Ledger Flex™を使用して、トランザクションを安全な画面上で確認&署名

今すぐチェック

カテゴリーなし | 2025/06/20

Ledger Recovery Key White paper

  1. Introduction
  2. Keywords tables
  3. Ledger Recovery Key – From a user perspective
  4. Secure Elements and Hardware Security Modules
  5. Recovery Key – From a design perspective
  6. Recovery Key – From a components perspective
  7. Communication protocols and cryptography algorithms
  8. Recovery Key – From a technical perspective
  9. Conclusion
  10. Afterwords

1 – Introduction

Welcome to this technical white paper, which is presenting an overview and deep-dive into the Ledger Recovery Key product, its architectural design, and its security.

We will present the way the product is built, its underlying technology and its functionalities, as well as the cryptographic protocols used when it comes to communicating with it. Our goal is to provide you with all the necessary information allowing anyone interested to see the measures we have taken to allow Ledger users to continue doing with Ledger Recovery Key what they used to do with our Hardware Wallets: own and manage their secret data in a secure and self-custodial way.

The technology described in this white paper is the subject of one or more pending patent applications. The publication of this white paper does not grant, either expressly or impliedly, any license, right, or permission to make, use, sell, or otherwise distribute the described technology.

2 – Keywords tables

2.1 – General

KeywordMeaning
HSMHardware Security Module
NFCNear Field Communication
PINPersonal Identification Number
SESecure Element

2.2 – Keys

KeywordMeaning
ccCard Challenge
ccrCard Cryptogram
cpkCard Public Key
cscCard Static Certificate
csc_encEncrypted Card Static Certificate
cecCard Ephemeral Certificate
cec_encEncrypted Card Ephemeral Certificate
hcHost Challenge
hcrHost Cryptogram
hc_encEncrypted Host Challenge
hpkHost Public Key
hscHost Static Certificate
hsc_encEncrypted Host Static Certificate
ipkIssuer Public Key
key-SMACMAC Session Key
key-SENCENC Session Key

2.3 – Algorithms

KeywordMeaning
AES-CBCAES symmetric encryption algorithm used in CBC mode
AES-CMACAES-CMAC algorithm
ECDHElliptic Curve Diffie-Hellman
ECDSAElliptic Curve Digital Signature Algorithm
HMACKeyed-Hash Message Authentication Code
SCP03Secure Channel Protocol ‘03’
SECP256K1Recommended Elliptic Curves Domain Parameters
SHA256 and SHA512Secure Hash Standard

3 – Ledger Recovery Key – From a user perspective

Ledger Recovery Key is a smart card that can be used to store a copy of your master secret (from which stems your Secret Recovery Phrase) from your Ledger Hardware Wallet, provided that this Hardware Wallet supports NFC.

The Ledger Recovery Key product can only use the NFC protocol to communicate with a Ledger Hardware Wallet.

Note: Ledger Recovery Key is not a Hardware Wallet, since it is not possible to use it to manage assets nor sign transactions.

This product’s security is guaranteed by several pieces of design, within which we are going to deep dive in the next sections:

  • Security at rest
    • The product embeds a Secure Element chip, the same type of hardware security Ledger is also using within its Ledger Hardware Wallets, powered by a certified operating system,
  • Security at use
    • The Ledger Recovery Key and Ledger Hardware Wallet perform a mutual authentication allowing the Ledger Recovery Key to ensure the Ledger Hardware Wallet is genuine, and allowing the Ledger Hardware Wallet to ensure the Ledger Recovery Key product is also genuine,
    • The product is PIN-protected, and three wrong PIN verification attempts will trigger the product to wipe its memory,
    • The communication protocol is secured and among others ensures the confidential and authenticated transfer of secret data,
  • Secure display
    • All the interactions with the Ledger Recovery Key are triggered and confirmed on the secure screen of the Ledger Hardware Wallet,
    • The Ledger Recovery Key Identifier is checked by the Ledger OS to ensure consistency between the presented product in the use cases requiring two taps, and always displayed on the Ledger Hardware Wallets’ screen so that the user can also make sure that the intended Ledger Recovery Key product is the correct one,
    • The Ledger Hardware Wallet will display an information screen indicating whether the presented Ledger Recovery Key matches the Secret Recovery Phrase currently stored on the device. This helps users verify consistency, especially if they manage multiple Ledger Recovery Keys.

