Seagate BlackArmor WS 110 BlackArmor PS User Guide - Page 126

C.2 Information wiping methods used by Seagate BlackArmor Backup

Page 126 highlights

C.2 Information wiping methods used by Seagate BlackArmor Backup The table below briefly describes information wiping methods used by Seagate. Each description features the number of hard disk sector passes along with the number(s) written to each sector byte. The description of built-in information wiping methods No. Algorithm (writing Passes Record method) 1. United States 4 1st pass - randomly selected symbols to Department of Defense 5220.22- each byte of each sector, 2 - complementary to written during the 1st M pass; 3 - random symbols again; 4 - writing verification. 2. United States: 4 1st pass - 0x01 to all sectors, 2 - NAVSO P-5239-26 0x27FFFFFF, 3 - random symbol (RLL) sequences, 4 - verification. 3. United States: 4 1st pass - 0x01 to all sectors, 2 - NAVSO P-5239-26 0x7FFFFFFF, 3 - random symbol (MFM) sequences, 4 - verification. 4. German: VSITR 7 1st - 6th - alternate sequences of: 0x00 and 0xFF; 7th - 0xAA; i.e. 0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, 0xAA. 5. Russian: GOST 1 P50739-95 Logical zeros (0x00 numbers) to each byte of each sector for 6th to 4th security level systems. 6. Peter Gutmann's 35 method 7. Bruce Schneier's 7 method 8. Fast 1 Randomly selected symbols (numbers) to each byte of each sector for 3rd to 1st security level systems. Peter Gutmann's method is very sophisticated. It's based on his theory of hard disk information wiping (see http://www.cs.auckland.ac.nz/~pgut001 /pubs/secure_del.html). Bruce Schneier offers a seven-pass overwriting method in his Applied Cryptography book. 1st pass - 0xFF, 2nd pass - 0x00, and then five times with a cryptographically secure pseudo-random sequence. Logical zeros (0x00 numbers) to all sectors to wipe. 126 Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128

126
Copyright (c) 2000-2009 Acronis. All rights reserved.
Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.
C.2
Information wiping methods used by Seagate BlackArmor
Backup
The table below briefly describes information wiping methods used by Seagate.
Each description features the number of hard disk sector passes along with the
number(s) written to each sector byte.
The description of built-in information wiping methods
No.
Algorithm (writing
method)
Passes
Record
1.
United States
Department of
Defense 5220.22-
M
4
1
st
pass – randomly selected symbols to
each byte of each sector, 2 –
complementary to written during the 1
st
pass; 3 – random symbols again; 4 –
writing verification.
2.
United States:
NAVSO P-5239-26
(RLL)
4
1
st
pass – 0x01 to all sectors, 2 –
0x27FFFFFF, 3 – random symbol
sequences, 4 – verification.
3.
United States:
NAVSO P-5239-26
(MFM)
4
1
st
pass – 0x01 to all sectors, 2 –
0x7FFFFFFF, 3 – random symbol
sequences, 4 – verification.
4.
German: VSITR
7
1
st
– 6
th
– alternate sequences of: 0x00
and 0xFF; 7
th
– 0xAA; i.e. 0x00, 0xFF,
0x00, 0xFF, 0x00, 0xFF, 0xAA.
5.
Russian: GOST
P50739-95
1
Logical zeros (0x00 numbers) to each
byte of each sector for 6
th
to 4
th
security
level systems.
Randomly selected symbols (numbers)
to each byte of each sector for 3
rd
to 1
st
security level systems.
6.
Peter Gutmann’s
method
35
Peter Gutmann’s method is very
sophisticated. It’s based on his theory of
hard disk information wiping (see
/pubs/secure_del.html
).
7.
Bruce Schneier’s
method
7
Bruce Schneier offers a seven-pass
overwriting method in his Applied
Cryptography book. 1
st
pass – 0xFF, 2
nd
pass – 0x00, and then five times with a
cryptographically secure pseudo-random
sequence.
8.
Fast
1
Logical zeros (0x00 numbers) to all
sectors to wipe.