Why Are Most SSDs Already Encrypted?
Most SSDs manufactured after 2015 encrypt all data by default because always-on hardware encryption serves two functions: it enables instant Secure Erase by destroying the Media Encryption Key rather than erasing every NAND cell, and it provides the foundation for optional user-set passwords via ATA Security, TCG OPAL, or BitLocker.
Since approximately 2015, many enterprise and mainstream SSD controllers have implemented always-on AES-256 hardware encryption by default, without any user configuration. Samsung, Silicon Motion, Marvell, & Intel/Solidigm controllers commonly encrypt every write to NAND using a Media Encryption Key generated during manufacturing. The OS reads & writes plaintext; the controller handles all encryption and decryption in dedicated hardware, with negligible performance impact.
Notable exceptions exist: some DRAM-less NVMe drives and gaming SSDs (WD SN770, WD SN850X, Sabrent Rocket Q4) omit hardware AES-256.
The controller generates a Media Encryption Key (MEK) during manufacturing or first initialization. Every write to NAND passes through the AES engine, and every read is decrypted before being sent to the host. Performance impact is negligible because the AES engine is implemented in dedicated hardware on the controller die.
Always-on encryption exists for two reasons. First, it enables instant Secure Erase: instead of erasing every NAND cell, the controller destroys the MEK and generates a new one, making all existing data permanently unreadable in milliseconds. Second, it provides a foundation for user-set passwords.
When a user enables ATA Security, TCG OPAL, or BitLocker hardware mode, the MEK is itself encrypted with the user's authentication key. The NAND data was already encrypted; the user password simply locks access to the MEK.
How Do SSD Encryption Keys Work?
SSD hardware encryption uses a layered key hierarchy. The Media Encryption Key (MEK) encrypts all NAND data and is stored inside the controller chip; it never leaves that silicon. When a user password is set, a Key Encryption Key (KEK) wraps the MEK. Which key lives where determines whether recovery is possible after controller failure.
- Media Encryption Key (MEK)
- The AES-256 key used to encrypt and decrypt all data on the NAND. Stored in a secure region of the controller chip or in a protected area of the NAND that only the original controller can access. Unique per drive; no two SSDs share the same MEK.
- Key Encryption Key (KEK)
- When a user password is set (via ATA Security, OPAL, or OS-level encryption in hardware mode), the MEK is wrapped with the KEK derived from the password. The wrapped MEK is stored on the drive. Without the correct password, the MEK cannot be unwrapped and data remains encrypted.
- Self-Encrypting Drive (SED)
- An SSD that complies with the TCG OPAL specification for hardware encryption management. OPAL provides a standardized interface for setting user authentication, defining encryption ranges, and managing the key hierarchy. Samsung, Micron/Crucial, and Intel enterprise SSDs commonly support OPAL 2.0.
- Always-On Encryption (No User Password)
- Drives that encrypt all data by default without user authentication. The MEK is accessible to the controller without a password. Data is protected from raw NAND reads (chip-off) but not from normal host access through the controller.
How Does Encrypted SSD Recovery Differ from Unencrypted?
Hardware encryption changes the viable recovery methods. On an unencrypted drive, multiple paths exist: chip-off NAND extraction, controller swap, or firmware repair all yield readable data. On a hardware-encrypted drive, the original controller is the only key holder. Chip-off yields ciphertext; controller swap generates a new key; only controller repair preserves the decryption chain.
| Recovery Method | Unencrypted SSD | Encrypted SSD (Class 0) | Encrypted SSD + User Password |
|---|---|---|---|
| PC-3000 firmware repair | Works; data reads directly | Works; controller decrypts transparently | Works if password is known; controller decrypts after authentication |
| Board-level controller repair | Works; original controller not required | Required; only the original controller holds the MEK | Required; original controller + user password both needed |
| Chip-off NAND recovery | Viable; raw NAND is plaintext | Yields ciphertext; data unrecoverable | Yields ciphertext; data unrecoverable |
| Controller swap to donor | May work for some older controllers | Fails; new controller has different MEK | Fails; new controller has different MEK |
Hardware Encryption vs Software Encryption: Recovery Comparison
Hardware encryption (SED) is performed by the SSD controller using a key stored in the controller silicon. BitLocker software mode is performed by the host CPU using a key stored in the TPM or supplied by the user. FileVault on modern Macs (T2 and Apple Silicon) is not purely host-CPU software: encryption runs on a dedicated AES engine in the SoC data path, with keys bound to the Secure Enclave. Recovery path differs depending on which layer holds the key.
