptop) | 5.02e-06 | 4.12e-05 |
254 / 254 (a Raspberry Pi 3) | 0.226 | 0.0314 |
254 / 254 (a laptop) | 0.0125 | 0.00175 |