This product can exclusively be used with a Ledger Hardware Wallet that supports the NFC communication protocol. In this case, the trusted display of Ledger Hardware Wallets acts as the trusted display used to manage the Ledger Recovery Key product as well, and its use can be broken down into three main parts:

  • Backing up the secret from an onboarded Ledger Hardware Wallet to an empty Ledger Recovery Key,
  • Restoring the secret from an onboarded Ledger Recovery Key to a not-yet-onboarded Ledger Hardware Wallet,
  • Manage the Ledger Recovery Key’s contents (PIN, name for instance) from the Ledger Hardware Wallet.
The two products communicate over NFC

For the rest of the paragraph, the color legend is represented on the next picture. When no color is explicitly shown, the onboarded state of either the Ledger Hardware Wallet or the Ledger Recovery Key products does not change throughout the described operations.

The onboarding states of the two Ledger products

The next sections of this paragraph will describe the main features of the Ledger Recovery Key product from a user experience perspective, while the following paragraphs will focus on the technology perspectives.

3.1 – Feature – Back up seed to a Recovery Key

The first essential feature consists in giving the possibility to the user to transfer their master secret from their Ledger Hardware Wallet to their Ledger Recovery Key. To onboard a Ledger Recovery Key, the user shall follow the instructions prompted on the Ledger Hardware Wallet interface (either at the end of its onboarding process or later within the settings), create a PIN for the Ledger Recovery Key, and then tap the Ledger Recovery Key on the Ledger Hardware Wallet so that all the information can be securely transferred to the Ledger Recovery Key. In this experience, the Ledger Hardware Wallet’s PIN is required to proceed up to interacting with the Ledger Recovery Key product.

Step 1/3 – Initial setup for a Recovery Key backup
Step 2/3 – After having followed the instructions, NFC communication between the two products
Step 3/3 – Result at the end of the backup operation

3.2 – Feature – Restore seed from a Recovery Key

The second essential feature consists in giving the possibility to the user to transfer their master secret from their Ledger Recovery Key to their Ledger Hardware Wallet. To use this feature, the Ledger Hardware Wallet must not yet be onboarded and thus does not yet contain a master secret.

Step 1/3 – Initial setup for a Recovery Key restore
Step 2/3 – After having followed the instructions, NFC communication between the two products
Step 3/3 – Result at the end of the restore operation

3.3 – Feature – Manage Recovery Key contents

The third essential feature consists in giving the possibility to the user to manage their Ledger Recovery Key contents, such as changing its PIN, creating, changing or deleting its name, or wiping the contents. To use this feature, the Ledger Hardware Wallet and the Ledger Recovery Key products must both be onboarded.

Step 1/3 – Initial setup for a Recovery Key contents management
Step 2/3 – After having followed the instructions, NFC communication between the two products
Step 3/3 – Result at the end of the manage operation

3.4 – Feature – Recovery Key Update

The last essential feature consists in giving the possibility to the user to update a portion of their Ledger Recovery Key software to reach several goals, such as adding features, fixing issues, and improving the security of the card over time. At Ledger we consider that the security of our products cannot be static, and that we need to make sure we implement and deploy the necessary security improvements when needed. To this extent, the Ledger source code of the application running on the Ledger Recovery Key product is made available on github to make sure our users can verify the implementation.

In the same vein that updating an onboarded Ledger Hardware Wallet is not possible without validating the user consent via verifying his PIN, updating an onboarded Ledger Recovery Key product can only be performed after having verified its own PIN, which is one of the reasons why updating the Ledger Recovery Key software can only be performed from a Ledger Hardware Wallet.

Step 1/4 – Initial setup
Step 2/4 – Download of the Recovery Key Updater device application
Step 3/4 – Transferring the Recovery Key updated application to the card
Step 4/4 – Final result after the operation

4 – Secure Elements and Hardware Security Modules

As mentioned in the Ledger Recover white paper, a Secure Element is a tamper-resistant processor chip, providing security countermeasures aiming to make a product embedding such a chip resist a wide range of attacks from fault attacks to side-channel attacks for instance.

