I was wondering if anyone could help me. I have trying to come up with a list
of the various country/government data sanitizations but apart from the DoD ones
I am having a hard time getting any detailed specifics on how they are performed.
The main reason I am bringing this up is for inclusion in a future releases of
eraser. I'm aware of the arguments that there's only a need for so many, and I
would have agreed with this my self. However thinking about it. The more standardized
wiping methods that eraser supports the more useful it is to people who have to
adhere to these standards.
Would love to hear what people think of this, especially the Heidi guys.
So far I am aware of the following:
USA
+ US DoD 5220.22-M.
http://www.dss.mil/isp/odaa/documents/n ... 6-5220.pdf
3 to 7 passes
+ US Navy standards NAVSO P-5239-26. (MFM)
One Pass 0xffffffff, One Pass 0xbfffffff, one Pass Random, Drive verified after wiping
+ US Navy standards NAVSO P-5239-26. (RFF)
One Pass 0xffffffff, One Pass 0x27ffffff, one Pass Random, Drive verified after wiping
+ US Air Force, AFSSI5020
One pass 0x00, One pass 0xff, One pass random. 10% of drive read to verify wiping.
+ US Army AR 380-19
http://www.fas.org/irp/doddir/army/r380_19.pdf
Canada
+ RCMP Hard Drive Secure Information Removal and Destruction Guidelines
http://www.rcmp-grc.gc.ca/tsb/pubs/it_sec/g2-003_e.pdf
UK
+ British HMG Infosec Standard No.5.
Germany
+ German VSItR Standard.
7 passes with specific passes, Drive verified after wiping
Australia
+ Australian ASCI 33.
Russia
+ Russian GOST R 50739-95.
1 pass random.
NATO
+ North Atlantic Treaty Organization - NATO standard
Alternating 0x00 and 0xff for 6 passes followed by one pass random.
Non Stnadardized.
+ Peter Gutmann's algorithm.
http://www.cs.auckland.ac.nz/~pgut001/p ... e_del.html
4 random passes, 27 specific passes, 4 random passes
+ Bruce Schneier's algorithm.
2 pass specific, 5 passes using cryptographically secure pseudo-random sequence
edit 20070712-1413 added Canada
edit 20070718-1413 added US Army
of the various country/government data sanitizations but apart from the DoD ones
I am having a hard time getting any detailed specifics on how they are performed.
The main reason I am bringing this up is for inclusion in a future releases of
eraser. I'm aware of the arguments that there's only a need for so many, and I
would have agreed with this my self. However thinking about it. The more standardized
wiping methods that eraser supports the more useful it is to people who have to
adhere to these standards.
Would love to hear what people think of this, especially the Heidi guys.
So far I am aware of the following:
USA
+ US DoD 5220.22-M.
http://www.dss.mil/isp/odaa/documents/n ... 6-5220.pdf
3 to 7 passes
+ US Navy standards NAVSO P-5239-26. (MFM)
One Pass 0xffffffff, One Pass 0xbfffffff, one Pass Random, Drive verified after wiping
+ US Navy standards NAVSO P-5239-26. (RFF)
One Pass 0xffffffff, One Pass 0x27ffffff, one Pass Random, Drive verified after wiping
+ US Air Force, AFSSI5020
One pass 0x00, One pass 0xff, One pass random. 10% of drive read to verify wiping.
+ US Army AR 380-19
http://www.fas.org/irp/doddir/army/r380_19.pdf
Canada
+ RCMP Hard Drive Secure Information Removal and Destruction Guidelines
http://www.rcmp-grc.gc.ca/tsb/pubs/it_sec/g2-003_e.pdf
UK
+ British HMG Infosec Standard No.5.
Germany
+ German VSItR Standard.
7 passes with specific passes, Drive verified after wiping
Australia
+ Australian ASCI 33.
Russia
+ Russian GOST R 50739-95.
1 pass random.
NATO
+ North Atlantic Treaty Organization - NATO standard
Alternating 0x00 and 0xff for 6 passes followed by one pass random.
Non Stnadardized.
+ Peter Gutmann's algorithm.
http://www.cs.auckland.ac.nz/~pgut001/p ... e_del.html
4 random passes, 27 specific passes, 4 random passes
+ Bruce Schneier's algorithm.
2 pass specific, 5 passes using cryptographically secure pseudo-random sequence
edit 20070712-1413 added Canada
edit 20070718-1413 added US Army