| Attribute | Hardware Encryption (SED / AES-256) | Software Encryption (BitLocker / FileVault) |
|---|---|---|
| Where encryption occurs | SSD controller AES engine (hardware) | Host CPU (BitLocker software mode) or SoC hardware AES engine (FileVault on T2/Apple Silicon) |
| Key storage location | HUK fused in controller silicon; MEK wrapped by KEK and never leaves the chip | TPM 2.0 (BitLocker), Secure Enclave UID (FileVault on T2/Apple Silicon), or user recovery key |
| Key is bound to | The specific SSD controller chip (non-transferable) | User credential or host security chip |
| Recovery path when drive dies | Must repair the original controller; chip-off yields only ciphertext | BitLocker: decrypt drive image offline with recovery key; controller swap viable. FileVault (T2/M-series): controller swap impossible (soldered NAND); logic-board repair required |
| Chip-off viability | Not viable; raw NAND is AES-256 ciphertext without the MEK | BitLocker: viable if recovery key is known; raw data can be decrypted offline. FileVault (T2/M-series): not viable; raw NAND is ciphertext bound to the Secure Enclave UID and cannot be decrypted offline |
| If key is lost | Data unrecoverable regardless of physical drive condition | Data unrecoverable regardless of physical drive condition |
Why Is Board-Level Repair the Only Recovery Path?
When a hardware-encrypted SSD fails, the MEK is trapped inside the dead or malfunctioning controller. Replacing the controller destroys the key association. Component-level microsoldering to repair the power delivery circuit is the mandatory prerequisite for decryption: it revives the original controller, restores MEK access, & enables the AES engine to decrypt NAND reads during imaging.
- 01
Diagnose the failure point
Using FLIR thermal imaging and multimeter probing, we identify whether the failure is in the controller itself, the PMIC (Power Management IC), voltage regulators, decoupling capacitors, or the NAND interface. Many "dead controller" symptoms are actually failed passives on the power delivery circuit that prevent the controller from booting.
- 02
Component-level repair
Using Hakko FM-2032 microsoldering irons and Atten 862 hot air rework, we replace failed voltage regulators, capacitors, resistors, or rework BGA connections on the controller. The goal is to restore power delivery and signal integrity so the controller boots its firmware and initializes the AES engine with the original MEK.
- 03
Firmware stabilization and imaging
Once the controller boots, PC-3000 communicates with it via vendor-specific commands to stabilize the firmware and image the drive. Because the original controller is running, all reads pass through the AES decryption engine. The imaged data is plaintext, ready for file system analysis.
Rossmann's foundation in board-level repair applies directly to encrypted SSD recovery. Most data recovery labs handle firmware-level work but not component-level soldering. When the failure is electrical rather than logical, those labs cannot proceed. We can, because board-level repair is what this shop was built on.
The workflow runs under a no-fix-no-fee guarantee: free evaluation on arrival, firm quote before any work begins, and no charge if the controller cannot be revived and data cannot be imaged. Honest limit: when the original controller is physically destroyed (cracked die, burned silicon) on an SED or always-on encrypted drive, the Hardware Unique Key fused into that controller is lost; the wrapped Media Encryption Key can no longer be unwrapped, permanently severing the decryption chain. Chip-off will yield ciphertext with no path to decryption. We state this up front after evaluation rather than running up a bill on a job we cannot complete.
How Does Apple T2 and M-Series Encryption Affect Recovery?
Apple T2 and M-series chips implement hardware encryption through a Secure Enclave coprocessor. The AES keys are fused into the Secure Enclave silicon, and the NAND storage is soldered directly to the logic board. There are no removable drives to send to another lab; recovery requires repairing the logic board so the Secure Enclave can serve the decryption keys.
