Solved

Peter Gutmann Algorithm

Posted on 2004-04-29
9
902 Views
Last Modified: 2013-11-20
Hi
     I want to use peter gutmann algorithm "Secure Deletion of Data from Magnetic and Solid-State Memory". I could not find its theory and source with example.
I have implement Blowfish Algo. I faced no problem for it. But unable to find and implement Gutmann.
So please tell me either web site where i can find it or other way to implement it.
                  Thanks
0
Comment
Question by:ManojKrChauhan
  • 2
  • 2
  • 2
  • +1
9 Comments
 
LVL 14

Expert Comment

by:wayside
Comment Utility
Here's the paper: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

This includes the list of patterns to use (22 of them) to overwrite data.

0
 

Author Comment

by:ManojKrChauhan
Comment Utility
I  want more information. I want examples and if possible it's source code.
0
 

Author Comment

by:ManojKrChauhan
Comment Utility
I have Peter Gutmann Document "Secure Deletion of Data..............."
It's not enough to implement Peter Gutmann Algorithm. Can anyone tell me about more source for it.
Waiting for reply
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 14

Expert Comment

by:wayside
Comment Utility
I don't know where ther are sources, sorry.

Conceptually, it doesn't seem that difficult:

1) Open a file
2) Go to beginning of file
3) Write the pattern over and over until the end of the file is reached
4) Repeat steps 2 and 3 for all the patterns
5) Close the file

For memory, it's even easier because there is no file management, you just iterate over the memory buffer, writing all the patterns in succession.
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
Comment Utility
May be it is late. But u can find something here at free
http://www.freedownloadscenter.com/Programming/ActiveX/cryptlib.html
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
Comment Utility
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
Comment Utility
PAQed - no points refunded (of 35)

Computer101
E-E Admin
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Login Script to Copy Folders 12 20
maxBlock challenge 30 99
matchUp  challenge 6 48
Path of Workbook 3 44
In this article, I'll describe -- and show pictures of -- some of the significant additions that have been made available to programmers in the MFC Feature Pack for Visual C++ 2008.  These same feature are in the MFC libraries that come with Visual …
Introduction: Dialogs (1) modal - maintaining the database. Continuing from the ninth article about sudoku.   You might have heard of modal and modeless dialogs.  Here with this Sudoku application will we use one of each type: a modal dialog …
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now