Custody
Seed Phrase (BIP-39)
Seed Phrase (BIP-39)
12 or 24 human-readable words encoding cryptographic entropy. Derives unlimited keys via hierarchical deterministic (HD) wallets. Optional 25th word (passphrase) creates different wallets for plausible deniability.
Key Takeaways
Chapter 5: Custody
Overview
In the world of cryptocurrency, "custody" refers to the full spectrum of methods used to securely store and control digital assets. Just as banks safeguard customer assets in traditional finance, in cryptocurrency the private key represents actual ownership of those assets. Custody, therefore, is fundamentally about who holds the private key and how it is managed. The well-known maxim "Not your keys, not your coins" encapsulates the essential philosophy of cryptocurrency custody.
Custody approaches fall broadly into two categories: self-custody and custodial. Self-custody means the individual manages their own keys directly, offering maximum autonomy but demanding complete personal responsibility. Custodial arrangements, by contrast, delegate key management to an exchange or specialized institution, offering convenience at the cost of trusting a third party. Events such as the collapse of FTX have starkly illustrated the dangers of custodial arrangements, intensifying interest in self-custody and robust security solutions.
This chapter covers five foundational concepts that underpin the custody landscape. We begin with the Seed Phrase (BIP-39), the standard for individual-level key backup, then progress to the Hardware Wallet for physical security, Multisig for requiring multiple signatures, MPC (Multi-Party Computation) for cryptographically distributing key material, and finally the HSM (Hardware Security Module) for institutional-grade security. By understanding these concepts, readers will be equipped to design optimal custody strategies suited to their specific circumstances and scale.
Seed Phrase (BIP-39)
Definition
A seed phrase is a human-readable list of 12 or 24 words that functions as the master key to a cryptocurrency wallet. Defined by the BIP-39 (Bitcoin Improvement Proposal 39) standard, it encodes 128 or 256 bits of cryptographically random entropy into a standardized wordlist of 2,048 words. Combined with a Hierarchical Deterministic (HD) wallet structure, a single root seed can deterministically derive a theoretically unlimited number of private keys and addresses across multiple blockchains.
The most critical property of a seed phrase is recoverability. Even if a hardware wallet is lost or physically destroyed, anyone in possession of the seed phrase can fully restore all associated assets on any compatible wallet. This provides a far more human-friendly backup mechanism than handling raw hexadecimal private keys directly.
Key Points
-
BIP-39 Standardization: The standard uses a fixed wordlist of 2,048 words, and the final word incorporates a checksum for error detection. This standardization ensures interoperability across a wide range of wallets, including Ledger, Trezor, and MetaMask, among others.
-
Integration with HD Wallets: In conjunction with the BIP-32 and BIP-44 standards, a single seed phrase can derive thousands of accounts and addresses across Bitcoin, Ethereum, and other blockchains, organized in a systematic tree structure. Each derivation path encodes information such as coin type, account index, and whether an address is for receiving funds or handling change outputs.
-
Passphrase (The 25th Word): An optional user-defined passphrase can be appended to generate an entirely separate wallet. This enables plausible deniability — in a coercive situation, a user can reveal the wallet containing only a small amount of funds as a decoy while concealing the primary wallet. The passphrase must be stored separately from the seed phrase itself.
-
Absolute Security is Non-Negotiable: Whoever possesses the seed phrase controls all assets in the corresponding wallet. It must never be stored in any digital form — no screenshots, no cloud backups, no plaintext files. Physical backups engraved on fireproof, waterproof metal plates are strongly recommended.
-
Entropy and Security: A 12-word seed phrase provides 128 bits of entropy; a 24-word phrase provides 256 bits. Brute-force attacks are computationally infeasible with current or foreseeable hardware, meaning that in practice, security failures almost always stem from human error in managing the phrase rather than from any weakness in the underlying cryptography.
Related Concepts
The seed phrase is the foundation of the entire custody ecosystem. Hardware wallets are the primary medium for generating and securely storing seed phrases — without the seed phrase, hardware wallet recovery is impossible. Multisig and MPC emerged specifically to address the fundamental weakness of seed phrases as a single point of failure, distributing key risk across multiple locations or parties. In institutional settings, the HSM serves as the secure hardware environment for storing the master key material that is conceptually analogous to a seed phrase.
