Gutmann method

{{short description|Algorithm for securely erasing computer hard drives}}

The Gutmann method is an algorithm for securely erasing the contents of computer hard disk drives, such as files. Devised by Peter Gutmann and Colin Plumb and presented in the paper Secure Deletion of Data from Magnetic and Solid-State Memory in July 1996, it involved writing a series of 35 patterns over the region to be erased.

The selection of patterns assumes that the user does not know the encoding mechanism used by the drive, so it includes patterns designed specifically for three types of drives. A user who knows which type of encoding the drive uses can choose only those patterns intended for their drive. A drive with a different encoding mechanism would need different patterns.

Most of the patterns in the Gutmann method were designed for older MFM/RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said "In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques".{{cite book |title=Security and Usability: Designing Secure Systems that People Can Use |first1=Lorrie Faith|last1=Cranor |first2=Simson|last2=Garfinkel |date=25 August 2005|page=307 |publisher="O'Reilly Media, Inc." |isbn=9780596553852|url=https://books.google.com/books?id=wDVhy9EyEAEC&pg=PA307 }}

Since about 2001, some ATA IDE and SATA hard drive manufacturer designs include support for the ATA Secure Erase standard, obviating the need to apply the Gutmann method when erasing an entire drive.{{cite report|url=http://www.cse-cst.gc.ca/documents/publications/itsg-csti/itsg06-eng.pdf|title=Clearing and Declassifying Electronic Data Storage Devices|archiveurl=https://web.archive.org/web/20140303210956/http://www.cse-cst.gc.ca/documents/publications/itsg-csti/itsg06-eng.pdf|archivedate=2014-03-03|publisher=Communications Security Establishment|date=July 2006|page=7|type=PDF}} The Gutmann method does not apply to USB sticks: a 2011 study reports that 71.7% of data remained available. On solid state drives it resulted in 0.8–4.3% recovery.{{cite q | Q115346857

|url=https://www.usenix.org/legacy/events/fast11/tech/full_papers/Wei.pdf

| journal = FAST'11: Proceedings of the 9th USENIX conference on File and storage technologies

| access-date = 2018-01-08

| ref = {{sfnref|Wei|2011}}

}}

Background

The delete function in most operating systems simply marks the space occupied by the file as reusable (removes the pointer to the file) without immediately removing any of its contents. At this point the file can be fairly easily recovered by numerous recovery applications. However, once the space is overwritten with other data, there is no known way to use software to recover it. It cannot be done with software alone since the storage device only returns its current contents via its normal interface. Gutmann claims that intelligence agencies have sophisticated tools, including magnetic force microscopes, which together with image analysis, can detect the previous values of bits on the affected area of the media (for example hard disk). This claim however seems to be invalid based on the thesis "Data Reconstruction from a Hard Disk Drive using Magnetic Force Microscopy".{{cite web|url=https://escholarship.org/uc/item/26g4p84b|title=Data Reconstruction from a Hard Disk Drive using Magnetic Force Microscopy|archiveurl=https://web.archive.org/web/20151027143757/https://escholarship.org/uc/item/26g4p84b|archivedate=2015-10-27|publisher=UNIVERSITY OF CALIFORNIA, SAN DIEGO|date=2013|type=PDF}}

Method

An overwrite session consists of a lead-in of four random write patterns, followed by patterns 5 to 31 (see rows of table below), executed in a random order, and a lead-out of four more random patterns.

Each of patterns 5 to 31 was designed with a specific magnetic media encoding scheme in mind, which each pattern targets. The drive is written to for all the passes even though the table below only shows the bit patterns for the passes that are specifically targeted at each encoding scheme. The end result should obscure any data on the drive so that only the most advanced physical scanning (e.g., using a magnetic force microscope) of the drive is likely to be able to recover any data.

