Questions tagged [cryptoshredding]

Crypto-shredding is the deletion of encrypted data by deletion of the encryption key.

Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys. This requires that the data have been encrypted. Data comes in these three states: data at rest, data in transit and data in use. In the CIA triad of confidentiality, integrity, and availability all three states must be adequately protected.

source Wikipedia:

7 questions
4
votes
1 answer

An alternative for /dev/urandom

I like to overwrite my harddisk with random data. Since /dev/urandom as source is too slow to overwrite a large amount of data in a reasonable time, I'm looking for a good alternative. These two options meet my speed requirements: (1) openssl with…
dev_new
2
votes
1 answer

How to determine start and end bytes of LUKS header?

How can I determine the exact start byte and exact end byte of a LUKS header on a block storage device? I use Linux Unified Key Setup (LUKS) for Full Disk Encryption (FDE), so all of the data on my drive is encrypted using a strong master key that's…
2
votes
2 answers

Is corrupting the ciphertext corruption a good erasure?

Normally when you wipe a drive there are still ghost remains of the data even after overwriting the disk multiple times. So I was wondering if you could encrypt the drive and then overwrite the encrypted data, would it be possible to recover any…
1
vote
2 answers

Does crypto shredding count as deletion in regards to CCPA?

I have a compliance question around crypto shredding and CCPA. I'm basically just wondering if crypto shredding is sufficient to comply with the CCPA customer deletion requests. I know that crypto shredding has it's own downsides (quantum…
markwatson
  • 113
  • 3
1
vote
1 answer

How is cryptoshredding a "sole pragmatic option for data disposal in the cloud"?

I'm studying for the CCSP exam and I think I'm missing something here... In reviewing data destruction/disposal methods, I'm aware that an on-premise IT environment has several options: Physical destruction of media and…
Mike B
  • 3,336
  • 4
  • 29
  • 39
0
votes
1 answer

Using ATA Secure Erase after buying a second-hand laptop : is this enough?

I bought a second-hand laptop from a stranger. My (totally unjustified) concern is that there might be malware on the device. According to this answer, there is no easy fix if it's malicious firmware. I don't know how easy it is to implant malicious…
Banjo
  • 3
  • 1
0
votes
1 answer

Crypto-shredding & backups of keys

I was wondering, how is crypto-shredding implemented in an environment, where data backups/mirroring is mandatory for the "key database" - as it must not be possible to lose the machine/db with all the keys and shred everything by accident :-). I…