On a MacBook with a T2 or M-series chip, the SSD controller is integrated into the Apple silicon. The NAND chips are soldered to the logic board and communicate with the SoC through a proprietary bus. The Secure Enclave generates and stores the volume encryption keys.
If the MacBook logic board fails, the Secure Enclave keys are inaccessible. Desoldering the NAND yields AES-256 ciphertext with no path to decryption.
Recovery requires repairing the logic board so the T2 or M-series chip boots and the Secure Enclave can serve the decryption keys. This is T2/M-series data recovery at the board level: identifying which power rail, capacitor, or IC failure prevents the SoC from initializing, repairing it, and imaging the drive through the running system.
How Much Does Encrypted SSD Recovery Cost?
Encrypted SSD recovery falls into the circuit board repair or firmware recovery tier. SATA SSD board repair: $450–$600. NVMe board repair: $600–$900. Firmware recovery (if controller boots but firmware is corrupted): SATA $600–$900, NVMe $900–$1,200. Free evaluation, firm quote before work begins, no data = no charge.
If board repair requires a donor drive for component harvesting, the donor cost is additional. A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
Rush service: +$100 rush fee to move to the front of the queue. Call (512) 212-9111 for a free evaluation.
SATA SSD Recovery Pricing
Simple Copy
Low complexityYour drive works, you just need the data moved off it
$200
3-5 business days
Functional drive; data transfer to new media
Rush available: +$100
File System Recovery
Low complexityYour drive isn't showing up, but it's not physically damaged
From $250
2-4 weeks
File system corruption. Visible to recovery software but not to OS
Starting price; final depends on complexity
Circuit Board Repair
Medium complexityYour drive won't power on or has shorted components
$450–$600
3-6 weeks
PCB issues: failed voltage regulators, dead PMICs, shorted capacitors
May require a donor drive (additional cost)
Firmware Recovery
Medium complexityMost CommonYour drive is detected but shows the wrong name, wrong size, or no data
$600–$900
3-6 weeks
Firmware corruption: ROM, modules, or system files corrupted
Price depends on extent of bad areas in NAND
PCB / NAND Swap
High complexityYour drive's circuit board is severely damaged and requires NAND chip transplant to a donor PCB
$1,200–$1,500
4-8 weeks
NAND swap onto donor PCB. Precision microsoldering and BGA rework required
50% deposit required; donor drive cost additional
50% deposit required
Hardware Repair vs. Software Locks
Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.
No data, no fee. Free evaluation and firm quote before any paid work. Full guarantee details. NAND swap requires a 50% deposit because donor parts are consumed in the attempt.
Rush fee: +$100 rush fee to move to the front of the queue.
Donor drives: A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost plus a small markup. All prices are plus applicable tax.
NVMe SSD Recovery Pricing
Simple Copy
Low complexityYour NVMe drive works, you just need the data moved off it
$200
3-5 business days
Functional drive; data transfer to new media
Rush available: +$100
File System Recovery
Low complexityYour NVMe drive isn't showing up, but it's not physically damaged
From $250
2-4 weeks
File system corruption. Visible to recovery software but not to OS
Starting price; final depends on complexity
Circuit Board Repair
Medium complexityYour NVMe drive won't power on or has shorted components
$600–$900
3-6 weeks
PCB issues: failed voltage regulators, dead PMICs, shorted capacitors
May require a donor drive (additional cost)
Firmware Recovery
Medium complexityMost CommonYour NVMe drive is detected but shows the wrong name, wrong size, or no data
$900–$1,200
3-6 weeks
Firmware corruption: ROM, modules, or system files corrupted
Price depends on extent of bad areas in NAND
PCB / NAND Swap
High complexityYour NVMe drive's circuit board is severely damaged and requires NAND chip transplant to a donor PCB
$1,200–$2,500
4-8 weeks
NAND swap onto donor PCB. Precision microsoldering and BGA rework required
50% deposit required; donor drive cost additional
50% deposit required
Hardware Repair vs. Software Locks
Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.
No data, no fee. Free evaluation and firm quote before any paid work. Full guarantee details. NAND swap requires a 50% deposit because donor parts are consumed in the attempt.
Rush fee: +$100 rush fee to move to the front of the queue.
