Skip to main contentSkip to navigation
Rossmann Repair Group logo - data recovery and MacBook repair

SSD Hardware Encryption and Data Recovery

Most modern SSDs encrypt all data with AES-256 hardware encryption by default, even without user configuration. If the controller dies, the encryption key dies with it. Chip-off recovery yields only ciphertext. The only recovery path is reviving the original controller through board-level repair so the decryption chain remains intact.

Why Most SSDs Are Already Encrypted

Since approximately 2015, the majority of SSD controllers implement always-on AES-256 hardware encryption. Samsung, Phison, Silicon Motion, Marvell, and Intel/Solidigm controllers all encrypt data before writing it to NAND. This encryption is active by default with no user configuration required.

The controller generates a Media Encryption Key (MEK) during manufacturing or first initialization. Every write to NAND passes through the AES engine, and every read is decrypted before being sent to the host. Under normal operation, this is invisible. The OS reads and writes plaintext; the controller handles encryption transparently. Performance impact is negligible because the AES engine is implemented in dedicated hardware on the controller die.

Always-on encryption exists for two reasons. First, it enables instant Secure Erase: instead of erasing every NAND cell, the controller destroys the MEK and generates a new one, making all existing data permanently unreadable in milliseconds. Second, it provides a foundation for user-set passwords. When a user enables ATA Security, TCG OPAL, or BitLocker hardware mode, the MEK is itself encrypted with the user's authentication key. The NAND data was already encrypted; the user password simply locks access to the MEK.

How SSD Encryption Keys Work

The encryption key hierarchy has multiple layers. Understanding where each key lives determines whether recovery is possible after a hardware failure.

Media Encryption Key (MEK)
The AES-256 key used to encrypt and decrypt all data on the NAND. Stored in a secure region of the controller chip or in a protected area of the NAND that only the original controller can access. Unique per drive; no two SSDs share the same MEK.
Key Encryption Key (KEK)
When a user password is set (via ATA Security, OPAL, or OS-level encryption in hardware mode), the MEK is wrapped with the KEK derived from the password. The wrapped MEK is stored on the drive. Without the correct password, the MEK cannot be unwrapped and data remains encrypted.
Self-Encrypting Drive (SED)
An SSD that complies with the TCG OPAL specification for hardware encryption management. OPAL provides a standardized interface for setting user authentication, defining encryption ranges, and managing the key hierarchy. Samsung, Micron/Crucial, and Intel enterprise SSDs commonly support OPAL 2.0.
Class 0 Encryption (Always-On)
Drives that encrypt all data by default without user authentication. The MEK is accessible to the controller without a password. Data is protected from raw NAND reads (chip-off) but not from normal host access through the controller.

Encrypted vs. Unencrypted SSD Recovery

The presence of hardware encryption changes the viable recovery methods. On an unencrypted drive, multiple paths exist. On an encrypted drive, the original controller is the only key holder.

Recovery MethodUnencrypted SSDEncrypted SSD (Class 0)Encrypted SSD + User Password
PC-3000 firmware repairWorks; data reads directlyWorks; controller decrypts transparentlyWorks if password is known; controller decrypts after authentication
Board-level controller repairWorks; original controller not requiredRequired; only the original controller holds the MEKRequired; original controller + user password both needed
Chip-off NAND recoveryViable; raw NAND is plaintextYields ciphertext; data unrecoverableYields ciphertext; data unrecoverable
Controller swap to donorMay work for some older controllersFails; new controller has different MEKFails; new controller has different MEK

Why Board-Level Repair Is the Only Recovery Path

When a hardware-encrypted SSD fails, the MEK is trapped inside the dead or malfunctioning controller. Replacing the controller destroys the key association. The only option is to repair the original controller circuit so it can boot, access the MEK, and decrypt NAND reads.

  1. 01

    Diagnose the failure point

    Using FLIR thermal imaging and multimeter probing, we identify whether the failure is in the controller itself, the PMIC (Power Management IC), voltage regulators, decoupling capacitors, or the NAND interface. Many "dead controller" symptoms are actually failed passives on the power delivery circuit that prevent the controller from booting.

  2. 02

    Component-level repair

    Using Hakko FM-2032 microsoldering irons and Atten 862 hot air rework, we replace failed voltage regulators, capacitors, resistors, or rework BGA connections on the controller. The goal is to restore power delivery and signal integrity so the controller boots its firmware and initializes the AES engine with the original MEK.