Hardware Wallet
Definition
A hardware wallet is a dedicated security device designed to store private keys in a tamper-resistant, air-isolated hardware environment and to perform all transaction signing operations exclusively within that device. The fundamental principle is that the private key never leaves the device. When a user initiates a transaction, the signing takes place entirely inside the hardware wallet, and only the resulting signed transaction is passed to the internet-connected computer. This approach is also referred to as air-gap signing.
Leading products in the market include Ledger (Nano S Plus, Nano X, Flex, and others) and Trezor (Model One, Model T, and the Safe series). Devices targeting users with advanced security requirements, such as Coldcard (Bitcoin-only) and Keystone, have also gained significant recognition. The hardware wallet is widely regarded as the gold standard for individual self-custody.
Key Points
-
Secure Element (SE): Many hardware wallets incorporate a dedicated Secure Element chip certified to CC EAL5+ or higher — the same class of chip used in smart cards and passports. These chips provide resistance against sophisticated hardware attacks, including physical tampering, side-channel attacks, and voltage glitching. Ledger's approach centers on integrating a Secure Element, while Trezor differentiates itself by emphasizing open-source firmware and full transparency.
-
On-Device Confirmation Mechanism: Every hardware wallet includes a built-in screen and buttons (or a touchscreen), allowing the user to verify the destination address and transaction amount directly on the device itself before approving. This ensures that even if the host computer is compromised by malware, the user cannot be tricked into signing a transaction to a malicious address.
-
Offline Key Generation: During initial setup, the seed phrase and private keys are generated entirely offline. Since no internet connection is involved at the moment of key creation, the possibility of keys being exfiltrated by a remote attacker is eliminated at the source.
-
Supply Chain Attack Risk: Because the security of a hardware wallet depends entirely on the integrity of the physical device, tampering during manufacturing or shipping — a supply chain attack — represents a genuine threat. Devices should always be purchased directly from the official manufacturer or an authorized reseller, and the tamper-evident seals must be carefully inspected upon receipt.
-
Limitations and the Human Factor: No matter how robust the hardware wallet itself may be, security collapses if the seed phrase is physically exposed or if a passphrase is surrendered under a phishing attack. Equally, losing the device without a backup seed phrase results in permanent, irrecoverable loss of assets.
Related Concepts
The hardware wallet is the primary storage and management medium for the seed phrase. For individual users, it represents the best available custody solution. However, at the organizational level — for institutions, DAOs, or corporate treasuries — relying on a single hardware wallet still introduces a single point of failure. To address this, hardware wallets are frequently incorporated as individual signers within a Multisig configuration. At institutional scale, the HSM plays a role analogous to the hardware wallet but operates at significantly higher performance levels and with more rigorous certification standards.
Multisig
Definition
Multisig (Multi-Signature) is a security mechanism that requires a predefined threshold of signatures from a set of independent private keys before a transaction can be executed. It is commonly expressed in the form "M-of-N," where, for example, "2-of-3" means that at least 2 out of 3 designated keys must sign for a transaction to be valid. Critically, this policy is enforced directly at the blockchain protocol level, with no reliance on a trusted third party.
In Bitcoin, multisig is natively supported through P2SH (Pay-to-Script-Hash) and P2WSH (Pay-to-Witness-Script-Hash). In the Ethereum ecosystem, Gnosis Safe (now Safe{Wallet}) has become the de facto standard for smart contract-based multisig, and is widely used for DAO treasury management, institutional custody, and collaborative project fund management.
Key Points
-
Eliminating Single Points of Failure: With a single-key setup, the compromise or loss of that one key puts all assets at risk. Multisig solves this problem directly. In a 2-of-3 configuration, an attacker who obtains one key cannot steal funds, and a keyholder who loses one key can still recover or move assets using the remaining two.