Donor drives: A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost plus a small markup. All prices are plus applicable tax.
How Does BitLocker Hardware Encryption Mode Fail?
BitLocker can delegate encryption to the SSD controller instead of encrypting in software. When the SSD controller dies in this configuration, the BitLocker recovery key alone isn't enough; the controller must decrypt the data first, then BitLocker's key unlocks the volume. Recovery requires reviving the original controller through board-level repair at $450–$600 for SATA or $600–$900 for NVMe.
Windows 10 & 11 automatic device encryption often selected hardware mode on OPAL-compliant SSDs without asking the user. The OS detected the drive's SED capability & delegated encryption to the controller's AES engine. The user's BitLocker recovery key protected the MEK wrapper, but the controller performed all encryption and decryption operations in hardware.
This changed after researchers published CVE-2018-12037 & CVE-2018-12038, demonstrating that several SSD manufacturers implemented hardware encryption with flaws that allowed bypassing the authentication layer. Microsoft responded with ADV180028 in November 2018. Microsoft subsequently changed the Group Policy default via the September 2019 cumulative update (KB4516071) so new BitLocker volumes use software encryption instead of delegating to the SSD controller. Systems encrypted before that change may still be running in hardware mode.
Recovery Procedure for BitLocker Hardware Mode
- Revive the SSD controller via board-level repair using Hakko FM-2032 microsoldering & FLIR thermal imaging to locate failed components on the power delivery circuit.
- Authenticate the OPAL session. Because BitLocker delegated encryption to the hardware, the BitLocker recovery key is used to unlock the SED locking range before imaging begins.
- Image the plaintext data using PC-3000 SSD. Once authenticated, the controller's hardware AES engine transparently decrypts the NAND reads, yielding fully decrypted data.
If the controller can't be revived, the data is permanently locked: the SSD's AES-256 layer encrypts the raw NAND, and the Media Encryption Key required to decrypt it is trapped inside the dead controller. Chip-off yields ciphertext with no path to the key. Board repair at $450–$600 (SATA) or $600–$900 (NVMe) is the only option.
What Is an OPAL Self-Encrypting Drive?
TCG OPAL 2.0 is an industry specification that standardizes how hardware encryption is managed on Self-Encrypting Drives. OPAL defines user authentication, locking ranges, and the key hierarchy that protects data on the NAND. When an OPAL drive's controller dies, the authentication layer adds complexity to recovery beyond basic Class 0 always-on encryption.
- Always-On Encryption (ATA Security Class 0)
- The SSD encrypts all data by default using a factory-generated MEK. No user authentication is required. The controller decrypts reads transparently. Data is protected from raw NAND extraction (chip-off) but accessible to anyone who can boot the controller. Most consumer SSDs from Samsung, WD, Kingston, & Crucial ship in Class 0 mode.
- TCG OPAL 2.0 Authentication
- Full OPAL with user authentication, locking ranges, & admin/user password separation. The MEK is wrapped with a KEK derived from the user's credentials. Booting the controller alone isn't enough; the correct password or recovery key must also be supplied. Enterprise SSDs from Samsung (PM9A3, PM893), Micron (7450 PRO), & Intel/Solidigm commonly ship with Class 2 capability.
- MEK/KEK Hierarchy
- The Media Encryption Key encrypts the NAND contents. The Key Encryption Key encrypts the MEK. The KEK derives from the user password or from a TPM-stored secret. Destroying any link in this chain makes the data unrecoverable. A PSID revert destroys the MEK itself, permanently erasing all data regardless of password knowledge.
- PSID Revert (Factory Reset)
- The Physical Security ID is printed on the drive label. A PSID revert generates a new MEK, rendering all existing NAND data permanently unreadable. This is designed for situations where the admin password is lost. It is a data-destruction operation, not a recovery tool. Running PSID revert on a drive with needed data is irreversible.
OPAL drives are harder to recover when the controller dies because the authentication layer must also be satisfied after repair. The controller must boot, accept the user's credentials, unwrap the KEK, and then decrypt reads using the MEK. If the firmware module that stores the wrapped key is corrupted, PC-3000 SSD's firmware recovery utilities ($600–$900 SATA, $900–$1,200 NVMe) can reconstruct the damaged modules while preserving the key material.