The series of patterns is as follows:

class="wikitable"

|+ Gutmann overwrite method

! rowspan="2" | Pass

! colspan="2" | Data written

! colspan="3" | Pattern written to disk for targeted encoding scheme

In binary notation

! In hex notation

! (1,7) RLL

! (2,7) RLL

! MFM

1(Random)(Random)
2(Random)(Random)
3(Random)(Random)
4(Random)(Random)
501010101 01010101 0101010155 55 55100...000 1000...
610101010 10101010 10101010AA AA AA00 100...0 1000...
710010010 01001001 0010010092 49 2400 100000...0 100...
801001001 00100100 1001001049 24 920000 100000...100 100...
900100100 10010010 0100100124 92 49100000...00 100...
1000000000 00000000 0000000000 00 00101000...1000...
1100010001 00010001 0001000111 11 110 100000...
1200100010 00100010 0010001022 22 2200000 100000...
1300110011 00110011 0011001133 33 3310...1000000...
1401000100 01000100 0100010044 44 44000 100000...
1501010101 01010101 0101010155 55 55100...000 1000...
1601100110 01100110 0110011066 66 660000 100000...000000 10000000...
1701110111 01110111 0111011177 77 77100010...
1810001000 10001000 1000100088 88 8800 100000...
1910011001 10011001 1001100199 99 990 100000...00 10000000...
2010101010 10101010 10101010AA AA AA00 100...0 1000...
2110111011 10111011 10111011BB BB BB00 101000...
2211001100 11001100 11001100CC CC CC0 10...0000 10000000...
2311011101 11011101 11011101DD DD DD0 101000...
2411101110 11101110 11101110EE EE EE0 100010...
2511111111 11111111 11111111FF FF FF0 100...000 100000...
2610010010 01001001 0010010092 49 2400 100000...0 100...
2701001001 00100100 1001001049 24 920000 100000...100 100...
2800100100 10010010 0100100124 92 49100000...00 100...
2901101101 10110110 110110116D B6 DB0 100
3010110110 11011011 01101101B6 DB 6D100
3111011011 01101101 10110110DB 6D B600 100
32(Random)(Random)
33(Random)(Random)
34(Random)(Random)
35(Random)(Random)

Encoded bits shown in bold are what should be present in the ideal pattern, although due to the encoding the complementary bit is actually present at the start of the track.

Criticism

Daniel Feenberg of the National Bureau of Economic Research, an American private nonprofit research organization, criticized Gutmann's claim that intelligence agencies are likely to be able to read overwritten data, citing a lack of evidence for such claims. He finds that Gutmann cites one non-existent source and sources that do not actually demonstrate recovery, only partially-successful observations. The definition of "random" is also quite different from the usual one used: Gutmann expects the use of pseudorandom data with sequences known to the recovering side, not an unpredictable one such as a cryptographically secure pseudorandom number generator.{{cite web|url=http://www.nber.org/sys-admin/overwritten-data-gutmann.html|title=Can Intelligence Agencies Read Overwritten Data? A response to Gutmann|publisher=National Bureau of Economic Research|date=2013|orig-year=2003|author=Daniel Feenberg}}

Nevertheless, some published government security procedures consider a disk overwritten once to still be sensitive.{{cite web|url=http://www.cse-cst.gc.ca/documents/publications/itsg-csti/itsg06-eng.pdf|title=Clearing and Declassifying Electronic Data Storage Devices|archiveurl=https://web.archive.org/web/20140303210956/http://www.cse-cst.gc.ca/documents/publications/itsg-csti/itsg06-eng.pdf|archivedate=2014-03-03|publisher=Communications Security Establishment|date=July 2006|type=PDF}}

Gutmann himself has responded to some of these criticisms and also criticized how his algorithm has been abused in an epilogue to his original paper, in which he states:Gutmann, Peter. (July 22–25, 1996) [https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html Secure Deletion of Data from Magnetic and Solid-State Memory.] University of Auckland Department of Computer Science. Epilogue section.

{{quotation|text=In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old MFM methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is the best you can do. As the paper says, "A good scrubbing with random data will do about as well as can be expected". This was true in 1996, and is still true now.|author=Peter Gutmann|title=Secure Deletion of Data from Magnetic and Solid-State Memory|source=University of Auckland Department of Computer Science}}

Gutmann's statement has been criticized for not recognizing that PRML/EPRML does not replace RLL, with critics claiming PRML/EPRML to be a signal detection method rather than a data encoding method. Polish data recovery service [https://kaleron.edu.pl/ Kaleron] has also claimed that Gutmann's publication contains further factual errors and assumptions that do not apply to actual disks.{{cite web|date=2024|title=Throwing Gutmann's algorithm into the trash|author=Kaleron|url=https://kaleron.edu.pl/throwing-Gutmanns-algorithm-into-the-trash|access-date=2024-11-22}}

See also

Notes

{{Reflist}}