  3. 03

    Firmware stabilization and imaging

    Once the controller boots, PC-3000 communicates with it via vendor-specific commands to stabilize the firmware and image the drive. Because the original controller is running, all reads pass through the AES decryption engine. The imaged data is plaintext, ready for file system analysis.

This is where Rossmann's background in board-level repair directly applies to data recovery. Most data recovery labs are equipped for firmware-level work but not for component-level soldering. When the failure is electrical rather than logical, those labs cannot proceed. We can, because board-level repair is the foundation of this shop.

Apple T2 and M-Series: A Special Case

Apple T2 and M-series chips implement hardware encryption through a Secure Enclave coprocessor. The AES keys are fused into the Secure Enclave silicon, and the NAND storage is soldered directly to the logic board. There are no removable drives to send to another lab.

On a MacBook with a T2 or M-series chip, the SSD controller is integrated into the Apple silicon. The NAND chips are soldered to the logic board and communicate with the SoC through a proprietary bus. The Secure Enclave generates and stores the volume encryption keys. If the logic board fails, the keys are inaccessible. Desoldering the NAND yields AES-256 ciphertext with no path to decryption.

Recovery requires repairing the logic board so the T2 or M-series chip boots and the Secure Enclave can serve the decryption keys. This is T2/M-series data recovery at the board level: identifying which power rail, capacitor, or IC failure prevents the SoC from initializing, repairing it, and imaging the drive through the running system.

How Much Does Encrypted SSD Recovery Cost?

Encrypted SSD recovery typically falls into the circuit board repair or firmware recovery tier. SATA SSD board repair: $450–$600. NVMe board repair: $600–$900. Firmware recovery (if controller boots but firmware is corrupted): SATA $600–$900, NVMe $900–$1,200. Free evaluation, firm quote before work begins, no data = no charge.

If board repair requires a donor drive for component harvesting, the donor cost is additional. A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.

Rush service: +$100 rush fee to move to the front of the queue. Call (512) 212-9111 for a free evaluation.

Frequently Asked Questions

Can you recover data from a hardware-encrypted SSD?

Yes, if the original controller can be revived through board-level repair. The AES-256 key is stored on the controller silicon. By repairing or reworking the controller, the decryption chain remains intact and the drive decrypts data transparently during imaging. SATA SSD board repair: $450–$600. NVMe: $600–$900. Free evaluation, no data = no charge.

Does chip-off recovery work on encrypted SSDs?

Not for drives with hardware encryption. Chip-off reads raw NAND data by desoldering the flash chips. On an encrypted drive, the raw NAND contains AES-256 ciphertext. Without the key stored in the original controller, the data cannot be decrypted. Chip-off is only viable for older drives without always-on encryption or for unencrypted controllers.

Is my SSD encrypted even if I never turned on encryption?

Most SSDs manufactured after 2015 implement always-on hardware encryption (also called Class 0 encryption). The controller encrypts every write and decrypts every read using a key burned into the controller during manufacturing. This happens transparently; the OS never sees it. The data on the NAND is always ciphertext. If you also set a user password (ATA Security, OPAL, or BitLocker hardware mode), the media encryption key itself is encrypted with your password.

What is the difference between hardware encryption and BitLocker?

Hardware encryption (SED) is performed by the SSD controller using a key stored in the controller silicon. BitLocker is software encryption performed by Windows using a key stored in the TPM or entered by the user. They can operate independently or together. When BitLocker uses 'hardware encryption mode,' it delegates encryption to the SSD controller. Recovery from a dead hardware-encrypted drive requires reviving the controller first, then applying the BitLocker key to the imaged data.

What happens to the encryption key if the controller is replaced?

The AES-256 media encryption key is unique to the specific controller chip. Replacing the controller with an identical model does not transfer the key. The new controller generates its own key during initialization, making the existing NAND data permanently unreadable. This is why controller replacement is not a recovery option for encrypted drives; the original controller silicon must be repaired.

Encrypted SSD stopped working?

Board-level repair preserves the decryption chain. SATA: $450–$600+. NVMe: $600–$900+. Free evaluation, no data = no fee.

(512) 212-9111Mon-Fri 10am-6pm CT
No diagnostic fee
No data, no fee
4.9 stars, 1,837+ reviews