How Do Different Controllers Implement Hardware Encryption?
Each SSD controller manufacturer implements AES-256 hardware encryption differently. Samsung, Phison, Silicon Motion, Marvell, & WD each store the MEK differently, use different authentication interfaces, and require different PC-3000 SSD recovery modules. Recovery procedures that work on a Samsung Elpis controller won't work on a Phison PS5012. Each requires its own diagnostic mode entry sequence & FTL reconstruction method.
The MEK storage location, the authentication interface, & the PC-3000 SSD recovery utility all vary by controller family.
| Manufacturer | Controller Family | Encryption Details | PC-3000 SSD Module |
|---|---|---|---|
| Samsung | Elpis, Phoenix, Pascal, Piccolo | Proprietary AES engine; HUK fused in controller silicon, MEK wrapped by KEK; proprietary LDPC ECC tied to controller | Samsung utility (SATA models; NVMe support limited) |
| WD / SanDisk | Marvell 88SS1074 (SATA); proprietary in-house (NVMe) | SATA: AES-256 via Marvell. NVMe: varies by model. SN770 and SN850X lack hardware AES-256; portable/SED models (SanDisk Extreme, My Passport SSD) include it | Marvell utility (SATA and specific NVMe models via 88SS1093 support) |
| Micron / Crucial | Silicon Motion SM2259 variants (SATA); proprietary (NVMe) | Class 0 AES-256 on consumer models; TCG OPAL 2.0 on enterprise (7450 series) | Silicon Motion utility (SATA and NVMe via Portable III); Micron NVMe support varies by generation |
| Phison | PS5012 (E12), PS5016 (E16), PS5018 (E18), PS5019 (E19T) | Most models implement AES-256; all use proprietary XOR scrambling. OEM configuration varies: some brands (e.g., Sabrent Rocket Q4 on E16) omit hardware AES. Used in Kingston, Corsair, PNY, Sabrent, Inland | Phison utility for E12, E16, E19T. E18: firmware repair only (no data extraction) |
The PC-3000 SSD module for each controller family communicates using vendor-specific ATA or NVMe commands to enter diagnostic mode, read the FTL mapping table, & image the drive through the controller's decryption engine. Phison controllers require shorting diagnostic test points on the PCB to enter Safe Mode for firmware repair; Samsung controllers require a specific power-on sequence to enter service mode. These differences matter because using the wrong procedure on the wrong controller can overwrite firmware modules & destroy the MEK reference.
Board repair pricing depends on the controller complexity: SATA board repair runs $450–$600, NVMe runs $600–$900. The NVMe tier is higher because NVMe controllers have more complex power delivery circuits with multiple voltage rails feeding the PCIe PHY, DRAM interface, and NAND channels independently.
Which Controller Families Ship With Always-On AES, and When Is the DEK Still Recoverable?
On a Self-Encrypting Drive without a user password, the Data Encryption Key (DEK, equivalent to the MEK in TCG OPAL terminology) lives inside a controller-resident key blob, wrapped by a Hardware Unique Key fused into the controller silicon during manufacturing. The DEK never leaves the controller in plaintext. NAND chip-off extraction sees only AES-256 ciphertext because the DEK cannot be reconstructed from the flash dies. The wrapped key blob is stored either in a protected firmware partition on the NAND (encrypted with the HUK) or in a small region of the controller's on-die OTP/eFuse area, depending on the family.
SED with User PIN vs. ATA Security Class 0: Where the DEK Lives
On a Class 0 always-on drive, the controller initializes the DEK on first power-up with no user input. Anyone who can boot the controller reads plaintext through it. On a TCG OPAL drive with a user PIN, the controller adds a Key Encryption Key derived from the PIN and uses it to wrap the DEK. The wrapped DEK still lives in the controller's secure region; the PIN only unwraps it at runtime. Both architectures defeat chip-off recovery, but for different reasons. Class 0 defeats chip-off because the HUK is required to unwrap the DEK; OPAL defeats it for the same reason plus the PIN-derived KEK requirement. Decapping the controller die to read the HUK is not a service offered by mainstream data recovery labs; the silicon is designed to resist optical and electrical probing of the fuse bank.
