Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 246

Cryptographic Erasure

What is Cryptographic Erasure?

Cryptographic ErasureRendering encrypted data unrecoverable by securely destroying the encryption keys instead of overwriting the storage media itself.


Cryptographic erasure, sometimes called crypto-shredding, sanitizes data by destroying the keys used to encrypt it, so the ciphertext remains physically present but is unreadable. NIST SP 800-88 lists it as an accepted media-sanitization method when the data was always stored encrypted with strong algorithms (AES-256 or equivalent) and well-managed keys. It is widely used in self-encrypting drives, mobile devices (iOS effaceable key), cloud KMS-backed storage, and tape backups, where physical wiping is slow, impossible, or impossible to verify. To be effective, every copy of every wrapping key must be destroyed, including HSM-resident master keys, backups, and escrow material. Auditable key-destruction logs are required for compliance.

Examples

  1. 01

    Tapping the Erase All Content button on an iPhone, which deletes the per-device effaceable AES key.

  2. 02

    Destroying a customer-managed KMS key to render millions of encrypted S3 objects unreadable.

Frequently asked questions

What is Cryptographic Erasure?

Rendering encrypted data unrecoverable by securely destroying the encryption keys instead of overwriting the storage media itself. It belongs to the Cryptography category of cybersecurity.

What does Cryptographic Erasure mean?

Rendering encrypted data unrecoverable by securely destroying the encryption keys instead of overwriting the storage media itself.

How does Cryptographic Erasure work?

Cryptographic erasure, sometimes called crypto-shredding, sanitizes data by destroying the keys used to encrypt it, so the ciphertext remains physically present but is unreadable. NIST SP 800-88 lists it as an accepted media-sanitization method when the data was always stored encrypted with strong algorithms (AES-256 or equivalent) and well-managed keys. It is widely used in self-encrypting drives, mobile devices (iOS effaceable key), cloud KMS-backed storage, and tape backups, where physical wiping is slow, impossible, or impossible to verify. To be effective, every copy of every wrapping key must be destroyed, including HSM-resident master keys, backups, and escrow material. Auditable key-destruction logs are required for compliance.

How do you defend against Cryptographic Erasure?

Defences for Cryptographic Erasure typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Cryptographic Erasure?

Common alternative names include: Crypto-shredding, Key destruction sanitization.

Related terms