Operating Systems powering these Secure Elements usually leverage these security features to protect secret data, to isolate the execution of the different components from each other, and to resist attacks aiming to extract these secret data. The embedded software stack powering Ledger Hardware Wallets is designed to provide several security mechanisms to this extent, as mentioned in our Donjon threat model.

A HSM is a physical device, most commonly found under the form factor of a network interface controller, used to manage and securely store secret data, usually cryptographic keys, and which provides an interface dedicated to perform cryptographic computations with these keys from within the secure environment. Typical use cases range from managing keys for website security to payment transaction processing, banking cards production, and many more.

At Ledger we use HSMs – and we develop the software powering them – to various extents. One of our miscellaneous use cases consists in securely hosting the device applications and OS updates users can install on their Ledger Hardware Wallet, as well as provide a secure way to co-create the cryptographic material, on a per Ledger product basis, dedicated to install a root of trust within the Ledger Hardware Wallets and allowing all Ledger products to successfully undergo software genuineness checks once they are deployed in the field. As another example, the Ledger Recover feature discussed at length in the associated white paper also makes extensive use of this secure combination of hardware and software.

In the sense of the security guarantees these two types of hardware components provide, one could consider a Secure Element as being a portable HSM.

Secure Element and HSM when preparing a Secure Element at the factory
Secure Element and HSM when preparing a Secure Element at the factory – Detailed
Hardware Wallet and HSM in use – Creating a Secure Channel
Hardware Wallet and HSM in use – Creating a Secure Channel – Details

In the context of the Recovery Key product, Ledger once again heavily relies on the security brought with this existing environment. Next paragraphs will deep dive into the design of the product and how we capitalized on our existing processes when including the Recovery Key product within the Ledger environment.

Note: The first paragraphs of the Ledger blogpost discussing the Ledger Recover’s shares distribution also discusses in detail the way Ledger creates Secure Channels between two secure endpoints.

5 – Recovery Key – From a design perspective

As previously mentioned, the Ledger Recovery Key product embeds a Secure Element which provides the product with its main security layer. This secure chip’s capabilities are leveraged by an operating system, allowing Ledger to develop a verifiable application which has the responsibility to execute the business logic and combine secure data transfers with secure storage and cryptographic computations. The Github repository allowing everyone to check the Ledger implementation on the Ledger Recovery Key product can be found here: https://github.com/LedgerHQ/applet-recovery-key.

Within the Ledger Recovery Key product, the Secure Element is a NXP P71D600 provided with a JCOP4.5 operating system. The combination of these two items has passed a Common Criteria EAL6+ security certification:

The secure storage in the Ledger Recovery Key product thus relies on both the Secure Element and associated operating system embedded in the product, but also on the implementation of the Ledger application which manages the PIN, the cryptographic keys dedicated to perform the necessary procedures to securely transfer data between the Ledger Recovery Key product and the Ledger Hardware Wallet.

Recovery Key – From the inside

6 – Recovery Key – From a components perspective

This paragraph presents the interactions of the Ledger Recovery Key product with the other main technical Ledger components, from a high-level perspective. These main components, as mentioned in the previous paragraphs and as represented in the next picture, are:

  1. The HSM which will both be involved in producing the Recovery Key at the factory and updating it once in the field,
  2. The Ledger Hardware Wallet with NFC capabilities,
  3. The Ledger Recovery Key product itself.
Recovery Key – Overall high-level environment

6.1 – Factory

The Ledger Recovery Key factory production environment is controlled in Ledger facilities, at Vierzon. This geographical positioning, along with initial sets of cryptography keys, allows Ledger to make sure the produced Ledger Recovery Key products are originating from Ledger. The environment is twofold:

  • The way it is manufactured – the Operating System is provided with specific cryptographic keys ensuring that applications can only be loaded if signed by Ledger HSMs,
  • The way it is prepared by Ledger from a functional point of view – the application is loaded on top of the OS, and cryptographic operations are conducted between Ledger Recovery Key and our HSMs to create and securely store the unique attestation data aiming at making the Ledger Recovery Key product successfully pass the genuine check once in the field.
Producing the Recovery Key – from a high-level perspective

6.2 – Usage in the field

As presented from a user experience perspective in previous paragraphs, using the Ledger Recovery Key product is performed locally between the Ledger Hardware Wallet and the product, via NFC.

