{"id":1616,"date":"2025-01-31T21:29:41","date_gmt":"2025-02-01T04:29:41","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=1616"},"modified":"2025-01-31T21:29:46","modified_gmt":"2025-02-01T04:29:46","slug":"shamir-secret-sharing","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/01\/31\/shamir-secret-sharing\/","title":{"rendered":"Shamir Secret Sharing"},"content":{"rendered":"\n<p class=\"has-white-color has-secondary-background-color has-text-color has-background has-link-color has-large-font-size wp-elements-0bd766837ea9ec94c2e1505daa92074b\">Walkthrough of the Teaching Aide: Shamir Secret Sharing\u00a0<\/p>\n\n\n\n<p>\u201cWelcome! Today, we will dive into Shamir\u2019s Secret Sharing\u201d&nbsp;<\/p>\n\n\n\n<p>Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir&#8217;s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be reconstructed when enough shares are combined.&nbsp;<\/p>\n\n\n\n<p><strong>What You Will Learn<\/strong>&nbsp;<\/p>\n\n\n\n<p>We will cover:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Explaining Shamir Algorithm:<\/strong> A cryptographic technique that divides a secret into multiple parts (shares) such that the original secret can only be reconstructed when enough shares are combined.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lagrange Interpolation Formula:<\/strong> A key mathematical concept used in Shamir&#8217;s Secret Sharing to reconstruct the original secret from the shares.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>We will also dive into real-world examples, like how companies such as Vault use Shamir&#8217;s Secret Sharing to protect root keys and how it is applied in IoT data storage to keep information private and accessible. Throughout our presentation, we will explore these examples to see how Shamir&#8217;s Secret Sharing works in practice and its real-world benefits.&nbsp;<\/p>\n\n\n\n<p><strong>Why This Topic Matters<\/strong>&nbsp;<\/p>\n\n\n\n<p>Cryptographic techniques like Shamir&#8217;s Secret Sharing form the backbone of secure data management, allowing sensitive information to be protected even if some parts of it are compromised. This method provides robust security against data breaches and unauthorized access.&nbsp;<\/p>\n\n\n\n<p>For example, in the case of Vault, the root key is split among multiple users, ensuring that no single user holds the entire key. This adds an extra layer of security by requiring a threshold of shares to trigger the unseal process. Our aide thoroughly explores these real-world applications, detailing how they ensure data integrity and prevent unauthorized access.&nbsp;<\/p>\n\n\n\n<p><strong>Why this works?<\/strong>&nbsp;<\/p>\n\n\n\n<p>&nbsp;One of the fundamental mathematical properties used in Shamir\u2019s secret sharing is the fact that it takes k points to define a polynomial of degree k &#8211; 1.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For example:&nbsp;&nbsp;<\/p>\n\n\n\n<p>&nbsp;Only one line can be drawn between two points, &amp; only one parabola crosses through the same three points.&nbsp; Only one cubic curve passes through the same four points, but an infinite number of lines can be drawn through a single point.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Engaging Presentation Format<\/strong>&nbsp;<\/p>\n\n\n\n<p>We have designed this teaching aide to be interactive and engaging. It includes detailed slides and real-world case studies that show how Shamir&#8217;s Secret Sharing is applied. Plus, we have added visuals to break down complex ideas, making them easier to understand.&nbsp;<\/p>\n\n\n\n<p><strong>Engagement Activity<\/strong>&nbsp;<\/p>\n\n\n\n<p>To deepen your understanding, we have done an implementation of Shamir&#8217;s Secret Sharing in Python. &nbsp;Feel free to download the code from the repository &amp; run it yourself. The code is heavily commented explaining the logic. &nbsp;<\/p>\n\n\n\n<p>\u00a0<br>Link &#8211; <a href=\"https:\/\/github.com\/OscarConstantino\/Shamir_share_secret_OACM\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/OscarConstantino\/Shamir_share_secret_OACM<\/a>\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"378\" height=\"497\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/image-16.png\" alt=\"\" class=\"wp-image-1624 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/image-16.png 378w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/image-16-228x300.png 228w\" data-sizes=\"(max-width: 378px) 100vw, 378px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 378px; --smush-placeholder-aspect-ratio: 378\/497;\" \/><figcaption class=\"wp-element-caption\">You can share your secret number into different documents.\u00a0<\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"401\" height=\"488\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/image-14.png\" alt=\"\" class=\"wp-image-1618 lazyload\" style=\"--smush-placeholder-width: 401px; --smush-placeholder-aspect-ratio: 401\/488;width:300px;height:auto\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/image-14.png 401w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/image-14-247x300.png 247w\" data-sizes=\"(max-width: 401px) 100vw, 401px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><figcaption class=\"wp-element-caption\">Then you can recover the secret by uploading the minimum number of documents.\u00a0<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>Objective of the implementation<\/strong>&nbsp;<\/p>\n\n\n\n<p>The implementation shows how the algorithm works with different entries, small or big integer numbers. Another objective is to develop a visual GUI tool that shows how the Shamir secret sharing algorithm can be used. It is easier to demonstrate how the algorithm works with visual and interactive tools.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>In summary, this teaching aide empowers you with valuable knowledge about Shamir&#8217;s Secret Sharing and its applications in secure data management. By exploring the intricacies of the algorithm, understanding its mathematical foundations, and learning best practices, you will be better equipped to contribute to a secure digital environment.&nbsp;<\/p>\n\n\n\n<p>Let us embark on this journey together\u2014your insights and curiosity are key to a more secure future in cryptography! Thank you for joining us!&nbsp;<\/p>\n\n\n\n<p class=\"has-secondary-background-color has-background\">You can download the teaching aim here:<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-13405208-e156-4934-8c7a-ed82cffa82ed\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/SHAMIR_SECRET_SHARING_ISEC-3.pptx\">SHAMIR_SECRET_SHARING_ISEC<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/SHAMIR_SECRET_SHARING_ISEC-3.pptx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-13405208-e156-4934-8c7a-ed82cffa82ed\">Download<\/a><\/div>\n\n\n\n<p>Group members:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Ankita Ankita\u00a0\u202f<\/td><\/tr><tr><td>Oscar Alfredo Constantino Mota\u00a0<\/td><\/tr><tr><td>Smruti Ranjan Dash&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Walkthrough of the Teaching Aide: Shamir Secret Sharing\u00a0 \u201cWelcome! Today, we will dive into Shamir\u2019s Secret Sharing\u201d&nbsp; Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir&#8217;s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/01\/31\/shamir-secret-sharing\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Shamir Secret Sharing&#8221;<\/span><\/a><\/p>\n","protected":false},"author":667,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1616","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Oscar ACM","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/oscar-alfredo-constantino\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/667"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=1616"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1616\/revisions"}],"predecessor-version":[{"id":1631,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1616\/revisions\/1631"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=1616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=1616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=1616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}