Controllers That Default to AES-256 Always-On
- Phison E12, E16, E18, E19T families. Most OEM configurations enable hardware AES-256 with a factory-generated DEK. Used by Kingston, Corsair, PNY, Sabrent, Inland, MyDigitalSSD. Some OEM SKUs (Sabrent Rocket Q4 on E16) ship with AES disabled in firmware; the drive label and TCG identify report disclose this.
- Silicon Motion SM2246EN, SM2258, SM2259, SM2262, SM2263, SM2264, SM2267, SM2269. AES-256 is on by default in the reference firmware. Used widely in Crucial MX SATA, Adata, Patriot, HP, Lexar, and Micron consumer NVMe. Crucial disabled hardware AES on the budget BX series (BX100), so chip-off remains viable on those specific drives.
- SandForce legacy SF-1200, SF-2281, and SF-3700. Originally LSI/Sandforce, later acquired by Seagate. Shipped with AES-128 (SF-1200/2281 early) or AES-256 (SF-2281 late silicon, SF-3700) always-on. Found in OCZ Vertex 3/4, Vector, Agility 3/4, Intel 330/335/520/530, and Kingston HyperX 3K. These drives are PC-3000 SSD supported via the SandForce utility, but the AES key is stored in a controller-internal blob; controller swaps fail for the same reason as modern families.
- Marvell 88SS1074, 88SS1093, 88SS1100. AES-256 always-on in WD Blue/Green SATA, SanDisk Ultra 3D, and Plextor M8V/M9P generations.
- Samsung Elpis, Phoenix, Pascal, Piccolo. Proprietary AES engine with HUK fused in controller silicon. Default behavior is always-on; the user-visible "encryption status" in Samsung Magician reflects whether a user password has wrapped the MEK, not whether the AES engine is active.
When PMIC or Power-Rail Failure Preserves the DEK
An SSD that fails to enumerate on the SATA or PCIe bus is often diagnosed externally as "dead controller," but the controller silicon is frequently intact. Common electrical failure modes that leave the controller die undamaged: shorted decoupling caps on the 1.2V or 1.8V core rail, blown PMIC step-down converters, failed LDO regulators feeding the DRAM rail, cracked solder joints on BGA balls under thermal cycling, and ESD damage to the SATA or PCIe PHY transceiver pads (not the AES core).
In every one of these cases, the DEK and the wrapped key blob are physically intact. Restoring power delivery and signal integrity boots the controller, the AES engine initializes with the original DEK, and reads through the controller produce plaintext. The repair path uses Hakko FM-2032 microsoldering for cap and resistor replacement, Atten 862 hot-air rework for PMIC reflow or replacement, FLIR thermal imaging to locate shorts, and PC-3000 SSD for firmware stabilization once the drive enumerates. Chip-off in this scenario destroys a recoverable case: desoldering the NAND yields ciphertext that can never be decrypted because the DEK extraction step is no longer available once the original controller is removed from the PCB.
The contrast matters at intake. A drive that arrives with shorted passives or a dead PMIC is a board-repair candidate at $450–$600 (SATA) or $600–$900 (NVMe). A drive that arrives with a cracked controller die, burned silicon from a power surge, or visible delamination of the controller package is a different category: the HUK is gone with the silicon, the wrapped DEK can no longer be unwrapped, and chip-off would still yield ciphertext with no decryption path. We disclose this at evaluation rather than billing for a recovery the physics will not support. A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
When Can Recovery Software Access an Encrypted SSD?
Recovery software works on encrypted SSDs only when the controller is functional. A running controller decrypts reads transparently, so Disk Drill, EaseUS, PhotoRec, or R-Studio sees plaintext. When the controller is dead or stuck in a firmware fault state, software can't communicate with the drive at all.
No amount of retry logic fixes a hardware failure.
Software Works When
- The SSD is detected in BIOS & mounts (or partially mounts) in the OS, and the issue is logical: accidental deletion with TRIM disabled, corrupted partition table, formatted volume.
- The controller is running its AES engine normally, so the software's sector reads return plaintext data.
