Chapter 3 Cryptography 81
Cryptography Overview
Figure 3-14 Secret Sharing Key Share Assignment
Figure 3-15 Secret Sharing Full Key Generation From Shares
Working with Keys

Key Generation

The techniques for generating public/private key pairs and symmetric keys are quite
different. Symmetric-key algorithms generally require an arbitrary random-byte
sequence, while a public/private key pair must satisfy a mathematical formula. Key
generation depends on the availability of a good random number generator, and the
security of a random number generator depends on the seed. See Pseudo-Random
Numbers and Seed Generation on page92 for more information.
Share #1
A Secret
Value
Share # N
Secret
Splitting N Shares
.
.
.
The
Original
Secret
Secret
Reconstruction
.
.
.
Any K
out of the
N shares