Crypto-shredding is the practice of 'deleting'
data
In the pursuit of knowledge, data (; ) is a collection of discrete values that convey information, describing quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpret ...
by deliberately deleting or overwriting the
encryption keys.
This requires that the data have been encrypted. Data may be considered to exist in three states:
data at rest,
data in transit and
data in use. General data security principles, such as in the
CIA triad of
confidentiality,
integrity, and
availability, require that all three states must be adequately protected.
Deleting data at rest on storage media such as
backup
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "back up", w ...
tapes,
data stored in the cloud,
computers
A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These progra ...
, phones, or
multi-function printers can present challenges when confidentiality of information is of concern. When encryption is in place, data disposal is more secure.
Motivations for use
There are various reasons for using crypto-shredding, including when the data is contained in defective or out-of date systems, there is no further use for the data, the circumstances are such that there are no
ongerlegal rights to use or retain the data, and other similar motivations. Legal obligations may also come from regulations such as the
right to be forgotten, the
General Data Protection Regulation
The General Data Protection Regulation (GDPR) is a European Union regulation on data protection and privacy in the EU and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and of human rights law, in partic ...
, and others. Data security is largely influenced by
confidentiality and
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
concerns.
Use
In some cases all data storage is encrypted, such as encrypting entire
harddisks,
computer files, or
database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spa ...
s. Alternatively only specific data may be encrypted, such as
passport
A passport is an official travel document issued by a government that contains a person's identity. A person with a passport can travel to and from foreign countries more easily and access consular assistance. A passport certifies the personal ...
numbers,
social security number
In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued to ...
s,
bank account numbers,
person name
A person ( : people) is a being that has certain capacities or attributes such as reason, morality, consciousness or self-consciousness, and being a part of a culturally established form of social relations such as kinship, ownership of property, ...
s, or
record in a databases. Additionally, data in one system may be encrypted with separate keys when that same data is contained in multiple systems.
When
specific pieces of data are encrypted (possibly with different keys) it allows for more specific data shredding.
Example
iOS devices and
Macintosh computers with an
Apple T2
The Apple T2 (Apple's internal name is T8012) security chip is a system on a chip "SoC" tasked with providing security and controller features to Apple's Intel based Macintosh computers. It is a 64-bit ARMv8 chip and runs bridgeOS. T2 has its ...
or
Apple silicon chip use crypto-shredding when performing the "Erase all content and settings" action by discarding all the keys in '
effaceable storage'. This renders all user data on the device cryptographically inaccessible, in a very short amount of time.
Best practices
* Storing encryption keys securely is important for shredding to be effective. For instance, shredding has no effect when a
symmetric or
asymmetric
Asymmetric may refer to:
*Asymmetry in geometry, chemistry, and physics
Computing
* Asymmetric cryptography, in public-key cryptography
*Asymmetric digital subscriber line, Internet connectivity
* Asymmetric multiprocessing, in computer architect ...
encryption key has already been compromised. A
Trusted Platform Module is meant to address this issue. A
hardware security module is considered one of the most secure ways to use and store encryption keys.
*
Bring your own encryption refers to a cloud computing security model to help cloud service customers to use their own encryption software and manage their own encryption keys.
* Crypographic "salting":
Hashing may be vulnerable to a single breach if the hash key used for all data is the same. Hash keys can be reverse engineered by methods such as
rainbow table
A rainbow table is an efficient way to store data that has been computed in advance to facilitate cracking passwords. To protect stored passwords from compromise in case of a data breach, organizations avoid storing them directly, instead transfo ...
s.
Salt is meant to address this problem by ensuring that access to the hash key will not compromise all data.
Security considerations
There are many security issues that should be considered when securing data. Some examples are listed in this section.The security issues listed here are not specific to crypto-shredding, and in general these may apply to all types of data encryption. In addition to crypto-shredding,
data erasure,
degaussing and
physically shredding the physical device (disk) can mitigate the risk further.
*
Encryption strength can weaken over time as computing speed becomes more efficient and more time is available to discover exploits in secure systems.
*
Brute-force attack: If data is not adequately encrypted it may be possible to decrypt it through brute-force methods. Newer technology such as
quantum computing
Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Though ...
increases the potential to allow brute-force attacks to become more efficient in the future. However,
quantum computing
Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Though ...
is less effective against specific encryption methods such as
symmetric encryption
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between th ...
than others that are more vulnerable to brute-force attacks such as
public-key encryption. Even when data is secured via use of symmetric encryption, there are methods such as
Grover's algorithm that make these kinds of attacks more effective, though this can be mitigated by other enhancements, such as using larger key values.
Post Quantum-Crypto for dummies on wiley-vch.de
/ref>
* Data in use: Data that is "in use" has specific vulnerabilities. For example, when ( plaintext) encryption keys are temporarily stored in RAM, it may be vulnerable to cold boot attacks, hardware advanced persistent threat
An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term m ...
s, rootkits/bootkits, computer hardware supply chain attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. ...
s, and physical threats from users who have access.
* Data remanence is the ability of computer memory to retain previously stored information beyond its intended lifetime, which also increases its vulnerability to unintended access. For example: When data on a harddisk is encrypted after it has been stored, it is possible that unencrypted data may remain on the harddisk. Encrypting data does not necessarily ensure the data will be overwritten at the same location as the unencrypted data. In addition, any bad sectors on a harddisk cannot be encrypted after data has been written to those locations. Encrypting data at the time it is written is always more secure than encrypting it after it has been stored without encryption.
* Hibernation
Hibernation is a state of minimal activity and metabolic depression undergone by some animal species. Hibernation is a seasonal heterothermy characterized by low body-temperature, slow breathing and heart-rate, and low metabolic rate. It most ...
presents additional threats when an encryption key is used. Once an encryption key is loaded into RAM and the machine is placed into hibernation, all memory, including the encryption key, may be stored on the harddisk, which is outside of the encryption key's safe storage location.
References
{{Cryptography navbox
Data security
Key management
Public-key cryptography
Security