분류되지 않음 | 2025/06/20
Ledger Recovery Key White paper
- Introduction
- Keywords tables
- Ledger Recovery Key – From a user perspective
- Secure Elements and Hardware Security Modules
- Recovery Key – From a design perspective
- Recovery Key – From a components perspective
- Communication protocols and cryptography algorithms
- Recovery Key – From a technical perspective
- Conclusion
- Afterwords
1 – Introduction
Welcome to this technical white paper, which is presenting an overview and deep-dive into the Ledger Recovery Key product, its architectural design, and its security.
We will present the way the product is built, its underlying technology and its functionalities, as well as the cryptographic protocols used when it comes to communicating with it. Our goal is to provide you with all the necessary information allowing anyone interested to see the measures we have taken to allow Ledger users to continue doing with Ledger Recovery Key what they used to do with our Hardware Wallets: own and manage their secret data in a secure and self-custodial way.
The technology described in this white paper is the subject of one or more pending patent applications. The publication of this white paper does not grant, either expressly or impliedly, any license, right, or permission to make, use, sell, or otherwise distribute the described technology.
2 – Keywords tables
2.1 – General
Keyword | Meaning |
---|---|
HSM | Hardware Security Module |
NFC | Near Field Communication |
PIN | Personal Identification Number |
SE | Secure Element |
2.2 – Keys
Keyword | Meaning |
---|---|
cc | Card Challenge |
ccr | Card Cryptogram |
cpk | Card Public Key |
csc | Card Static Certificate |
csc_enc | Encrypted Card Static Certificate |
cec | Card Ephemeral Certificate |
cec_enc | Encrypted Card Ephemeral Certificate |
hc | Host Challenge |
hcr | Host Cryptogram |
hc_enc | Encrypted Host Challenge |
hpk | Host Public Key |
hsc | Host Static Certificate |
hsc_enc | Encrypted Host Static Certificate |
ipk | Issuer Public Key |
key-SMAC | MAC Session Key |
key-SENC | ENC Session Key |
2.3 – Algorithms
Keyword | Meaning |
---|---|
AES-CBC | AES symmetric encryption algorithm used in CBC mode |
AES-CMAC | AES-CMAC algorithm |
ECDH | Elliptic Curve Diffie-Hellman |
ECDSA | Elliptic Curve Digital Signature Algorithm |
HMAC | Keyed-Hash Message Authentication Code |
SCP03 | Secure Channel Protocol ‘03’ |
SECP256K1 | Recommended Elliptic Curves Domain Parameters |
SHA256 and SHA512 | Secure Hash Standard |
3 – Ledger Recovery Key – From a user perspective
Ledger Recovery Key is a smart card that can be used to store a copy of your master secret (from which stems your Secret Recovery Phrase) from your Ledger Hardware Wallet, provided that this Hardware Wallet supports NFC.
The Ledger Recovery Key product can only use the NFC protocol to communicate with a Ledger Hardware Wallet.
Note: Ledger Recovery Key is not a Hardware Wallet, since it is not possible to use it to manage assets nor sign transactions. |
This product’s security is guaranteed by several pieces of design, within which we are going to deep dive in the next sections:
- Security at rest
- The product embeds a Secure Element chip, the same type of hardware security Ledger is also using within its Ledger Hardware Wallets, powered by a certified operating system,
- Security at use
- The Ledger Recovery Key and Ledger Hardware Wallet perform a mutual authentication allowing the Ledger Recovery Key to ensure the Ledger Hardware Wallet is genuine, and allowing the Ledger Hardware Wallet to ensure the Ledger Recovery Key product is also genuine,
- The product is PIN-protected, and three wrong PIN verification attempts will trigger the product to wipe its memory,
- The communication protocol is secured and among others ensures the confidential and authenticated transfer of secret data,
- Secure display
- All the interactions with the Ledger Recovery Key are triggered and confirmed on the secure screen of the Ledger Hardware Wallet,
- The Ledger Recovery Key Identifier is checked by the Ledger OS to ensure consistency between the presented product in the use cases requiring two taps, and always displayed on the Ledger Hardware Wallets’ screen so that the user can also make sure that the intended Ledger Recovery Key product is the correct one,
- The Ledger Hardware Wallet will display an information screen indicating whether the presented Ledger Recovery Key matches the Secret Recovery Phrase currently stored on the device. This helps users verify consistency, especially if they manage multiple Ledger Recovery Keys.
This product can exclusively be used with a Ledger Hardware Wallet that supports the NFC communication protocol. In this case, the trusted display of Ledger Hardware Wallets acts as the trusted display used to manage the Ledger Recovery Key product as well, and its use can be broken down into three main parts:
- Backing up the secret from an onboarded Ledger Hardware Wallet to an empty Ledger Recovery Key,
- Restoring the secret from an onboarded Ledger Recovery Key to a not-yet-onboarded Ledger Hardware Wallet,
- Manage the Ledger Recovery Key’s contents (PIN, name for instance) from the Ledger Hardware Wallet.

