D-Secure - Advanced Data Security Solutions
Resources & BlogsPartnersTrust CertificateSupport
Login
D-Secure - Advanced Data Security Solutions

Leading provider of Compliant data erasure solutions for enterprises worldwide. Secure your data lifecycle with our enterprise-grade security solutions.

Products
  • All Products
  • Drive Eraser
  • Drive Eraser Diagnostic
  • File Eraser
Industries
  • All Industries
  • Healthcare
  • Banking & Finance
  • Government
  • Education
  • Non-Profit
Resources
  • Documentation
  • Compliance
  • Blog
  • Case Studies
Company
  • About Us
  • Contact
  • Partners

© 2026 D-Secure Inc. All rights reserved.

All systems operational
Privacy PolicyLegal PolicyTerms of ServiceCookie PolicySecurityStatus
NIST SP 800-88 Rev.2

What is Cryptographic Erase as per NIST SP 800-88 Rev.2?

Understand how Cryptographic Erase sanitizes encryption keys to prevent access to encrypted data, as defined by NIST guidelines.

Cryptographic Erase Explained

Under Section 3.2 of NIST SP 800-88 Rev.2, Cryptographic Erase (CE) is a purge sanitization technique that sanitizes the key used to encrypt data or prevents access to this key. By erasing the key itself, access to the encrypted information is prevented, leaving the encrypted data (ciphertext) on the storage media.

Since CE performs key sanitization, it is comparatively faster than other sanitization techniques and has high assurance. Many storage media today have integrated symmetric-key encryption that is always active and encrypts all stored data. Self-encrypting drives (SEDs) are one example that usually includes sanitization capabilities.

NIST Guidelines for Cryptographic Erase

3.2.1. Strength of Cryptography for CE

The cryptographic algorithm and its mode of operation must be designed and implemented to ensure that no unauthorized party can determine the decryption key or recover the plaintext without possessing the legitimate decryption key.

NIST SP 800-88 R2 cites ISO/IEC 27040 for referring to the strength of cryptography:

  • The security strength of the cryptographic algorithm used for target data encryption is at least 128 bits
  • The level or bits of entropy of the random number sources are at least the number of bits of the cryptographic keys

3.2.2. Applicability of CE and Supported Devices

CE is only limited to sanitizing keys corresponding to encrypted data. Therefore, it is a prerequisite that no sensitive data has previously been stored in non-encrypted form (plaintext) on the storage media. Sanitization of sensitive data stored in plaintext requires the use of other sanitization techniques like overwriting.

Important Considerations

  • CE should not be considered an assured method on media that have been escrowed or have a backup, unless the organization is confident about storage and management of encryption keys outside of the storage media
  • For highly sensitive information, CE may not be considered, especially when confidentiality protections span a long time, as data recovery in the future can be a security concern
  • Due to computational capabilities in the future or cryptographic weaknesses, recovery of encryption keys may be possible

D-Secure Cryptographic Erase Support

For successful implementation of cryptographic erasure, organizations must have a systematic process for recording media devices encrypted using strong cryptographic algorithms along with a log of encryption keys. D-Secure supports cryptographic erasure as prescribed by NIST 800-88 R2.

NIST Compliant

Implements cryptographic erasure according to NIST SP 800-88 Rev.2 guidelines

Verification

Performs verification after CE to ensure keys have been securely erased

SED Support

Works with self-encrypting drives and other encrypted storage media

Audit Reports

Generates tamper-proof certificates for compliance documentation

Conclusion

Cryptographic Erase is a fast and effective sanitization technique for encrypted storage media when implemented correctly according to NIST guidelines. Organizations must use professional data-wiping tools that support cryptographic erasure and perform verification to ensure keys have been securely erased and data is no longer accessible.

Implement NIST-Compliant Cryptographic Erase

Ensure secure key sanitization with D-Secure's NIST SP 800-88 Rev.2 compliant cryptographic erasure.

Request Free DemoView Products

Frequently Asked Questions

Comments (0)

Your email address will not be published. Providing an email is optional.

No comments yet. Be the first to comment.

Have Questions About This Topic?

Send us an enquiry regarding: Cryptographic Erase

AI Documentation and Project Summary