speakerNEW!iShredder iOS Enterprise is now available for Business users.Learn more

What is the Advanced Secure Deletion Algorithm developed by Protectstar™? What steps are involved in the Advanced Secure Deletion Algorithm (ASDA)?

What is the Advanced Secure Deletion Algorithm developed by Protectstar™? What steps are involved in the Advanced Secure Deletion Algorithm (ASDA)?
January 18, 2023

The Advanced Secure Deletion Algorithm (ASDA) was introduced by Protectstar™ Inc. in 2017 to provide a more secure and thorough data erasure method than the Secure Deletion Algorithm, which had been in use for over ten years. With ASDA, you can erase data on various storage media (hard drives, SSDs, USB sticks, memory cards, smartphones, etc.) in such a way that even professional forensic experts or hackers have no chance of recovering the original content.
 

Why Do You Need Such a Complex Erasure Algorithm?

When you move a file to the recycle bin and then empty it, the data isn’t actually removed physically. The storage space the file occupied is merely marked as “available.” With the right tools, these files can often be recovered. To truly ensure that personal or business-critical information disappears, you need an erasure algorithm that not only renders the data unreadable but also destroys it in a way that’s irreversible, even for specialists.
 

The Four Steps of the Advanced Secure Deletion Algorithm (ASDA)

1. Initial Overwrite with a Defined Pattern

In the first pass, all data is overwritten with the hex value 0xFF. This means every sector or block of your storage medium is filled with this fixed value, making it much more difficult to retrieve any original data from the underlying storage structure.

2. Complete AES-256 Encryption

In the second step, all data blocks are fully encrypted using AES-256 (Advanced Encryption Standard with a 256-bit key). Even if minimal traces of the original content still remained, they are now encrypted. For anyone attempting data recovery, this poses a huge challenge—usually an impossible task without the key.

3. Verification and Overwrite with a Unique Pattern

Next, a comprehensive verification of the previously written data is carried out. It is then erased again using a unique bit pattern (10010010, 01001001, 00100100), followed by another verification. All incorrectly read or verified sectors/blocks are logged in the erasure report. This gives you a complete record of whether every area of the storage medium has been properly erased.

4. Final Overwrite with High-Quality Random Data

Finally, the medium is overwritten once again with random data. These random values are generated by high-quality (FIPS-compliant) random number generators, making any potential reconstruction even more difficult. At this point, the device has not only been overwritten and encrypted multiple times but also filled with highly unpredictable random patterns.
 

What Makes ASDA Special?

  1. Combination of Multiple Methods: ASDA employs overwriting, encryption, verification, and high-quality random numbers in a well-coordinated process.
  2. Continuous Development: Since 2017, the algorithm has been regularly updated to keep pace with evolving standards and technological challenges.
  3. Documentation & Compliance: Every erasure generates a detailed report, which is essential for businesses and organizations to meet data protection requirements or compliance standards (e.g., GDPR, HIPAA, PCI-DSS).
  4. Broad Hardware Support: ASDA is integrated into Protectstar™ software solutions like the iShredder series or Data Shredder, and works across different platforms (Windows, macOS, iOS, Android).
     

Who Should Use ASDA?

  • Home Users: If you want to ensure that personal photos, private documents, or other sensitive information truly disappear for good.
  • Businesses: To securely and irreversibly delete trade secrets, customer data, and confidential information, for instance when disposing of old hard drives or reselling company devices.
  • IT Professionals/Forensic Experts: As a robust standard method for high-security applications requiring maximum reliability and traceability in the data erasure process.

 

The Advanced Secure Deletion Algorithm (ASDA) by Protectstar™ combines various security measures—overwriting with known patterns, strong AES-256 encryption, thorough verification, and overwriting with high-quality random data—into a four-step procedure. This ensures data is truly erased, making it extremely difficult to recover, even with forensic methods.

If you’re looking for a sophisticated, reliable, and continually updated method of data erasure, ASDA is an excellent choice.

Learn more about the Advanced Secure Deletion Algorithm and Protectstar™’s corresponding software solutions at:
https://www.protectstar.com/en/secure-erase

Was this article helpful? Yes No
27 out of 30 people found this article helpful
Cancel Submit
Back Go back