Master Key

The key ceremony is the confidential creation of a master key in the key store. The master key is used to derive further addresses and to manage their assets.

The identity who has access to the master key owns the assets of the system!

Paradigms of a Key Ceremony

  • Secure way to create and store key material

  • Only the client has access to the key material inside the enclave of a Trusted Execution Environment (TEE) at any point in time

  • An audited solution that proves that the technology provider (Riddle & Code) cannot access the Trusted Execution Environment and the key material

  • The key material can be recovered by the client in case of a disaster

Process of creating the master key

  1. User triggers the generation of a random number via the user interface

  2. A random number is created inside the Hardware Secure Module (HSM)

  3. The random number is used to generate a seed

  4. A mnemonic phrase and master key generation is performed

  5. The master key is stored in a Trusted Execution Environment to prevent anybody to access it

Backup of the master key

  1. The mnemonic phrase is exposed via the user interface

  2. The mnemonic phrase can be stored via steel plates

The mnemonic phrase and the option to back it up is only available once during the key ceremony. Hence, the mnemonic phrase cannot be retrieved at a later point.

Recovery option in case of disaster

If anything should happen to the system the keys and their assets can be restored using the backup of the master key.

  1. the user enters the 24 words of the mnemonic phrase via the user interface

  2. The master key is created and stored again in the Trusted Execution Environment

Last updated