encryption is missing here.
although it may not be the critical factor for many since the backup is stored at home and usually outside of reach of anyone, but it still is a good idea to encrypt what you store too.
unfortunately i have not seen any tools or proposals about encrypting mnemonics but it still isn't a complicated thing since you can easily treat it as a text that you encrypt and then print the encrypted result on paper.
BTW we can't consider Shamir Secret Sharing as an alternative to encryption. it is for secret "Sharing".
I think that part of the reason we haven't got any proposals or solutions regarding encryption of mnemonics yet is because this contradicts the idea of the mnemonic phrases themselves. Encrypted mnemonics are no longer easy to remember, it would be look like getting back to storing of single private keys to each address, which was not very convenient approach, quite the opposite. It also contradicts to the idea of plausible deniability, since there will be the only one key to decrypt your mnemonic. Of course, you still can encrypt it with additional passphrase, but it might become very complex security, which means you have to keep too much private key, possibility of losses increases.
you are thinking about it all wrong.
mnemonic is the human readable encoding of raw data. that raw data can be your entropy (which is what BIP39 or any similar proposal does) or it can be the encrypted result.
for example the phrase could be encrypted using AES-256 to get a fixed vector result then that "raw data" can be encoded using the same scheme used by BIP39 to get similar looking set of words with different lengths depending on the length of the input.
example
mnemonic: legal winner thank year wave sausage worth useful legal winner thank yellow
AES-256-CBC encrypt using (
http://cryptojs.altervista.org/secretkey/aes_cryptojs-v3.html)
passphrase: 8352dd9eb8b64669e0a8347fd37ae6e5
{
"iv":"b73afe9d14be3180f8e2001c9b86e601",
"mode":"CBC",
"padding":"NoPadding",
"keySize":256,
"cipher":"aes",
"salt":"0ed17b7de6e75d7d",
"ciphertext":"VTJGc2RHVmtYMSsvekJFdXpRTHlnUVc2R0RvaTAyQlNBdnRnSERnYlRCZm90enFDZGxKWlBhV2hSUVB3ZEdycAo5Z2R4dkdTR0hIZWNKci9mYlNOZGRhWnZaUFUyWkprdEk5MERMNXlzZUlMQzRoQTBsRVBMdmpKWktRPT0=",
"time":0,
"status":"success"
}
playing with the encrypted result (ciphertext) ignoring salt and IV for simplicity:
base64: VTJGc2RHVmtYMSsvekJFdXpRTHlnUVc2R0RvaTAyQlNBdnRnSERnYlRCZm90enFDZGxKWlBhV2hSUVB3ZEdycAo5Z2R4dkdTR0hIZWNKci9mYlNOZGRhWnZaUFUyWkprdEk5MERMNXlzZUlMQzRoQTBsRVBMdmpKWktRPT0=
base16: 553246736447566b58312b2f7a4245757a514c796751573647446f693032425341767467484467625442666f747a7143646c4a5a5061576852515077644772700a3967647876475347484865634a722f6662534e6464615a765a5055325a4a6b74493930444c35797365494c43346841306c45504c766a4a5a4b513d3d
base2: 01010101 00110010 01000110 01110011 01100100 01000111 01010110 01101011 01011000 00110001 00101011 00101111 01111010 01000010 01000101 01110101 01111010 01010001 01001100 01111001 01100111 01010001 01010111 00110110 01000111 01000100 01101111 01101001 00110000 00110010 01000010 01010011 01000001 01110110 01110100 01100111 01001000 01000100 01100111 01100010 01010100 01000010 01100110 01101111 01110100 01111010 01110001 01000011 01100100 01101100 01001010 01011010 01010000 01100001 01010111 01101000 01010010 01010001 01010000 01110111 01100100 01000111 01110010 01110000 00001010 00111001 01100111 01100100 01111000 01110110 01000111 01010011 01000111 01001000 01001000 01100101 01100011 01001010 01110010 00101111 01100110 01100010 01010011 01001110 01100100 01100100 01100001 01011010 01110110 01011010 01010000 01010101 00110010 01011010 01001010 01101011 01110100 01001001 00111001 00110000 01000100 01001100 00110101 01111001 01110011 01100101 01001001 01001100 01000011 00110100 01101000 01000001 00110000 01101100 01000101 01010000 01001100 01110110 01101010 01001010 01011010 01001011 01010001 00111101 00111101
groups of 11:
01010101001 -> 681 -> festival
10010010001 -> 1169 -> mutual
10011100110 -> 1254 -> orphan
....
now you have the encrypted mnemonic with a new set of words!