speakerNEW!iShredder iOS Enterprise is now available for Business users.Learn more

Advanced Secure Deletion Algorithm (ASDA)
The Next Generation of Secure Data Erasure

In 2017, the former 50-round Secure Deletion Algorithm was replaced by the new and more efficient 4-round Advanced Secure Deletion Algorithm (ASDA).
Advanced Secure Deletion Algorithm (ASDA)

This approach ensures highly secure and fully traceable data erasure, while being significantly faster and more resource-efficient than conventional methods.

By leveraging four precisely coordinated steps, this algorithm delivers a deletion method that exceeds the highest security standards and optimizes efficiency with minimal resource usage. Verification and logging functions guarantee full transparency, while the use of 256-bit AES encryption and high-quality random numbers provides long-term protection against forensic recovery attempts. Its user-friendly implementation allows seamless integration into existing processes.

The Four Rounds of Erasure at a Glance

Pass No.
Data written
1
Overwrite with 0xFF
In the first round, all data is overwritten with the constant value 0xFF. This immediately obscures the original data content and provides a basic level of protection.
2
256-bit AES Encryption
Next, any remaining original data in memory is fully encrypted using 256-bit AES (Advanced Encryption Standard). AES is considered one of the most reliable and modern encryption standards, making forensic recovery attempts significantly more difficult.
3
Specific Bit Patterns & Verification
In the third round, a specific bit pattern (e.g., 10010010, 01001001, 00100100) is written. Afterward, the process verifies the written data by reading it back and checking for accuracy. This ensures that every sector/block has been correctly overwritten. Any missing or incorrectly read sectors/blocks are documented in a deletion report.
4
Random Overwrite (FIPS-Compliant)
Finally, all data is overwritten using high-quality random numbers generated according to FIPS (Federal Information Processing Standards). By utilizing a strong random source, any attempt to read or reconstruct the original data is rendered virtually impossible.

View source code