speakerNEW!iShredder™ Business for iOS and Android are now available for Enterprise users.Learn more

Advanced Secure Deletion Algorithm (ASDA)
The next generation of secure data erasure.

Since 2017, ASDA has replaced our former 50‑pass method: four precisely tuned steps, verified and logged—fast, resource‑efficient, and audit‑ready.
Advanced Secure Deletion Algorithm (ASDA)

ASDA enables highly effective, verifiable data erasure with minimal resource consumption. The four passes are designed for efficiency and transparency: read‑after‑write verification and deletion logs document every step. AES‑256 and cryptographically strong random numbers make forensic reconstruction significantly harder. The implementation integrates seamlessly into existing processes.

ASDA also exceeds the requirements of NIST SP 800‑88 Rev. 1 (Clear / Purge / Destroy). Depending on the medium (HDD/SSD/Flash), additional purge mechanisms may be appropriate—such as Block Erase or Cryptographic Erase.

Overview of the four passes

Pass No.
Data written
1
Overwrite with 0xFF
The data area is fully overwritten with 0xFF—original content becomes unrecoverable.
2
AES‑256 encryption
The original buffer content is encrypted with AES‑256 and written back—creating a cryptographic barrier against forensic reconstruction. (Keys reside only temporarily in RAM and are securely wiped afterwards.)
3
Bit pattern & verification
A defined bit pattern (e.g., 10010010 01001001 00100100) is written, followed by read‑after‑write verification. Deviations are overwritten again and recorded in the erasure report.
4
Random data (CSPRNG)
Finally, ASDA overwrites the area with cryptographically strong random numbers (CSPRNG per NIST SP 800‑90A).

View source code