- TRIM has not already executed on the deleted blocks. Once the controller unmaps the logical addresses and garbage collection erases the NAND blocks, neither software nor a lab can recover the data.
Software Fails When
- The SSD isn't detected in BIOS (dead controller, shorted PMIC, failed voltage regulator). Software needs a functioning interface to send commands.
- The drive reports wrong capacity, wrong model name, or shows 0 bytes. These are firmware corruption symptoms that require PC-3000 SSD to repair the FTL & module tables.
- The controller is dead on an encrypted drive. Chip-off NAND extraction yields AES-256 ciphertext without the original key.
Software tools are worth trying first if the drive powers on and is recognized. They cost between $0 (PhotoRec, open source) and $90 (Disk Drill, R-Studio). If the SSD isn't detected or the controller is in a fault state, stop. Continued power cycling stresses degrading NAND cells. Send the drive for a free evaluation; board repair starts at $450–$600 for SATA and $600–$900 for NVMe.
Frequently Asked Questions
Can you recover data from a hardware-encrypted SSD?
Yes, if the original controller can be revived through board-level repair. The AES-256 key is stored on the controller silicon. By repairing or reworking the controller, the decryption chain remains intact and the drive decrypts data transparently during imaging. SATA SSD board repair: $450–$600. NVMe: $600–$900. Free evaluation, no data = no charge.
Does chip-off recovery work on encrypted SSDs?
Not for drives with hardware encryption. Chip-off reads raw NAND data by desoldering the flash chips. On an encrypted drive, the raw NAND contains AES-256 ciphertext. Without the key stored in the original controller, the data cannot be decrypted. Chip-off is only viable for older drives without always-on encryption or for unencrypted controllers.
Is my SSD encrypted even if I never turned on encryption?
Many mainstream and enterprise SSDs manufactured after 2015 implement always-on hardware encryption (sometimes called Class 0 under the ATA Security specification). The controller encrypts every write and decrypts every read using a key generated during manufacturing. This happens transparently; the OS never sees it. The data on the NAND is ciphertext. Some consumer NVMe drives omit hardware encryption entirely. If you also set a user password (ATA Security, OPAL, or BitLocker hardware mode), the media encryption key itself is encrypted with your password.
What is the difference between hardware encryption and BitLocker?
Hardware encryption (SED) is performed by the SSD controller using a key stored in the controller silicon. BitLocker is software encryption performed by Windows using a key stored in the TPM or entered by the user. They can operate independently or together. When BitLocker uses 'hardware encryption mode,' it delegates encryption to the SSD controller via OPAL commands. Recovery from a dead hardware-encrypted drive requires reviving the controller, then authenticating with the BitLocker recovery key so the controller decrypts data during imaging.
What happens to the encryption key if the controller is replaced?
The AES-256 media encryption key is unique to the specific controller chip. Replacing the controller with an identical model does not transfer the key. The new controller generates its own key during initialization, making the existing NAND data permanently unreadable. This is why controller replacement is not a recovery option for encrypted drives; the original controller silicon must be repaired.
Can recovery software access data on an encrypted SSD?
Recovery software like Disk Drill, EaseUS, or R-Studio works when the SSD controller is functional and the issue is logical (accidental deletion with TRIM disabled, partition corruption). When the controller is running, it decrypts reads transparently, so software sees plaintext. If the controller is dead, software can't communicate with the drive at all. Lab recovery with PC-3000 SSD and board-level repair starts at $450–$600 for SATA and $600–$900 for NVMe.
Does a PSID revert destroy data on an OPAL SSD?
Yes. A PSID (Physical Security ID) revert is a factory reset for OPAL Self-Encrypting Drives. It destroys the current Media Encryption Key and generates a new one. All existing data becomes permanently unreadable because the ciphertext on the NAND no longer matches any accessible key. Never run a PSID revert on a drive that contains data you need.
Related Encryption Recovery Pages
Full SSD recovery service overview
Secure Enclave encrypted Mac recovery
Physical NAND extraction for unencrypted drives
BitLocker device encryption recovery
Firmware-level controller repair
Encrypted SSD stopped working?
Board-level repair preserves the decryption chain. SATA: $450–$600+. NVMe: $600–$900+. Free evaluation, no data = no fee.