For the rest of the paragraph, the color legend is represented on the next picture. When no color is explicitly shown, the onboarded state of either the Ledger Hardware Wallet or the Ledger Recovery Key products does not change throughout the described operations.

The next sections of this paragraph will describe the main features of the Ledger Recovery Key product from a user experience perspective, while the following paragraphs will focus on the technology perspectives.
3.1 – Feature – Back up seed to a Recovery Key
The first essential feature consists in giving the possibility to the user to transfer their master secret from their Ledger Hardware Wallet to their Ledger Recovery Key. To onboard a Ledger Recovery Key, the user shall follow the instructions prompted on the Ledger Hardware Wallet interface (either at the end of its onboarding process or later within the settings), create a PIN for the Ledger Recovery Key, and then tap the Ledger Recovery Key on the Ledger Hardware Wallet so that all the information can be securely transferred to the Ledger Recovery Key. In this experience, the Ledger Hardware Wallet’s PIN is required to proceed up to interacting with the Ledger Recovery Key product.



3.2 – Feature – Restore seed from a Recovery Key
The second essential feature consists in giving the possibility to the user to transfer their master secret from their Ledger Recovery Key to their Ledger Hardware Wallet. To use this feature, the Ledger Hardware Wallet must not yet be onboarded and thus does not yet contain a master secret.



3.3 – Feature – Manage Recovery Key contents
The third essential feature consists in giving the possibility to the user to manage their Ledger Recovery Key contents, such as changing its PIN, creating, changing or deleting its name, or wiping the contents. To use this feature, the Ledger Hardware Wallet and the Ledger Recovery Key products must both be onboarded.



3.4 – Feature – Recovery Key Update
The last essential feature consists in giving the possibility to the user to update a portion of their Ledger Recovery Key software to reach several goals, such as adding features, fixing issues, and improving the security of the card over time. At Ledger we consider that the security of our products cannot be static, and that we need to make sure we implement and deploy the necessary security improvements when needed. To this extent, the Ledger source code of the application running on the Ledger Recovery Key product is made available on github to make sure our users can verify the implementation.
In the same vein that updating an onboarded Ledger Hardware Wallet is not possible without validating the user consent via verifying his PIN, updating an onboarded Ledger Recovery Key product can only be performed after having verified its own PIN, which is one of the reasons why updating the Ledger Recovery Key software can only be performed from a Ledger Hardware Wallet.




4 – Secure Elements and Hardware Security Modules
As mentioned in the Ledger Recover white paper, a Secure Element is a tamper-resistant processor chip, providing security countermeasures aiming to make a product embedding such a chip resist a wide range of attacks from fault attacks to side-channel attacks for instance.
Operating Systems powering these Secure Elements usually leverage these security features to protect secret data, to isolate the execution of the different components from each other, and to resist attacks aiming to extract these secret data. The embedded software stack powering Ledger Hardware Wallets is designed to provide several security mechanisms to this extent, as mentioned in our Donjon threat model.
A HSM is a physical device, most commonly found under the form factor of a network interface controller, used to manage and securely store secret data, usually cryptographic keys, and which provides an interface dedicated to perform cryptographic computations with these keys from within the secure environment. Typical use cases range from managing keys for website security to payment transaction processing, banking cards production, and many more.
At Ledger we use HSMs – and we develop the software powering them – to various extents. One of our miscellaneous use cases consists in securely hosting the device applications and OS updates users can install on their Ledger Hardware Wallet, as well as provide a secure way to co-create the cryptographic material, on a per Ledger product basis, dedicated to install a root of trust within the Ledger Hardware Wallets and allowing all Ledger products to successfully undergo software genuineness checks once they are deployed in the field. As another example, the Ledger Recover feature discussed at length in the associated white paper also makes extensive use of this secure combination of hardware and software.
In the sense of the security guarantees these two types of hardware components provide, one could consider a Secure Element as being a portable HSM.




In the context of the Recovery Key product, Ledger once again heavily relies on the security brought with this existing environment. Next paragraphs will deep dive into the design of the product and how we capitalized on our existing processes when including the Recovery Key product within the Ledger environment.
Note: The first paragraphs of the Ledger blogpost discussing the Ledger Recover’s shares distribution also discusses in detail the way Ledger creates Secure Channels between two secure endpoints. |
5 – Recovery Key – From a design perspective
As previously mentioned, the Ledger Recovery Key product embeds a Secure Element which provides the product with its main security layer. This secure chip’s capabilities are leveraged by an operating system, allowing Ledger to develop a verifiable application which has the responsibility to execute the business logic and combine secure data transfers with secure storage and cryptographic computations. The Github repository allowing everyone to check the Ledger implementation on the Ledger Recovery Key product can be found here: https://github.com/LedgerHQ/applet-recovery-key.
Within the Ledger Recovery Key product, the Secure Element is a NXP P71D600 provided with a JCOP4.5 operating system. The combination of these two items has passed a Common Criteria EAL6+ security certification:
- Common Criteria Security Target Light
- Common Criteria Certification Report
The secure storage in the Ledger Recovery Key product thus relies on both the Secure Element and associated operating system embedded in the product, but also on the implementation of the Ledger application which manages the PIN, the cryptographic keys dedicated to perform the necessary procedures to securely transfer data between the Ledger Recovery Key product and the Ledger Hardware Wallet.

