Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys. This requires that the data have been encrypted. Data comes in these three states: data at rest, data in transit and data in use. In the CIA triad of confidentiality, integrity, and availability all three states must be adequately protected. Getting rid of data at rest like old backup tapes, data stored in the cloud, computers, phones, and multi-function printers can be challenging when confidentiality of information is of concern; when encryption is in place it allows for smooth disposal of data. Confidentiality and privacy are big drivers of encryption.
In some cases everything is encrypted but in other cases only specific data is encrypted. In addition the same specific data in one system can be encrypted with another key in another system. The more specific each piece of data is encrypted the more specific data can be shredded. Example: iOS devices use crypto-shredding when activating the "Erase all content and settings" by discarding all the keys in ' storage'. This renders all user data on the device cryptographically inaccessible.
Best practices
Storing encryption keys securely is important for shredding to be effective. There is no effect when a symmetric or asymmetricencryption key is shredded when it has already been compromised. A Trusted Platform Module addresses this issue. A hardware security module is one of the safest ways to use and store encryption keys.
Salt: Hashing can be inadequate for confidentiality, because the hash is always the same. For example: The hash of a specific social security number can be reverse engineered by the help of rainbow tables. Salt addresses this problem.
Security considerations
Encryption strength can be weaker over time when computers get faster or flaws are found.
Data remanence: For example: When data on a harddisk is encrypted after it has been stored there is a chance that there is still unencrypted data on the harddisk. Encrypting data does not automatically mean it will overwrite exactly the same location of the unencrypted data. Also bad sectors cannot be encrypted afterwards. It is better to have encryption in place before storing data.
Hibernation is a threat to the use of an encryption key. When an encryption key is loaded into RAM and the machine is hibernated at that time, all memory, including the encryption key, is stored on the harddisk.
The mentioned security issues are not specific to crypto-shredding, but apply in general to encryption. In addition to crypto-shredding, data erasure, degaussing and physically shredding the physical device can mitigate the risk further.