Description Secure File Deleter Screenshots Download Updates history How to use Technical information 12 cryptography security algorithms About Version PRO
1 April 2019 improvements: Fixed several bugs
The list of cryptography algorithms

Secure File Deleter includes 12 security algorithms for file deletion (also known as encryption algorithms). As the most important part of the program, it embodies its purpose. Having so many options makes our software excellent to be used at home or in the office. Our software meets the highest security standards.

• The most famous american DOD_5220.22_M
• Method which was designed by Peter Gutman, a scientist.
• Algorithm GOST_R_50739_95 which is widely used in various security systems in Russia.
• Less famous, but also very secure RCMP_TSSIT_OPS_II, which is originally from security departments of Royal Canadian Police.
• Method which was designed by Bruce Schneier, a scientist from Germany.
• German VSITR which is used in security system in Germany and in EU.
• British standard HMG_Infosec_Standard_5.
• Instructions for USA army AR380_19.
• Instructions for USA air force 5020.
• Cryptographic pseudo-random number generator CPRNG.
• Our own algorithm: random characters are written on the random places of the file.
• Our own algorithm: random characters are written over all contents of the file.

Support

Contact us
Contributors
Refund Policy
Privacy policy
Our Programs

Clean Space
Hidden Disk
Secure File Deleter
Prevent Recovery
Auto Recycle Bin
News

20 March 2019
Reorganization of programs

26 December 2018
Happy New Year!



©
CyRobo, Zeletavska, Prague, Czech Republic
All rights reserved. Clean Space is a registered trademark.