Using the Recovery Key – from a high-level perspective

6.3 – Updating in the field

As presented from a user experience perspective in previous paragraphs, updating the Ledger Recovery Key product to benefit from an improved application on the product itself is performed in several steps:

  • Downloading a specific application on the Ledger Hardware Wallet, containing the Ledger Recovery Key update,
  • Launch it on the Ledger Hardware Wallet,
  • Follow the associated steps and wait for the update to be fully transferred onto the Ledger Recovery Key.
Updating the Recovery Key – from a high-level perspective

7 – Communication protocols and cryptography algorithms

The cryptography algorithms used within the overall communication protocols are the following.

EncryptionMACHashSignatureverificationKeyexchangeKDF
SCP03AES-CBCCMAC-AESCMAC-AES
Genuine checkSHA256ECDSASECP256K1ECDHSECP256K1SHA256
PINAES-CBCHMACSHA512SHA256
Seed transferAES-CBCHMACSHA512

7.1 – SCP03 Secure Channel

The first layer of security protocol Ledger is setting up between the Ledger Hardware Wallet and the Ledger Recovery Key product is a standardized Secure Channel – SCP03.

SCP03 creation – High level
SCP03 creation – Details

7.2 – Ledger Secure Channel

Once the SCP03 secure channel has been created between the two products, they exchange information to create another Secure Channel, which Ledger is already using between its Hardware Wallets and its HSMs. This Ledger-based protocol is also used by the two products to mutually check their respective software genuineness by cross-checking their cryptographic attestation.

SCP Ledger creation – High level
SCP Ledger creation – Details

7.3 – Creating the Ledger Recovery Key PIN

Once the two Secure Channels have been created one within the other, secret data can be securely communicated between the Ledger Hardware Wallet and the Ledger Recovery Key products, the picture below depicts the PIN exchange.

Securely creating the PIN, protected with the two Secure Channels

7.4 – Storing the secret data in Ledger Recovery Key

Once the two Secure Channels have been created one within the other, secret data can be securely communicated between the Ledger Hardware Wallet and the Ledger Recovery Key products, the picture below depicts the seed exchange (your master secret stored within the Ledger Hardware Wallet under the form of the Recovery Phrase).

Securely storing the secret, protected with the two Secure Channels

8 – Recovery Key – From a technical perspective

The next paragraphs describe all the communication interactions between the Ledger Hardware Wallet and the Ledger Recovery Key, protected with the combination of the two Secure Channels described in the previous section.

8.1 – Personalization

Recovery Key – Personalization

8.2 – Feature – Backup seed to a Recovery Key

Recovery Key – Backup feature, part 1
Recovery Key – Backup feature, part 2

8.3 – Feature – Restore seed from a Recovery Key

Recovery Key – Restore feature, part 1
Recovery Key – Restore feature, part 2

8.4 – Feature – Manage Recovery Key contents

Recovery Key – Change PIN feature, part 1
Recovery Key – Change PIN feature, part 2

9 – Conclusion

In conclusion, and as demonstrated within this document, Ledger makes use of state of the art secure storage capabilities coupled with secure cryptographic protocols to ensure the Ledger Recovery Key product gets provided with end-to-end security, in particular when it comes to:

  • Producing and attesting it with our HSMs,
  • Using it in the field, on both the security at rest and security at use aspects,
  • Updating it in the field if needed.

10 – Afterwords

The Ledger Recovery Key product is eligible for the Ledger Bug Bounty program.

For any inquiries or feedback related to the present white paper, feel free to contact us.

お問い合わせ

お知らせはブログからご確認いただけます。 メディア関連の連絡先:
[email protected]

ニュースレターを購読

新しいコインやブログアップデート情報、限定オファーを直接受け取ることができます。


お客様のメールアドレスは、ニュースレターの配信、アップデートおよびキャンペーン情報の送信にのみ使用されます。ニュースレターに記載されたリンクから、いつでも購読を解除することが可能です。 データの管理方法とお客様の権利については、こちらをご覧ください。

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.