-
On-Chain Enforcement: Multisig rules are enforced by the blockchain itself — through Bitcoin Script or Ethereum smart contracts. This eliminates dependence on the honesty of any operator or intermediary and provides complete transparency and an immutable audit trail. Anyone can verify on-chain who signed a transaction and when.
-
DAO and Institutional Treasury Management: In decentralized autonomous organizations, multisig is a cornerstone of treasury governance. It prevents any single individual from unilaterally controlling organizational funds and technically enforces the principle of decentralization by requiring consensus from multiple parties for any significant transaction.
-
Geographically Distributed Key Custody: Each signing key can be assigned to a different individual, held on a different device, and stored in a different physical location. In a corporate custody arrangement, for instance, the CFO, CTO, and an external auditor might each hold one key, creating a robust system of internal controls.
-
Limitations: Multisig increases transaction size and gas costs. It introduces operational complexity due to the need for coordination among multiple signers. Native Bitcoin multisig also exposes the M-of-N policy publicly on-chain, which is a disadvantage from a privacy standpoint. Communication latency between signers and the complexity of managing multiple keys are additional practical challenges.
Related Concepts
Multisig is frequently combined with hardware wallets, where each signer uses their own hardware wallet to sign — a configuration that simultaneously achieves individual-level security and distributed control. Compared to MPC, multisig enforces its signing policy transparently on-chain, whereas MPC operates off-chain and produces a signature that appears identical to a standard single-key signature. The two approaches are complementary, with the choice between them driven by scale, privacy requirements, and operational preferences. In institutional deployments, HSMs can serve as the secure storage environment for each of the individual signing keys in a multisig arrangement.
MPC (Multi-Party Computation)
Definition
Multi-Party Computation (MPC) is a family of cryptographic techniques that enable multiple parties to jointly compute a function over their individual secret inputs without any party revealing its input to the others. In the context of cryptocurrency custody, MPC is specifically implemented as a Threshold Signature Scheme (TSS). Under this approach, a complete private key never exists in its entirety at any point — instead, it exists only as distributed key shares held separately by each party. When signing a transaction, a threshold number of parties collaborate to generate a valid signature using their respective key shares, without ever reconstructing the full private key at any single point.
MPC is fundamentally different from traditional key splitting approaches such as Shamir's Secret Sharing. With Shamir's scheme, the complete key must be temporarily reconstructed at a single location during the signing or recovery process. With TSS-based MPC, the full key is never reconstructed at any stage — not even momentarily.
Key Points
-
The Key Is Never Fully Reconstructed: The defining technical advantage of MPC is that the complete private key never exists at any single location at any point in time. Since each party's key share participates in the signing computation independently, an attacker who fully compromises one party cannot obtain the complete key.
-
No On-Chain Transparency: A signature produced via MPC is structurally identical to a standard single-key signature. Unlike multisig, there is no on-chain indication that "this transaction was signed using multi-party computation." This is advantageous for both privacy and gas efficiency, but it comes with the trade-off that the signing policy cannot be audited on-chain.
-
Operational Flexibility: MPC allows signing policies and participant configurations to be adjusted at the software level without requiring on-chain transactions. This makes it far more agile in adapting to organizational changes. Additionally, key shares can be periodically rotated to maintain and strengthen security over time.
-
Growing Institutional Adoption: Major institutional custody providers — including Fireblocks, Zengo, and Coinbase Prime — have adopted MPC as a core technology. Its ability to deliver a comparable level of security to multisig while reducing operational complexity has made it an increasingly preferred solution for institutional asset management.
-
Complexity and Implementation Risk: MPC is mathematically sophisticated, and flawed implementations can introduce subtle but critical security vulnerabilities. Unlike multisig, which relies on battle-tested on-chain logic, MPC's security guarantees depend heavily on the correctness of the specific cryptographic protocol implementation. The absence of open-source audits for some implementations introduces additional trust assumptions.
