Solved

Peter Gutmann Algorithm

Posted on 2004-04-29
9
914 Views
Last Modified: 2013-11-20
Hi
     I want to use peter gutmann algorithm "Secure Deletion of Data from Magnetic and Solid-State Memory". I could not find its theory and source with example.
I have implement Blowfish Algo. I faced no problem for it. But unable to find and implement Gutmann.
So please tell me either web site where i can find it or other way to implement it.
                  Thanks
0
Comment
Question by:ManojKrChauhan
  • 2
  • 2
  • 2
  • +1
9 Comments
 
LVL 14

Expert Comment

by:wayside
ID: 10949001
Here's the paper: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

This includes the list of patterns to use (22 of them) to overwrite data.

0
 

Author Comment

by:ManojKrChauhan
ID: 10949694
I  want more information. I want examples and if possible it's source code.
0
 

Author Comment

by:ManojKrChauhan
ID: 10995099
I have Peter Gutmann Document "Secure Deletion of Data..............."
It's not enough to implement Peter Gutmann Algorithm. Can anyone tell me about more source for it.
Waiting for reply
0
3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

 
LVL 14

Expert Comment

by:wayside
ID: 10995231
I don't know where ther are sources, sorry.

Conceptually, it doesn't seem that difficult:

1) Open a file
2) Go to beginning of file
3) Write the pattern over and over until the end of the file is reached
4) Repeat steps 2 and 3 for all the patterns
5) Close the file

For memory, it's even easier because there is no file management, you just iterate over the memory buffer, writing all the patterns in succession.
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
ID: 11858125
May be it is late. But u can find something here at free
http://www.freedownloadscenter.com/Programming/ActiveX/cryptlib.html
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
ID: 11858173
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 12049890
PAQed - no points refunded (of 35)

Computer101
E-E Admin
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ORA-01403: no data found 43 101
How to know only "File created" with EventLog 3 34
VBA "SendKeys" Syntax for Multiple Keystrokes 7 108
How to convert MFC::CString to UTF8 wchar_t* 10 211
Here is how to use MFC's automatic Radio Button handling in your dialog boxes and forms.  Beginner programmers usually start with a OnClick handler for each radio button and that's just not the right way to go.  MFC has a very cool system for handli…
Introduction: Dynamic window placements and drawing on a form, simple usage of windows registry as a storage place for information. Continuing from the first article about sudoku.  There we have designed the application and put a lot of user int…
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question