Algorithms Used By Acronis Privacyexpert - ACRONIS PRIVACYEXPERT 2003 User Manual

Table of Contents

Advertisement

features of recording data to all types of hard disks. This knowledge speaks
to the necessity of complex multipass algorithms to guarantee information
wiping.
The detailed theory of guaranteed information wiping is described in an
article of Peter Gutmann, please see:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
A.2

Algorithms Used by Acronis PrivacyExpert

The table below briefly describes information wiping algorithms used by
Acronis PrivacyExpert. Each description features the number of hard disk
sector passes along with number(s) written to each sector byte.
The description of built-in information wiping algorithms
Algorithm
NN
American: DoD
5220.22-M
1.
American:
2.
NAVSO P-5239-
26 (RLL)
American:
3.
NAVSO P-5239-
26 (MFM)
German: VSITR
4.
Russian: GOST
P50739-95
5.
Appendix A : Hard Disk Wiping algorithms
42
(writing
Passes
method)
4
4
4
7
1
Record
st
1
pass – randomly selected symbols
to each byte of each sector, 2 –
complementary to written during the
st
1
pass; 3 – random symbols again;
4 – writing verification.
st
1
pass – 0x01 to all sectors, 2 -
0x27FFFFFF, 3 – random symbol
sequences, 4 – verification.
st
1
pass – 0x01 to all sectors, 2 -
0x7FFFFFFF, 3 – random symbol
sequences, 4 – verification.
st
th
1
– 6
– alternate sequences of:
th
0x00 and 0xFF; 7
- 0xAA; i.e. 0x00,
0xFF, 0x00, 0xFF, 0x00, 0xFF, 0xAA.
Logical zeros (0x00 numbers) to
each byte of each sector for 6
security level systems.
Randomly selected symbols
(numbers) to each byte of each
rd
st
sector for 3
to 1
security level
systems.
th
th
to 4

Advertisement

Table of Contents
loading

Table of Contents