Related Concepts
Both MPC and Multisig pursue the same goal — enhancing security through multi-party collaboration — but achieve it through different mechanisms. Multisig enforces its policy transparently on-chain; MPC relies on off-chain cryptography. In practice, the two technologies are sometimes used in combination. For example, a configuration where each MPC key share is stored inside an HSM defends against both software-based attacks and physical hardware attacks simultaneously. From the perspective of seed phrases, MPC can be understood as an advanced solution to the single point of failure inherent in a single seed deriving all keys, distributing that risk cryptographically rather than geographically.
HSM (Hardware Security Module)
Definition
A Hardware Security Module (HSM) is a dedicated, institutional-grade hardware device designed to perform cryptographic operations — including encryption, decryption, and digital signing — within a tamper-resistant, isolated hardware environment. An HSM stores cryptographic keys securely within its own boundaries, never exposing the keys to external systems, and provides only the outputs of the requested cryptographic operations. Conceptually, it is the enterprise equivalent of the Secure Element found in a consumer hardware wallet, but engineered to the performance, reliability, and certification standards demanded by financial institutions and large enterprises.
Prominent HSM manufacturers include Thales (formerly nCipher), Utimaco, AWS CloudHSM, and Azure Dedicated HSM. HSMs have been foundational infrastructure in traditional finance for decades — used by financial institutions, certificate authorities, and payment networks — and are now seeing growing adoption as a critical component of institutional-grade cryptocurrency custody solutions.
Key Points
-
Rigorous Certification Standards: HSMs are validated against government-recognized standards such as FIPS 140-2/140-3 Level 3 or Level 4. These certifications verify tamper detection and response capabilities (including automatic key zeroization upon physical intrusion attempts), resistance to physical penetration, and resilience against environmental attacks such as abnormal temperature or voltage. For institutions subject to regulatory requirements, these certifications are non-negotiable.
-
Defense Against Physical and Software Attacks: HSMs incorporate countermeasures against sophisticated hardware attacks, including side-channel attacks, differential power analysis (DPA), and probing attacks. Furthermore, the software environment executing inside the HSM is fully isolated from the host operating system, meaning that even if the host machine is compromised by malware, the keys stored within the HSM remain protected.
-
High-Performance Cryptographic Processing: Unlike consumer hardware wallets optimized for the occasional signing request of an individual user, HSMs are engineered to handle thousands of signing operations per second. This throughput is essential for exchanges, asset managers, and custody service providers that manage assets on behalf of large numbers of clients.
-
Role-Based Access Control (RBAC): HSMs support granular role-based access control, allowing precise separation of permissions among operators, approvers, and auditors for any given key. They can technically enforce dual control and split knowledge principles, significantly reducing the risk of insider collusion.
-
Cost and Operational Complexity: Deploying HSMs involves substantial costs across hardware procurement, installation, ongoing maintenance, and the specialized personnel required to operate them. This makes HSMs appropriate for institutional-scale asset management rather than individual use. Cloud-based HSM services (such as AWS CloudHSM and Azure Dedicated HSM) have emerged as a more accessible alternative, lowering the barrier to entry while preserving a strong security posture.
Related Concepts
The HSM sits at the apex of the custody security hierarchy. It represents the institutional counterpart to the hardware wallet — serving the same fundamental purpose of isolating cryptographic key material from the external environment, but at an enterprise scale with formal regulatory certifications. In an institutional MPC deployment, each key share is typically stored within a separate HSM, combining the cryptographic distribution of MPC with the physical tamper resistance of dedicated security hardware. In a multisig arrangement at institutional scale, the HSM securely holds each of the individual signing keys, replacing the hardware wallets that individual signers would use in a personal setup. Together, the five concepts covered in this chapter — Seed Phrase, Hardware Wallet, Multisig, MPC, and HSM — form an interconnected framework that spans the full spectrum of custody needs, from a single individual protecting personal holdings to a regulated financial institution managing assets at scale.
ChartMentor
이 개념을 포함한 30일 코스
Seed Phrase (BIP-39) 포함 · 핵심 개념을 순서대로 익히고 실전 차트에 적용해보세요.
chartmentor.co.kr/briefguardWhat if BG analyzes this pattern?
See how 'Seed Phrase (BIP-39)' is detected on real charts with BriefGuard analysis.
See Real Analysis