A SERVICE OF

logo

Manual
1/2/2014
PSFS1XXXXGXXXX
Viking Technology
Revision B7
Page 25 of 60
www.vikingtechnology.com
more than the average. The result is an SSD that is far more reliable across its
full capacity and over a far greater length of time. The controller uses both static
and dynamic wear-leveling algorithms to globally manage cell degradation to
approximately 2% between least worn and most worn cells or to the value
specified in the S.M.A.R.T Wear Range Delta command (ID=177, Opcode=0xB1)
2.6.3.2 Write Operation Reduction
The controller uses intelligent algorithms to minimize P-E cycles through
aggregation, virtualization, and difference processing. It is uniquely effective in
reducing the wear and maintaining the reliability of the overall pool of Flash
memory blocks by intelligently minimizes re-writes of identical data, to maximize
the effectiveness of the wear-leveling process.
2.7 Data Security
Viking Element SSD’s are self-encrypting drives (SED), with a bulk data
encryption feature that provides automatic hardware-based data security and
enhanced secure erase capability.
A self-encrypting drive, scrambles data using a data encryption key as it is
written to the drive and then descrambles it with the key as it is retrieved. This
gives the user the highest level of data protection available and provides a fast
erase simply by deleting the encryption key, eliminating the need for time
consuming data-overwrite. Data on the drive is instantly rendered unreadable.
The Element SSD supports AES-128 encryption (in CTR mode) and ATA Secure
Erase features to protect sensitive data. The VRFS1xGF and VRFS1xGK series
also supports AES-256 encryption (in XTS mode) and TCG security
enhancements.
The ATA Security Erase Unit command, which is usually password protected,
will erase:
All map data
The encryption key (All data in flash is scrambled and unrecoverable)
and the resulting condition of the drive after an ATA Security Erase will be:
Any reads to the drive will respond with zero for every LBA
Any writes to the drive will act as if the drive has nothing; a T0 state.
If the flash memory was directly probed, some scrambled data might be
retrievable, but there would be no way to decode it without the encryption key.