Skip to main content

Glossary

Key Rotation

The practice of periodically replacing cryptographic keys by moving funds to addresses controlled by new keys. Rotation limits the window during which a compromised key could be exploited. If rotation happens before an attacker acts, the old key becomes worthless.

Why it matters

Key compromise may go undetected. An attacker might copy a key and wait for the right moment to act. Regular key rotation bounds this risk: even if a key was compromised months ago, funds moved to new keys are safe. Rotation converts a potentially catastrophic breach into a contained incident.


How it works

New keys are generated following secure procedures. Funds are transferred from addresses controlled by old keys to addresses controlled by new keys. The old keys are then decommissioned. For multisig setups, rotation might replace one key at a time while maintaining the signing threshold.


Example

An institution rotates one key in their 3-of-5 multisig quarterly. Each quarter, they generate a new key on a new hardware security module, update the multisig configuration, migrate funds to addresses using the new keyset, and securely destroy the retired key. Any compromise of the old key becomes irrelevant.


Related terms


Further reading

Bitcoin custody built for conviction

Ficha provides full-reserve bitcoin custody for serious long-term holders. Clear terms, reliable withdrawals, and standards designed for decades.