6 – Recovery Key – From a components perspective
This paragraph presents the interactions of the Ledger Recovery Key product with the other main technical Ledger components, from a high-level perspective. These main components, as mentioned in the previous paragraphs and as represented in the next picture, are:
- The HSM which will both be involved in producing the Recovery Key at the factory and updating it once in the field,
- The Ledger Hardware Wallet with NFC capabilities,
- The Ledger Recovery Key product itself.

6.1 – Factory
The Ledger Recovery Key factory production environment is controlled in Ledger facilities, at Vierzon. This geographical positioning, along with initial sets of cryptography keys, allows Ledger to make sure the produced Ledger Recovery Key products are originating from Ledger. The environment is twofold:
- The way it is manufactured – the Operating System is provided with specific cryptographic keys ensuring that applications can only be loaded if signed by Ledger HSMs,
- The way it is prepared by Ledger from a functional point of view – the application is loaded on top of the OS, and cryptographic operations are conducted between Ledger Recovery Key and our HSMs to create and securely store the unique attestation data aiming at making the Ledger Recovery Key product successfully pass the genuine check once in the field.

6.2 – Usage in the field
As presented from a user experience perspective in previous paragraphs, using the Ledger Recovery Key product is performed locally between the Ledger Hardware Wallet and the product, via NFC.

6.3 – Updating in the field
As presented from a user experience perspective in previous paragraphs, updating the Ledger Recovery Key product to benefit from an improved application on the product itself is performed in several steps:
- Downloading a specific application on the Ledger Hardware Wallet, containing the Ledger Recovery Key update,
- Launch it on the Ledger Hardware Wallet,
- Follow the associated steps and wait for the update to be fully transferred onto the Ledger Recovery Key.

7 – Communication protocols and cryptography algorithms
The cryptography algorithms used within the overall communication protocols are the following.
Encryption | MAC | Hash | Signatureverification | Keyexchange | KDF | |
---|---|---|---|---|---|---|
SCP03 | AES-CBC | CMAC-AES | CMAC-AES | |||
Genuine check | SHA256 | ECDSASECP256K1 | ECDHSECP256K1 | SHA256 | ||
PIN | AES-CBC | HMACSHA512 | SHA256 | |||
Seed transfer | AES-CBC | HMACSHA512 |
7.1 – SCP03 Secure Channel
The first layer of security protocol Ledger is setting up between the Ledger Hardware Wallet and the Ledger Recovery Key product is a standardized Secure Channel – SCP03.


7.2 – Ledger Secure Channel
Once the SCP03 secure channel has been created between the two products, they exchange information to create another Secure Channel, which Ledger is already using between its Hardware Wallets and its HSMs. This Ledger-based protocol is also used by the two products to mutually check their respective software genuineness by cross-checking their cryptographic attestation.


7.3 – Creating the Ledger Recovery Key PIN
Once the two Secure Channels have been created one within the other, secret data can be securely communicated between the Ledger Hardware Wallet and the Ledger Recovery Key products, the picture below depicts the PIN exchange.

7.4 – Storing the secret data in Ledger Recovery Key
Once the two Secure Channels have been created one within the other, secret data can be securely communicated between the Ledger Hardware Wallet and the Ledger Recovery Key products, the picture below depicts the seed exchange (your master secret stored within the Ledger Hardware Wallet under the form of the Recovery Phrase).

8 – Recovery Key – From a technical perspective
The next paragraphs describe all the communication interactions between the Ledger Hardware Wallet and the Ledger Recovery Key, protected with the combination of the two Secure Channels described in the previous section.
8.1 – Personalization

8.2 – Feature – Backup seed to a Recovery Key


8.3 – Feature – Restore seed from a Recovery Key


8.4 – Feature – Manage Recovery Key contents


9 – Conclusion
In conclusion, and as demonstrated within this document, Ledger makes use of state of the art secure storage capabilities coupled with secure cryptographic protocols to ensure the Ledger Recovery Key product gets provided with end-to-end security, in particular when it comes to:
- Producing and attesting it with our HSMs,
- Using it in the field, on both the security at rest and security at use aspects,
- Updating it in the field if needed.
10 – Afterwords
The Ledger Recovery Key product is eligible for the Ledger Bug Bounty program.
For any inquiries or feedback related to the present white paper, feel free to contact us.